Showing posts with label social media. Show all posts
Showing posts with label social media. Show all posts

Friday, October 22, 2021

Internet is the biggest opportunity. But also the biggest threat to democracy.




The internet allows to deliver information but also manipulate it in a new way. Internet is allowing that people can communicate straight with politicians. And let them know bout the difficulties and needs of society. But the same thing allows hostile actors to take contact straight with political leaders and offer them something. 

Or the hostile actor can introduce the research. That kind of faked research can tell that most people want something that is against the national interest. That thing can make simply introducing the faked polls. There is the possibility that there is no poll at all. And those kinds of things are affecting the politicians.


The media companies can be good platforms for cyber attacks. 


The thing that makes international web and social media and media operators a threat to democracy and national security is that they can act as a platform for the operations of the GRU and other intelligence services. Social media channels can use for collecting information. 

The GRU agent might just ask people where they or their family members are working. But the regular media can turn the weapon against democracy if they are in the wrong hands. Well-known and trusted media channels can turn into a propaganda factory in seconds. 

The actors like GRU or FSB can just buy media houses by using some covert company. And then they can replace the entire crew with their staff. Then the company starts to send the Russian propaganda. The fact is that the media company can deliver one-sided information on purpose or accidentally. There is a possibility that the sources that reporters use are telling lies. 

But also reporters can be the agents who are telling the version of "truth" that serves their government.  And that thing makes them very good actors in the indoctrination operations that are also called psychological operations or PSY-OPS. 


The new threats to democracy are the governmentally controlled trolls.


We live in the western world. And our world governments are protecting people. If somebody threatens us we might call the police. In the cases of hacking and trolling the police tries to track that actor. And if the actor is in a foreign land. Authorities send international arrest warrants. But then Chinese hackers attacked western facilities. They were tracked and then the Chinese authorities couldn't operate. 

The reason for that was that those hackers operated under the control of the Chinese government and worked for PLA (People's Liberation Army). Also, the cyberattacks that targeted Baltic states did not cause juridical actions in Russia. The reason for that was that the attacks happened under the control of the GRU, Russian military intelligence. 

Those cases have proven that western authorities couldn't predict and react to the situations that hackers operated under governmental control. The same way the Russian troll factory is operating under governmental control. The operator sits in Russia or China and the assistant is bringing the computer to the western world. The hacker or troller uses that remote computer for operations and that makes it difficult to prove. That attacks are coming from outside of borders. That makes it also difficult to deny that kind of attack. Because just closing the connections from those countries is not enough.  


The kill-ware or killing malware is a big threat. Maybe it's just hype, but the threat is still real. In scenarios, the malware is used to cause the disorder. Or give extra time for friendly military operators.


In the worst-case scenario, the malware shuts down the controlling computers of the nuclear power plants. That causes a need to shut down energy production. In some other scenarios, the malware destroys important databases in critical moments. 

The malware destroys the medical databases or databases that are controlling the flight of the missiles. If the users of those missiles recognize that the databases are destroyed. Replacing them requires a couple of minutes and in modern warfare, a couple of minutes is a long time.

Media can also use to deliver malware. The normal media can involve links that will cheat the user to download some software. And that kind of software can be malware. In the worst case, the malware kills people. 

The killing malware is the computer software that can kill people. That malware might be the computer virus that changes the blood types in the hospital. And that thing is the most dangerous situation if somebody needs blood transfer. 

Another version is the computer virus that raises the level of the runways. Or maybe it can shut down the engines of the aircraft and refuse to shut down autopilot. But that kind of malware can also change the programming code of the gas pedal of the automobile. And that means that the system starts to accelerate the car in the wrong place. 

There are many places where the killing malware can affect. In the nuclear or uranium enrichment process, the malware can raise the speed of the centrifuges. And that thing can cause a nuclear explosion in those facilities. The threat of that type of malware. Forces to shut down nuclear power plants. And in those cases, even the threat is enough for losing energy. 


https://arstechnica.com/information-technology/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/

https://blog.malwarebytes.com/cybercrime/2021/10/killware-is-it-just-as-bad-as-it-sounds/

https://securityboulevard.com/2021/10/killware-hype-is-bigger-than-the-threat-for-now/

https://thoughtandmachines.blogspot.com/

Saturday, December 14, 2019

What makes false information so effective?

 



What makes false information so effective?


The reason what boosts the effectiveness of fake information is that data is delivered to the audience, which has certain attitudes for that kind of thing. So the "will to believe" makes the information effectively and that kind of thing are shared very easily. This makes social media so effective tool for sharing the faked information. 

If there are many supporters for some information, that would increase the trust for the information. The people, who are following their leader in this kind of case are very aggressive, which would deny the will to resist or fix the errors in the faked news. 

We are facing the situation, that the people who would not able to see or make large-scale things have the same chance to get the same sized audience with some other more well-known people. And the thing is that the trollers would choose their social media mates by choosing well-known people, and they hope to get very much contacts by using those people as the "gate". 

Centers for social networks can be used as a tool in information operation


There is a game on the internet, which is known as the "Kevin Bacon" game (the Oracle of bacon (theoracleofbacon.com) (1). That game is created as the tool for mapping how many connections the actors have in Hollywood between each other by their movies. That game calculates, how many people are between two actors, and similar data can be collected from the politicians or rock stars. 

And if some social media user has the president of some nation in their social media network, that allows getting very effective and followed persons as the fellows in social media. That game can be used for the base to create the algorithm, which calculates the number of social media mates. Those people, who are acting as the centers in their social network are good targets for the information operators or propagandists, who would want to ask those people to the fellows in their social network, and then that operator could start to deliver faked data to that network. 

That's why people like Rock Stars are really good fellows for the net trollers. The audience chooses fellows, what have the same style opinions, what they have, and this would give sharing that kind of operation very big effect. And if other trollers would put more similar cases to that information flow, that thing increases extending the power of information. 

What would vaccinate people against information operations? Should people just learn to ask "why"?


The thing that would give a great chance to resist the faked information is education. The educated person would not so easily follow their leaders and the first step for the criticism is the skills to get information from the sources, which are proven as trustable. And the second thing is to find out, how to use our brains. 

If we always are following every word, what our leaders would tell, that thing makes us blind robots. And that is the reason, why we must practice our way to think about what is behind some words. Why somebody attacks against some minorities and that kind of thing? Why some people want to isolate people, who are different than they are to the ghettos. Is there some reason for that kind of thing? And if some people are trained in universities, are the only persons, whose education doesn't mean a thing?

(1)


Image:

Wednesday, November 13, 2019

How to get visibility?

How to get visibility?

The idea of visibility means that an interesting story is enough if it is shared with the right persons. The idea of getting the maximum value of social media publications is that the person should look for the right persons for interaction between together. And who are the right persons? The right choice for getting visibility is persons, who have many friends and followers on social media.

That means that public persons are the right targets for getting an effective network in social media. But then we must ask, what kind of messages we should send to social media? And the answer is that we must find people, who have effectiveness to the right actors. Of course, we can write things about rock roll music, if we want to get a notice from rock bands.

But if we want that some high-class corporate chiefs see us, that means that we need to write something, what makes us interesting in the eyes of corporate directors. The thing is that that kind of person is highly trained specialists, whose mission is to bring money to shareholders. This is one purpose, why the company exists. In the real-life, we have to confess people, who influence political leaders, if we want to affect the state. This means that in these kinds of situations, we are searching for the attention of the people, who are wearing suits and slips.

They have different kinds of values than the rock bands, and this means that those people must be confessed in some other way, than just playing guitar. If we want to get something, we must offer something. This means that we must find the thing, that we can use to sell things that are depending on ourselves. We are not selling systems, we are selling our knowledge.

If we are finding some errors in the system, we must dare to tell that to people. When we are facing things like biometric identifiers, we must ask, what we are doing, if our voice or fingerprint would be changed. There might be a scar also in the area of the fingerprint. Or we might have a sniffle, while we are talking to the application, what recognizes our speech, and that means that there could be problems in that kind of case, but the algorithm can detect that we have a sniffle, and tell that to our employer.

Monday, September 30, 2019

Why this thing has kept out of publicity?

Why this thing has kept out of publicity?

And who cares, what kind of videos or something else things I watch on the internet? This is a good question when we are thinking about political influence in of the social and other kinds of media? The thing, what makes this kind of things very serious is that if we would get people, who will have certain opinions, and then follow the use of internet of that kind of people, we might make a thing, called action matrix of those people. And if this frame or matrix contains the data, what kind of things that kind of people are watching on the internet, that thing would help politicians to adjust the speeches, what they make for please a certain type of people.

The thing is that things like "Brexit" might be one part of the programs of speeches, what those people make, and also there are many other things, what is affecting the people, when they are choosing their candidate. This way to think is normal, and if we are thinking that something, what that person says has only the side role in the political programs.

But the politician can think that those same things are the main parts of the program in the parliament. This is a thing, what we do not mention very often, and the social media as the marketing tool for political agenda is quite difficult to deny. I know that the tool is effective when we are wanted to take clicks for some homepage, and the method is easy. We must just share links to the homepages, what we want to market.

And the links can be shared in the form "hey look at this", and in those cases, the person, who shares those links might collect a very big number of Facebook friends by sharing music videos, what is collected by using the matrix, what is collected by observing the use of internet of some people, who have certain opinions. Even if those homepages would be denied, that thing doesn't mean, that the data is so easy to deny. There is a possibility to make many homepages with the same contents, and that means that the data would be shared very effectively.

The thing is that Facebook and another kind of social media tools are complicated in the point of view of legislation. One of the most important things is that the members of political parties can anyway use the internet and social media as private persons. And the thing, what makes propaganda more effective than we ever think is the case, where people don't be told that they are looking at propaganda.

Here I use the word "propaganda" as the synonym for political commercials or marketing the political programs. The thing is that political marketing would be more effective if it is involved with some entertainment homepages, and what would you think if in the middle of some concert videos, would start the commercial film, where is played the election commercial of some politicians?

That thing is effective, but the more effective method is to use the discussion forum as the platform of political advertisement. First, there would be a couple of people would discuss some things, and then somebody shares thing, "hey there is a candidate in the election, who has that kind of opinions and go check that person homepages". That kind of thing is an effective way to connect many types of social media.

https://yle.fi/uutiset/3-10996034

Thursday, September 26, 2019

About trolls and cheat

About trolls and cheat

When we are looking like people, who want to work for a good purpose, we are facing some interesting details. Those people would get great and positive publicity, but after that, the net trolls are taking them to their target.  At the case of Greta Thunberg, we see the method, how net trolls are working.

There are people, who are repeating theme name and then the words "with Asperger", and that seems like ask, who will take that person under the cheat. The thing is that those people might think, that others will afraid them. During the positive publicity, the trolls are silent, and then after a couple of years, those people are striking on the Internet and social media. Have you ever used Quora?

In that social media applications, you will see how real-life net trolls are working. First, you will answer to some question, and then somebody would answer you with a list of symptoms, where is listed symptoms like "Asperger" "schizophrenia" and another kind of things, what people feel sometimes very negative. Then they are starting to threating people with psychiatrists and another kind of things. The model, what they normally use in those kinds of things is the list of things, what person has been written, and then they expect, that somebody else will fill the ends of those sentences.

So here I must remind, that if those people are working in some psychiatric institute, they have professional secrecy about that kind of things. Have you ever face trolls in the working life? Those people might feel very scary in their mind, but the thing is that when you see one of those persons in real-life, they might not feel scary at all.

Once, when I went to the workplace there were send the message in the social media there was mention that 2% percent of people have something, and then I went in. In that message was a photograph of the face of that person. But when I saw the entirety, I just thought that "this cannot be real". There was a person, who looked as sick.

All body was destroyed by drugs and alcohol, and the skirt of that person was not washed. So when I saw that person, I must ask, did that thing used the social media account by self. Those people are really interesting because they do not look like any kind of users of social media, and the question is how somebody follows them? Has somebody opened the media by using their name?

Those questions are a very good thing to ask, and if that kind of person might look like having very much friends, we must ask, why others are following those people? And in the cases, where somebody looks like narcotics user, we must also think, that there is somebody, who is using the account for that person.

Tuesday, September 17, 2019

The data security and digital environment


The data security and digital environment

Who would we trust?  Trust is the thing, what we must earn. And thing is that if we want to secure data, we must follow the use of our data all the time.  The best defense against cyber attacks is the knowledge of how the enemy is working. We might benefit things like social media also in the area of data security. And one thing, what we can do on Facebook, is keeping the account, and also we can share fake data in that media, and observe, how our children would use that thing.

So the offensive cybersecurity is the use of faked Facebook accounts to find out people, who are a risk for security. Some of these methods are illegal, but also the foreign operators like security companies and intelligence services use those methods. The normal procedure is that the operator uses the image of a suspicious person, and asks things, what they should not ask. And also they can offer drugs and money on social media.

Why we must protect our children? Or why everybody must take part in data security? Even the person self doesn't handle classified information, that doesn't mean that this person cannot use as the "gate" to that information. One version is the cleaner, who would allow wrong persons to enter the restricted area, and they can put the surveillance cameras to the rooms, and follow things, what is happening on the screens.

And if people are cheating some worker, that would allow that some sex-agent would come to take the part of the bad feeling of that person. That's why social life is a very important thing to keep in control. A person who has alcohol or drug problems is a good target for criminals when they want to get access to information. That person, who is chosen as the "gate" can also introduce other people to those criminals, who might want to steal the data. There might be no marks when the data is stolen, and that thing should handle by keeping records, when the files are opened and who has opened those files.

Data- or security is the key element of the success of data-oriented business architecture. And digital trust is the thing, what we need when we want to protect our data. Digital trust means the way, how we can protect and secure the databases and digital environment, where we are working. That means something, what we cannot change and what is not something, what other people notice or wants to steal. Digital trust is the thing, what keeps our digital business rolling, and then we must realize that the things with digital trust are the same as physical trust.

First signs what tells that something is going wrong are the wrong questions. Questions like what is your salary are not things, what some ICT-professional should ask in the working place. And also things like attempt to filming screens or taking registration numbers of the cars are not things, what trusted person should do. But if we cannot trust our business partners, we cannot handle our job. Digital trust is something, what we must earn. Bad signs are things that somebody wants the information, what doesn't belong to them.

But how to earn this trust. The thing is that the person, who would do that kind of things like data security should introduce the work, what would want and need to do. That means those persons are keeping their work open, that other people can see their professionalism. And the thing in is that data security should base the open technology. In those cases, the vital components of the system like passwords and other keys should keep secret.

The idea in open architecture solutions is that only the vital parts like keys are secret. We should think the data security as the digital lock. Every person in the world knows, how locks are working. And the only thing, what is kept secret are the depths of the levels of the key. If we would keep only the things classified, what allows to enter the system that would make the things easier. And if we would buy some data security service, that means that everybody sees telephone numbers, where the support can ask.

That kind of systems uses only strong identifiers. The mobile telephones, which are used to enter the system and classified data can be secured with biometric recognitors. When the person who has access to the classified information would want to see that data, there might be QR code on the screen, and the person scans the code with the cellphone.

There is a possibility that everybody can open the files, but the use of the wrong telephone or by unauthorized users would bring in the front of eyes nice-looking documents, what is full of useless or faked data, what would make the merchandise a piece of garbage. The problem in this kind of things like biometric detectors is if somebody can out own fingerprint in the database, that allows the access data.

Many of this kind of problems are easy to solve. The company must know the number of workers, and there must be two registers, where those names are. If there is an extra worker or too many names in the database, that information must come to screen right away. This system might compile the access list and list of persons, who get a salary, and if the unauthorized name has been put in the database, that would be told immediately. And the persons, who have access to classified data might have a certain salary, which helps the directors control the lists of authorized persons.

And, of course, the fingerprints must be stored to another database, and if there is no match in the list of authorized persons or their salaries don't match with salaries of the secured persons, that would cause an alert. So the risk that somebody will put extra names to the list can be solved by keeping records of the fingerprint, and if the number of them is changed, the information of that would come to the screens of the responsible officers.

The most important thing in cybersecurity is to understand, what is the value of the data, what is secured. What kind of treats that data can face. And the biggest threat of the modern world is that the stored data would manipulate. If somebody will manipulate the images, what the recon satellites are taken, that would cause the war. And the thing is that this kind of cyber attack can be done by the small state or even the guerilla movement. The idea is that the other nations would come to fight for that small operator. This makes modern cyber warfare dangerous.

Cybersecurity is the thing, what is in a key role in the business. If some company databases would be filled with band images, what hackers are put in those places, that would remove the trust of that company right away. Cyberattacks can be done just because somebody wants to destroy the reputation of the company, and the best way to do that is the hacker just fills the database with the material, what doesn't belong to the business.

The thing in modern society is that we must just need to work in the environment, where the social media exist. We cannot deny people use that media in free time. So in the time of social media only one thing, how we can handle the problems of cybersecurity is the enlightenment, and educating people to follow media by using criticism. That kind of things must be involved with every citizen's base skills like the swimming and locking the door.

Wednesday, July 24, 2019

The question about social media is who owns those services?

The question about social media is who owns those services? 

And what kind of data would be interesting the spies? The answer is the data, which can be used for blackmailing operations. If some politician or net activist, who claims to fight for the animal rights would be a catch for the hunting trip to Africa, those persons might lose their friends and the voters of those people might leave.

When the leaders of the social media companies are telling about their privacy policies, and that they don't share their information with the other service providers or marketing services, we always forget one thing. There might be long chains of the companies between the real owner and social media service, and that means that the real owner of the social media company can own many other services.

And the things, what would those companies get from the Internet are giving them to make a psychological profile of that person. If we are thinking about the ability to connect data, what is collected from some different social media applications, we would see, how the public opinion differs from the private discussions. 

But if we would connect data from the social media and as an example the bookstore, we can find many things about the targeted person opinions, attitudes, and orientations. One thing is that the data, what would be collected can uncover many things. There are some little mistakes, what uncover if the person might be different, what claims to be.

One is that if the person, who claims to be a woman, often buys underpants, what is meant for men. Of course, that person can buy them to husband, or the man buys often pantyhoses tampons and make-ups, would that tell something about the user of the account.

Or what would some animal right protester do with the ammunition of Safari-rifle? Those things are really interesting things when people are connecting the data between social media and other sources. And those things might be very awkward for some people. That thing can destroy those persons immediately.

Monday, July 8, 2019

The typical cheater on the Internet has nothing difference with normal cheater

The typical cheater on the Internet has nothing difference with normal cheater

Trolling is a nice hobby. This thing is a very good example, why people should stay out from social media because if they are writing something in there, the troller can publish the picture about this person's sexual organs and then everybody laughing, because that inmate was not understood that staying out from social media is the only reasonable thing to act in the modern world. Only the official channels are allowed to use, and people should be quiet, about things, what they are faced in the workplaces and other places. Sometimes the teaser would open social media accounts for the Russian professional trollers, who would use them in their psychological actions.

And this kind of things is really risky. If that kind of account is tracked, and it is in the name of some troller, that person could be banned from social media. This is one of the most feared situations because those trollers usually operate under the supervision of some "elder operators", who use some mobile application for controlling the use of those accounts. And if the passwords of that application would go in the wrong hands, could the result be devastating. But let's go back to trollers identity.

The way of the act of those people is normally similar to another cheater, and if the troller would face counter-troller, would that cause an interesting reaction. A person who has used merciless methods, and who would cause many tears would try to play the martyr. This kind of behavior is often seen in the cases when the teaser is uncovered. That person, who has delivered personal information about some other people starts to show the miserable way of self. 

That means that that inmate tells people, about the rough childhood the cases, when the wooden toys were between heater and wall. That means that this kind of persons would face the next thing in their life. The information warfare is one type of warfare, and if some Russian actor would have some trolling factories, also NATO has counter-actors, which is also used similar methods with those trollers.

The information delivery and the legitimization of spying

The information delivery and the legitimization of spying

Information is a very effective tool in the hands of people, and persons who have something to hide are very deep troubles in the modern world. The thing is that computers and algorithms are making profiles of people, and they find out if people have something to hide in their private life.

Lack of social media and unwilling to use social media applications are telling that people have something problems, and another thing is that if the social media applications, what are saving costs of the telephone calls are allowing to make phone calls, what are untraceable from the telephone bills is a really nice thing. But the problem is that those applications might collect the data, or they can uncover if a person has problems with writings.

Many times people, who are living by writing are facing things like plagiarism. The plagiarism is the use of texts or some other artistic product without permission and by marking it in own name. So when a person plagiarizes that kind of product, that means stealing the product. If you write things on the Internet, you will sometimes things like plagiarism detection, what is allowed to see in the sources of data transmission. 

Social media is a problematic tool because it would uncover if a person doesn't make texts self. But there is another way to use it in the tool of intelligence work. When people are upset about their privacy and make things like cases in the courtroom, the officials would just find out, who is paying the bills of the lawyers. Also, those people are profiling things, like what kind of people those cases are supporting.

And this kind of things is a really bad thing if somebody wants to hide something or control the net use of the family members. But the computers are giving an ultimate tool for tracking people, who are somehow weird. The thing is that computers are collecting many types of data, and one very interesting thing is that this collected data can also uncover people, who have been teased or somehow faced something strange in their life.

What if the person would ever order pizza?

What if the person would ever order pizza? 

What would you like about people, who never order pizza, never use a taxi or always change the place, where they eat? If a person ever orders pizza, that could tell the will to walk to the pizzeria, because the personnel of that firm is so nice.

But it can tell that there have been problems with those merchandises, and that's why an inmate would not order pizza, but maybe that person just doesn't like this Italian tradition, and maybe that person ever orders pizza because of this reason. When we are thinking cases, that person says, that to be the victim of the teasing, we must realize that those people are avoiding something, what normal people do.

In the real world, government officials are making many types of profiles. And one thing is that they are making profiles, how typical victim of teasing behaves? Where that kind of person lives, or would that inmate ever go to marry? The thing what investigators are looking in the personal history of a targeted person is changes.  When something changes suddenly, there might be some problems in the life of that person.

If some inmate has been used a credit card but suddenly starts to use lots of cash, that would tell that something has been changed.   In the world of intelligence and law enforcement, the investigator must try to think like a criminal. This helps to find out things, what people are not willing to tell the investigator. Sometimes a person has been teased in the schools, and that kind of thing could be a really bad thing. So in this kind of cases, the teaser would sometimes slip in the discussion groups and play also the victim. 

That would be an effective way to close the mouths of the people and control things that are spoken in those groups.  But the thing is that life continues after school, and there is the mark of being in those groups. So that kind of things is telling that person has something wrong if that inmate makes something, what differs the profile of the teased people. In that kind of cases, we must think, what would we do, if we would be teasers. If we would like to tease somebody, we might rather target person, who lives in own house.

If we would tease a person, who lives in a flat, that action would influence many other people. When we think cases, where garbage cans are forgotten to empty, or snow would fall on the front of the gate. So in the flat inmate is ever alone. And the groans are made by the steward and the inhabitant's identity would not uncover in this kind of cases.

Thursday, June 13, 2019

What we should afraid of social media and social media applications?

What we should afraid of social media and social media applications?

1. The blind trust is the biggest threat in the world of telecommunication

Social media is the biggest opportunity and the biggest threat at the same time. And at the beginning, I must say that the blind trust for some systems is the biggest threat in the world of telecommunication in the entire world.

When some social media solution claims that it would not collect the data or sell it to the third party, we must remember, that there is always an actor, who is out of control in those causes, and that actor is group, what is made the code of that program. When we are looking at the thing, what social media is making, we must understand that algorithms are searching the data, what people are writing about their experiences about the users of this kind of social media application.

2. The maker of the solution is always out of control 

But the algorithms and artificial intelligence can make much more than we can ever imagine. Those algorithms can look for the references to other social media applications, and then the operators can search that user from those services. Or if the algorithm is made by using highly sophisticated skills and tools, it might collect the data of the usage of social media and the entire Internet by using automatized artificial intelligence.

The system operates with the method, what cumulates the databases, and it can compare used words to the data, what is mentioned in the news and other internet pages. And then it can make a profile the entire use of the Internet. That system can find out, what the person is interested, and what that person has not interested.

3. There is no privacy in the Internet

The algorithm just finds out, what kind of things the person is writing in social media, and that would help to make a complete and effective profile of that person, and map the contacts of that targetted inmate. The system can find out what is the normal things, what those people are discussing. And it can also find out even the sexual orientation of the person if it will compare the feedback, what the person gets from the partners, who have been dated.

When we are talking about privacy, and how we must be careful, we must remember that there could always be somebody, who will listen or follow the messages. In analog telephone lines were situations, that somebody just connects own telephone or loudspeaker to the wrong plug, and then all phone calls, what are called from some houses, were allowed to hear.

4. In the digital age, the methods have been changed

But when we are thinking about the modern digital age, we always forget that there is always software, what handles the phone calls and data usage. Using the digital network is a simple and effective thing, but we always forget that the telephone needs an operating system for making the connections to the digital networks, which handles only numbers one and zero.

And if somebody would put the small tracking cookie in the operating system every byte, what is sent from the device would be doubled, and the second one would send to a third-party server, and if the system uses  User Datagram, or UDP-protocol the system, what sends data would not even notice that there is a data leak.

5. Stealth eavesdropping tool can be installed even in the eldest mobile telephones

Normally the echo of TCP or Transmission Control Protocol would uncover if some of the bytes would go to the wrong receiver, but UDP doesn't send that echo. And even the oldest telephones can equip with the cookie, what will mark the sending data by using so-called control bytes, what orders routers duplicate them.

And in fact, it's more dangerous to trust that the system is safe, and blindly believe system delivers, that they would not give information to their party actors, than use systems what risk the privacy and know the risks. In real life, we must not speak secret things and send classified information by using E-mails.

6. Private operators are toothless against government

We should meet the person who we want to tell classified things face to face, and even then we must be a little bit paranoid and think that the person would be traitorous, and record the discussion. So in those cases, we must be sure, that we also speak about things by following the law.

At last, I must tell one thing. Private operators are toothless against the government. The government can order the makers of the secrecy programs make there the "back gate", which allows opening every message, what is sent made by using that software, and if there is not back gate, the government might deny sharing that program on the Internet.

6.1 Government might deny the use of unauthorized software by equipping the files with carrier byte. If that byte is not found, the message would not deliver forward. 

And only the authorized software would put the carrier code on the front of the code. If that certificate code would not be found the message would not deliver to forward. This makes possible control the data traffic on the Internet more effectively than ever before.

It can deny delivering messages, which are made by using unauthorized software. The thing is really simple. If the message is made by using authorized software, there is a small code in front of the data package, and if the router would not find that code, it would crush the message immediately. This case would be simply explained that it is "tracking code backward".

Saturday, May 11, 2019

One little note about the chain letters

One little note about the chain letters

The chain letters or letters, what is traveling in social media are very interesting things. Many times they are covered as the nice words and wisdom of the holy men like Dalai Lama, and those letters are actually pictures, what are made nicely. The thing what the people, who have written or made that letter has mentioned that people would send that to their friends, and that kind of things are really nice looking stuff.

One type of those chain letters is the letter, what is send by some mother or father, and its purpose is to show the thing, how this kind of thing would suffuse in the social media. This kind of letters are normally used by mapping the networks of some people, and that makes them sometimes dangerous.

They are telling, that the people keep contact at Facebook and this kind of things might interest some people. When we are thinking about the cases, where some person would share the images of angels and quotes of Dalai Lama in social media, we would say that those persons are really something, what comes from the really deep. Of course, those images are really nice looking, but the thing is that those people would probably represent the line, that "intelligent persons would solve the problem, but wise people would ever get in the problem".

And after that, they would pray the god, who is something, what would solve every problem in life. Here would somebody ask the reason, why the god has given us the intelligence if he would not mean that we would solve the problems. People have intelligence because that is meant for solving problems, and if we would be a really wise species, we would live on the trees and eat bananas.

I will return that thing soon, but the thing is that if we are looking at the persons, who are writing those chain letters, what are made by using high-qualified graphics and good taste, we must ask "did that person make it by themselves". Of course, we all can take images from the Internet, and then write some quotes on that image. And then we must follow, that if the person ever uses social media when we meet that inmate or the texts seem to come in the Facebook when a person sits in front of us, and we cannot see mobile device would that tell that this inmate would not use that account self.

Thursday, May 9, 2019

The world of social media and algorithms

The world of social media and algorithms

https://controllingsociety.blogspot.com/

We are living in a world with social media, do we want that or not

When I'm writing about Facebook in this text, I mean about social media. The problems with Facebook and data security is that when artificial intelligence is profiling the user for marketing it can also be used to create another kind of profiles. Data solutions that are used today are created for slower networks and in the begin of Facebook and other social media, the bandwidth of the networks have been less than 500 kilobytes, what made almost impossible to share images. The thing is that nobody even thought that someday almost every person has got the device, which allows sending the photographs and even movies to the Internet and what goes on the pocket.

That means this kind of things have not predicted when Facebook and another kind of social media solutions have been made. And another thing is that the algorithms, what are used for sorting data in the social media have been created for slower computers.

Modern supercomputers can sort billions of bytes more per second than some supercomputer in early 21 century. And the thing, what is new is that the data is transferring in the network. We are making more things on the Internet than before. When we are creating all our papers and memos on the net, we are in danger of hacking. But otherwise, we cannot lose those documents, while we are dropping our USB sticks. And we can continue to make those documents in every place, where we want.

The ability to filter data makes NSA so effective

The thing, what makes NSA so effective is that it has the capacity to filter information. That thing means that the computer can choose the data, what would send to operators by using multiple algorithms. One of the algorithms is the simultaneous calls to the telephone, which is owned by the known criminal. That means that the system can collect telephone calls and E-mails, which are interested in law enforcement. One of them is the E-mails between well known criminal and police chief.

Or the lawyer, whose spouses cleaning company would get millions of euros by cleaning offices, what are owned by Mafia. In the modern time, those officials must not listen to every tape and the computer would also use the "speech to text" solution for creating documents of those records. And the thing is that this kind of solutions is working as some kind of karaoke, which means that the judge can follow the tape like in some kind of karaoke happening.

In a couple of years ago, there were massive campaigns against social media. The attitude was that "companies have their own official channels, and the normal workers should concentrate on their work". But there is one thing, what made that campaign ineffective, and that is that it was made by the media, what has own cow in the ditch. The print media has problems with modern electronic media, and there was always one very big problem, and that is "what if the journalist writes racist or provocative writings?".

The second thing was that why people should be silent if they are harassed at the workplace? When we are thinking about social media, we can see things, what might feel very interesting. Almost every person, who is written in the social media are faced things, what is called "troll". Usually, that thing is like "fucking gay" type phrases, what are telling something about the way, how the harassed will think about things. Sometimes we are facing cases, that somebody has been used trolls for closing the social media.

There are millions of people, who have something to hide with their own backgrounds. And one of them is the unemployed person, who lives in Europe, but spends the winters in Hawaii. Those people would not want their friends to know about this kind of things. But there is another kind of cases, what might be very embarrassing, if they are uncovered. One of them is the priest or head of some charity campaign, who has been the head of the harassing in the school period.

Sometimes there have been suicides in that kind of cases and after that, the person has been changed the name and lived in the foreign land that everybody would forget that kind of things. But social media is a powerful tool for politicians, who are marketing their own ideas on how to improve society. But social media needs an active attitude, and that means that if a person would not have own thoughts, that kind of things is also uncovering in social media.

The social media account might be kept by somebody else

There are services, what are selling the social media writings, which means that the account is handled by professionals. And sometimes is claimed that some ice-hockey players have been burned about this kind of things. In those cases, the player has been written texts for social media, while that man has been on ice. I don't know if this true or false, but if this happens to the politician, that thing would be a little bit more embarrassing than in the case of the ice-hockey player.

In the social media have been uncovered things like that the person, who seems very emphatic and have been marketed very nice guy is something else. And there is also uncovered that some very nice looking kind person is total racists, who believe to be over everybody else. This is the problem with psychopaths and narcissist. They are looking like nice guys, but those persons have no social conscience. Those people are normally nicely dressed and polite, but they think always their own benefit.

One good mark to uncover that kind of person is that the psychopath wants to maximize own benefit. This means that this inmate always chooses the stronger side, and those persons are changing their opinion always to the side of the majority. Or actually, psychopaths are choosing the side, what gives that person the best benefit. And if some person offers the ice-hockey tickets for the psychopath, that person can be the side of the minorities, if that allows getting in the circles of the rich people, whose pictures they can show in the Facebook, what is suddenly filled with the selfies, what the psychopath portrays with the well known ice-hockey players . So this is the sermon for this morning.

Friday, May 3, 2019

Why people should be poor?

Why people should be poor?

https://controllingsociety.blogspot.com/

Why people should be poor?

"Keep them poor" is one very good motto for people, who want society, where people cannot advance by their own work. But why somebody wants to make the class-society, where the only couple of people would have real rights and the rest of people would be very poor?

 In that kind of societies, the thing is that this set would separate the high-class people from the ordinary people, and if so-called regular people would be poor, they would not have time to get education and rise in the hierarchy. If the people would be working all day in the heavy physical working, they would not know about better things, because they spend all day in the workplace, and then get home as tired, that they would not able to get an education.

Every people makes mistakes

In this model, the ruling class is hiding behind the mask of perfection, and that kind of things are seen in the way, how some people are sharing articles about persons like computer specialists. The computer workers or specialists like micro support people and programmers are people, who are working in the area, where is not many layers between the leaders and workers, and there might be not henchmen, who can be blamed if the work is not done well.


And that would make possible that the henchmen would see, that the boss is not a perfect man or woman. Those people would uncover only the regular members of Homo Sapiens species, who can make mistakes, and that removes the image of perfection. The reason why some people are fighting against things like artificial intelligence and social media is, the same in both cases.

All writings are not propaganda

The artificial intelligence would eliminate the method where some person can get the benefit because the handler of the information would not have time to read some things in the files. One of the things might be how many speeding tickets would some person get, and the second thing is that how many of the other drivers would get speeding ticket in the same size crossing of the speed limit in the same police district.

That would tell if somebody is a little bit "more equal" than others. Also, artificial intelligence would control equipment and that would give people more free time for hanging in the social media, and the social media can uncover that there is something wrong with the workplaces or attitudes of the bosses or other people, who would be hiding behind the image of perfection. But the major problem in social media is not that there are people, who are hanging in there all day.

Social media is a very effective tool for disinformation and propaganda. That thing is an effective tool for making contact with youngsters and giving them hardcore propaganda, but there is another point of view of that thing. There is also justified protests on the Internet, and that kind of things are really problematic for the police and military forces. If the protesters would just march across the city, would the situation handle by riot police and denying to publish the images of the protests.

Things always have two sides, and sometimes there is no right side

Of course, some provocation can break a couple of windows, what justifies the use of force to scatter the demonstration, what is defined as the riots, and breaking the property would give legislation and justification for using the violence against rioters. The social media would give another image of the demonstrators, and maybe we are wanted to see those things in some other point of view.

That means that there might be two very undemocratic parts against together, and this is the thing, what we have seen in Arab nations. There were dictators, who were replaced by new dictators after the Arab spring, who are continuing the same politics against their own people, and that thing means that the same way continues, but the faces in the official wall paintings are changed.

Things like social media would uncover things, like some very famous people would not have opinions at all. The thing, what makes social media very interesting thing, and that makes it problematic for the people, is that it is a very good environment to share information. Those solutions and environment are really easy to use, and they can be a very good tool for telling things, but there is a one really bad thing, In social media would be uncovering things that some very nice and cool person cannot talk about anything else than some clothes.

Thursday, May 2, 2019

Artificial intelligence and the great audience

Artificial intelligence and the great audience

The University of Helsinki and open courses about artificial intelligence

There would be many things, what people should know about computers and artificial intelligence. One thing is that the computers notice if the user of some social media accounts have been changed because the style of the text has been turned in a different direction. Also, the speed of writings and the argumentation with the main things are telling about the personality of the user.

If they are changed, the writer might be different than in the original account, and that thing causes questions, why some persons would give their social media accounts to another inmate. In this case, the artificial intelligence is working backward and compiles its registers to the writings what the user has made before and what the user does now. There are some parameters, what tells that the social media account has been captured, and one of them is a long term not using condition in some account. And the accounts would suddenly start to operate.

What people should know about artificial intelligence?

The University of Helsinki has offered an open course for every person, what is given information about artificial intelligence to every person who is interesting about this kind of things. The reason for that is that people should know more about this kind of things and advantages, and how the advantage of artificial intelligence influences everyday life.

The most important thing is artificial intelligence and the ability to index the data, which allows it to handle massive databases with very high speed. This thing makes it a revolutionary tool for handling data, and the automation of the search process makes impossible to select data by the way, what benefits some part of the process.

And that thing is very suitable in the juridical processes, where the person might otherwise select the data, which gives more benefit to that inmate. The computer gives every data from the database, and that would make impossible to corrupt the results. But the thing is that people should know, that artificial intelligence is the tool, and the human being makes decisions, at least for now.

The things can change, and the artificial intelligence would become more sophisticated, flexible and powerful, and that means in the future it can make more independent and complicated decisions than ever before. And in the future in some processes, artificial intelligence can even bypass the human, and one of those situations is that when the aircraft would fly against the rules.

The advanced autopilot would take the controls off the pilot and fly to the nearest airfield, and send the emergency call, that there is something wrong with the pilot. Also in military technology, the fighter can make the programmed swerves and activate the counteractions against the attack if the pilot would not react to the incoming missiles. Those things are tools for extreme situations.

The artificial intelligence would be most effective when it is connected to other sensors and programs. 

The artificial intelligence is a powerful tool for law enforcement because if that thing is connected to the image recognition systems, law enforcement can select the vehicles, which are usually breaking the rules. And those things like dangerous chancing the tracks are visible in the traffic control cameras, and if that kind of driving would be noticed, that system can bring the data and picture of the vehicle and driver to the screen of traffic control.

This kind of systems can also notice if in some places has been seen the persons, who have similar clothes what are described to the police reports. Also, those systems can notice if there is unattended packages in the subways, or some people, who seem just hanging in the places, where should not hang around.

There are also some parameters what are the point at the terrorism, and one is the camouflaged clothes, what form is sold only in some Middle-East countries, and of course, nervous behavior like fast movements are telling that the person is expecting something. Also, the packages, what seems like assault rifles or radiotelephones what are used by men, who wear the camouflage suits are telling that those inmates might have bad things in their mind.

But when we are talking about image recognition programs and database, the system can pick the images of the bullets, what are used in homicides, and then collect similar bullet images together. If there is more than one case, where is used the same gun, that would tell that there is probably serial killer and that means the law enforcement must be very effective and fast in that kind of situations. Also, the newspaper writings can compile with the other writings, and that would tell that some writings cause hate, and that would make the law enforcement to make checks, what might be the reason for the hate in some cases.

Chinese highly automated dark factories.

   Chinese highly automated dark factories.  Chinese dark factories are so highly automated that they don’t even need light. This is the fut...