The U.N. human rights chief says U.S. authorities “risk unlocking a Pandora’s Box” in their efforts to force Apple to create software to crack the security features on its phones, and is urging them to proceed with caution. Zeid Raad al-Hussein warned in a statement about the potential for “extremely damaging implications” on human rights, journalists, whistle-blowers, political dissidents and others. He said the case is “potentially a gift to authoritarian regimes” and criminal hackers. Through the courts, the FBI is trying to force Apple to help crack an encrypted iPhone used by a gunman behind a December shooting spree in San Bernardino, California, that killed 14 people. Zeid said the case centers on where the “key red line” should be set to protect people “from criminals and repression.”
Sunday, 10 July 2016
UN HUMAN RIGHTS CHIEF WARNS OF IMPLICATIONS OF APPLE
The U.N. human rights chief says U.S. authorities “risk unlocking a Pandora’s Box” in their efforts to force Apple to create software to crack the security features on its phones, and is urging them to proceed with caution. Zeid Raad al-Hussein warned in a statement about the potential for “extremely damaging implications” on human rights, journalists, whistle-blowers, political dissidents and others. He said the case is “potentially a gift to authoritarian regimes” and criminal hackers. Through the courts, the FBI is trying to force Apple to help crack an encrypted iPhone used by a gunman behind a December shooting spree in San Bernardino, California, that killed 14 people. Zeid said the case centers on where the “key red line” should be set to protect people “from criminals and repression.”
DOES AN EXTREMIST’S iPHONE CONTAIN A “CYBER PATHOGEN”?

A local prosecutor has o ered an unusual
justi cation for forcing Apple to help hack an
iPhone used by a San Bernardino mass killer:
The phone might have been “used as a weapon”
to introduce malicious software to county computer systems. San Bernardino County District Attorney Michael
Ramos acknowledged to The Associated Press
that there’s no evidence of malicious software in
the county’s computer network. But he added, “I wouldn’t call it a total hypothetical.” Computer security experts say the prospect is unlikely. By late Friday (04), the prosecutor’s
claim had sparked a wave of social media
postings, many of which mocked the DA’s use
of the non-technical term “cyber pathogen” to
describe the supposed malware. Apple has resisted calls to help unlock the
phone, arguing that building a software tool
to override the phone’s security features would
render other iPhones vulnerable to criminals
and government authorities around the world.
Investigators, meanwhile, are eager to see if
the phone used by shooter Syed Farook - one
issued by Farook’s employer, the county health
department - contains any useful information
about other suspects.

But the idea that Farook might have used the
phone to transmit a “lying-dormant cyber
pathogen” into county data systems is a new
one. Ramos’ o face, however, cited it in a court
ling Thursday among several other reasons to
support the government’s position. “This was a county employee that murdered 14
people and injured 22,” Ramos said. “Did he use
the county’s infrastructure? Did he hack into that
infrastructure? I don’t know. In order for me to
really put that issue to rest, there is one piece of
evidence that would absolutely let us know that,
and that would be the iPhone.” The argument drew condemnation from one
software expert who has signed a brief in
support of Apple’s position. “Ramos’s statements are not only misleading
to the court, but amount to blatant fear
mongering,” independent software researcher
Jonathan Zdziarski wrote in a post on his
personal blog. Other security experts who haven’t taken sides
also discounted the scenario. “It’s de nitely
possible, technically, but it doesn’t seem to me
at rst glance to be likely,” said David Meltzer, a computer security expert and chief research
o cer at Tripwire, a commercial IT security rm.
He said Apple’s iPhone operating system is a
relatively closed environment that’s designed so
users can’t easily introduce their own programs. Ramos, meanwhile, said he’d heard about social media posts that mocked the term “cyber
pathogen,” which is not generally used by tech
experts. “When they do that,” he said, “they’re
mocking the victims of this crime, of this horrible
terrorist attack.”
US APPEALS RULING ON ACCESSING DATA IN NEW YORK iPHONE CASE

Calling a York judge’s ruling “an
unprecedented limitation” on judicial
authority, the Justice Department has asked
a Brooklyn federal court to reverse a decision
that said Apple Inc. wasn’t required to pry
open a locked iPhone. The government’s 45-page brief comes a week
after U.S. Magistrate Judge James Orenstein
issued his decision in a routine drug case,
dealing a blow to the Obama administration in
its battle with the tech giant over privacy and
public safety. Lawyers for the Justice Department called their
Monday request routine, arguing that the case
is not about asking Apple to do anything new,
or to create a “master key” to access all iPhones.
Apple has opposed the government’s move in a
separate case involving the shooter who killed
14 people Dec. 2 in San Bernardino, California. Apples
pushback has fueled a national
debate over digital privacy rights and national
security. Apple had previously assailed the
government’s move, saying U.S. officials were seeking “dangerous power” through the courts and trampling on the company’s
constitutional rights. The Brooklyn case involves a government
request that is less onerous for Apple and its
phone technology. The so-called extraction
technique works on an older iPhone operating
system and has been used dozens of times
before to assist investigators.
The California and New York cases both hinge
on the government’s interpretation of the
centuries-old All Writs Act. The new cases
present another challenge for federal courts,
which have to sort out how a law that is used to
help government investigators square privacy
and encryption in the digital age. The government asserted in court papers
Monday that Orenstein’s ruling in New York is “an unprecedented limitation on” judicial
authority and that his legal “analysis goes far
a eld of the circumstances of this case.” It also
stated that the government “does not have any
adequate alternatives” to obtaining Apple’s
assistance because attempting to guess the
passcode would trigger the phone’s auto-erase
security feature. Federal prosecutors cited several examples in which Apple has extracted data from a
locked device under the law, including a child
exploitation case in New York, a narcotics case
in Florida and another exploitation case in
Washington state.

Apple responded Monday: “Judge Orenstein
ruled the FBI’s request would ‘thoroughly
undermine fundamental principles of the
Constitution’ and we agree. We share the judge’s
concern that misuse of the All Writs Act would
start us down a slippery slope that threatens
everyone’s safety and privacy.” In October, Orenstein invited Apple to
challenge the government’s use of the 1789
law that compelled the company to help the
government obtain iPhone data in criminal
cases. Since then, lawyers say Apple has
opposed requests to help extract information
from over a dozen iPhones in California, Illinois,
Massachusetts and New York.
In the California case, officials are looking for
access to the phone used by Syed Farook but
owned by San Bernardino County, where he was
a health inspector. Federal investigators say the
attack by Farook and his wife, Tashfeen Malik, was
at least partly inspired by the Islamic State group.
The couple died later in a gun battle with police. FBI Director James Comey told a House judiciary
panel last week that the government was “asking
Apple to take the vicious guard dog away and let us pick the lock” on the iPhone. Should Apple
create the specialized software to allow the FBI to
hack the iPhone in California, Comey said it would
take 26 minutes to do what’s known as a brute
force attack - testing multiple passcodes in quick,
computational succession. Apple has said that being forced to extract
information from an iPhone, no matter the
circumstance, “could threaten the trust between
Apple and its customers and substantially
tarnish the Apple brand.”
BMW SHOWS OFF CONCEPT CAR FOR THE SELF- DRIVING FUTURE

Luxury automaker BMW AG is showing o a
sleek concept car aimed at a future in which
drivers choose between the pleasures of
high-performance driving and letting the car
take control. The company unveiled the Vision Next 100 at
ceremonies Monday for the company’s 100th
birthday at Munich’s Olympic Hall. The car offers a choice of driver-controlled or
vehicle-controlled operations. In driver mode,
the car indicates the ideal driving line and
speed; in “ease” or autonomous mode, the steering wheel retracts and the driver and front-
seat passenger can turn to face each other.
Concept cars suggest what future production
models might look like Auto executives said last week at the Geneva
International Motor Show that some elements
of autonomous driving could begin being
introduced around the end of this decade.

VERIZON TO PAY $ 1.4M IN 'SUPERCOOKIE' FCC SETTLEMENT

Verizon will pay a $1.35 million fine over its “supercookie” that the government said followed phone customers on the Internet without their permission. Verizon will also have to get an explicit “yes” from customers for some kinds of tracking. The supercookies landed their name because they were hard, or near-impossible, to block. Verizon uses them to deliver targeted ads to cellphone customers. The company wants to expand its advertising and media business and bought AOL for its digital ad technology in 2015. The Federal Communications Commission said Monday that it found that Verizon began using the supercookies with consumers in December 2012, but didn’t disclose the program until October 2014. Verizon updated its privacy policy to disclose the trackers in March 2015 and gave people an option then to opt out. The FCC settlement says consumers now must opt in to letting Verizon share data with a third party. But for data-collection and sharing within Verizon itself, the company can choose to have customers either opt in or automatically do it and give consumers the option to stop it, a less stringent requirement.
The New York company has already changed some practices that critics considered most invasive. In an emailed statement, the company said that the FCC settlement recognizes that it had already made adjustments to its ad programs that give consumers more choices. Nate Cardozo, a staff attorney at the Electronic Frontier Foundation, a privacy watchdog that had been critical of the supercookies, said the settlement was an “unqualified win” for consumers. “Today’s order will mean that other companies contemplating similar involuntary tracking will think twice before proceeding without explicit consumer consent,” he wrote in an email.
Saturday, 9 July 2016
RUBICON PROJECT CARVES OUT PROFITABLE NICHE IN DIGITAL ADS
You may not be familiar with the Rubicon
Project, but chances are its technology helped
pick some of the ads you might have seen on
your phone or personal computer. Rubicon serves as a matchmaker between
digital publishers trying to sell ads and
marketers looking for the best place to
promote their products and services. The Los
Angeles company, though small, has been
increasing its influence in the $170 billion
digital advertising market. More than 1,500 publishers and tens of
thousands of advertisers rely on Rubicon to figure out which marketing messages are best
suited to the different audiences that gravitate
toward certain websites and apps. The company
says it processes 7 trillion requests per month
using about 60,000 different algorithms. Last year, Rubicon managed more than $1
billion in ad spending. That’s a paltry amount
compared to market leaders Google and
Facebook, which last year sold a combined $87
billion in advertising. But its exchange for mobile
ads ranks as the third largest behind those of
Google and Twitter. The 8-year-old company recently posted its
rst full-year pro t, helping to lift its stock back
above its April 2014 initial public offering price
of $15. The shares ended recently were trading
between $17 and $18. Gregory Raifman, Rubicon’s president, recently
discussed the state of the digital ad market with
The Associated Press. The interview has been
edited for clarity and length. Q: Rubicon Project’s revenue nearly doubled last
year to $248.5 million. What is driving that? A: We provide a comprehensive solution for
buyers and sellers. Google and Facebook
operate in their own walled gardens. We are
the only one that operates in an open Web
environment. We are now reaching well over 1 billion users. So if you are an advertiser that
wants to reach an audience at scale across
mobile, desktop and video, then you have to be
working with Rubicon Project.

Q:How are you able to figure out which ads are
most likely to appeal to specific audiences?
A: The biggest brands in the world have data
about what their consumers want. Publishers
have other data on why users come to their site.
Our job is to match the data of the buyer with
the data of the seller in a way that creates the
best environment at the best price.
Q: We are seeing more ways to block digital
ads from appearing on screens. How does that
a ect Rubicon?
A: From our perspective, ad blocking is an
opportunity. Good advertising follows good
content. If you are working with really good
content providers, you are typically going to find better and better advertising. Consumers
will typically react well to quality advertising.
They will react poorly to low-end advertising.
Q: Any thoughts on where the industry
is heading?
A: There are not that many that can say their
industry is growing as quickly as ours. We feel
like Rubicon Project is playing a central role. I
often joke that this industry changes so rapidly
that in three years you could build a whole new
company out of your existing company.
CHINA LOOKS TO RUMP UP INTERNET GROWTH, AND ITS CONTROLS

China's government has highlighted big data,
encryption technology and “core technologies”
such as semiconductors as the key elements of its push to grow into a tech powerhouse,
according to a new five-year plan released Saturday that envisages the Internet as a major
source of growth as well as a potential risk. Even as it highlighted the need to improve
Internet infrastructure to rural areas and unlock
the digital economy’s potential, Chinese
economic planners called for a more secure and
better managed Web, with enhanced Internet
control systems, Internet security laws and real-
name registration policies. Chinese officials including Internet czar Lu Wei have played down concerns over what
critics have described as China’s expanding
Web censorship, saying that it is the Chinese
government’s sovereign prerogative and a
necessary measure to maintain domestic order. China’s development plan calls for a better
cybersecurity approval system and more
“precise” Web management to “clean up illegal
and bad information.” The plan also calls for a multilateral, democratic,
transparent and international governance
system and active participation in international
Internet governance efforts. Premier Li Keqiang highlighted the promise of the Internet, saying Saturday that various
traditional sectors, ranging from manufacturing
to government to health care, need to connect
to the Web and raise their e ciency as part of an overarching national strategy called
“Internet Plus.” He vowed to raise research and technology spending to account for 2.5
percent of gross domestic product in the five
years through 2020, which he said would mark
a “remarkable achievement.” The five-year plan calls for all families in large cities to have access to 100 megabyte-
per-second Internet service and broadband
coverage reaching 98 percent of the population
in incorporated villages. At the same time, Chinese leaders, wary of over-
relying on foreign technology, will seek to boost
China’s homegrown industry and cut down on
imports - a strategy that has drawn complaints
from trade partners like the United States. Similar to previous years, when Chinese leaders
highlighted industries such as e-commerce as a growth focus, the new draft of China’s
development plan specifically elevated big
data and cloud computing, relatively new and
promising fields that Chinese industry experts
view as not yet cornered by U.S. companies that
dominate other parts of the technology market. The plan also calls for China to catch up on
“core” technologies such as semiconductors and
basic computer parts and software, as well as
encryption technology. China’s campaign to beef up its chip
technology has encountered political
resistance from the United States. China’s
national chip champion, Tsinghua Unigroup,
said last month that it would abandon its
attempt to acquire a stake in California data
storage rm Western Digital, the second deal
it has scrapped because of opposition from
U.S. regulators who do not want sensitive
technology to fall into Chinese hands.
Subscribe to:
Posts (Atom)