Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Monday, June 27, 2016

Google is Watching YOU and all you do!

This month, at age 77, I acquired my very first kick-scooter. Granddaughter Michaela used my smartphone to take a series of photos as I rode past her, so I could post one to Facebook, which I did.

(THANKS for doing a really great job, Michaela!)

Well, a week later, Google informed me they had noticed a series of photos in my camera roll and, without asking, had assembled them into a .gif file "movie"! (Image at right.)

GOOGLE IS WATCHING YOU!

So, that is the story of how Google is looking at all my smartphone photos (and probably yours as well), analyzing them to find a closely timed series, and, unbidden, automatically creating a .gif file.

WOW!

Don't get me wrong, I'm pleased to get this particular sequence. However, if Google is analyzing ALL my photos, and yours and those of all Google subscribers as well, isn't that some kind of massive violation of "privacy"?

Presumably, if we or anyone else has been "tagged" in any photo, they may recognize who happens to be in any photo, even if we inadvertently happen to be in the background of anyone's photo!

In addition to photos,  whenever we use our smartphones or tablets or laptops for any purpose, they know what website we viewed, what information we searched for, with whom we communicated, what we wrote, and when and where we were when we did so.

If they are similarly monitoring all other Google subscribers, they can easily figure out who we were with and when and where.

Many years ago, I concluded we had absolutely no "privacy" when it came to our use of networked computers, and I vowed never to type anything into a PC that I would not mind appearing on the front page of a newspaper or featured on TV. Indeed, I realized, whenever I used my credit card I was creating a computer record of when and where I was, and what I was doing. Whenever I use my RFID or barcode gate pass to enter a garage or other location, I create a computer record.

None of us who have cars, cellphones, credit cards, jobs, homes, or any modern electronic conveniences have any "privacy" anymore. We have got to get over it! (The only person who has any "privacy" is the neer-do-well who stole your car and credit card and is buying beer and gas on your account. :^)

Now, with computer-connected computers virtually everywhere; monitoring traffic, checking for shoplifters and thieves in stores; virtually nothing happens without being recorded, in color and surprisingly high definition.

YOU TUBE IS CRITIQUING YOUR VIDEOS!

Several years ago I was kayaking at Rainbow Springs State Park (FL) and my friend Warren got some great video of me using my water gun to douse our British friend Dee, and then Dee kayaking into a restricted swimming area.

I edited the video down to a minute and a quarter and posted it to my You Tube account.

Well, You Tube, apparently automatically, noticed the image was bobbing up and down and rolling from side to side (because Warren was in a bobbing and rolling kayak :^). So, they asked if I wanted them to stabilize the image, and they did!

Here it is inn amazingly stabilized form for your enjoyment and amazement.


Ira Glickstein

Thursday, July 4, 2013

IRS and NSA Controversies

In recent months, the Obama administration has been plagued by several serious controversies, chief among them:
  • Charges of political profiling by the Internal Revenue Service (IRS) in delaying the approval of tax exemption under § 501 (c)(4) to some "patriotic" organizations, and

  • Large-scale domestic snooping by the National Security Agency (NSA) according to Top Secret documents leaked by Edward Snowden.
You may download my PowerPoint presentation (Philosophy Club, The Villages, FL, 5 July 2013) here: https://sites.google.com/site/bigira/philosophy-related-pps/Philo%20IRS%20NSA%20July%202013.pptx?attredirects=0&d=1

IRS POLITICAL PROFILING CONTROVERSY

According to the May 2013 report by the US Treasury Department Inspector General (IG) for Tax Administration (.pdf available here: http://www.washingtonpost.com/blogs/wonkblog/files/2013/05/201310053fr-revised-redacted-1.pdf ), starting in 2010 and continuing through 2012 and two election cycles, "inappropriate criteria were used to identify tax-exempt applications for review".

The IG Report identified some specific inappropriate criteria including "Patriots", "Tea Party", "Issues include government spending, government debt or taxes", "Education of the public by advocacy/lobbying 'to make America a better place to live'", and "Statement in the case file criticize how the country is being run". [exact quotes, including grammatical errors]

The result was that some applications submitted by Liberal groups were approved for § 501 (c)(4) while otherwise identical applications by Conservative groups were forwarded to a team of "specialists" and thus delayed for years.

According to the IG Report:
Organizations that applied for tax-exempt status and had their applications forwarded to the team
of specialists experienced substantial delays. As of December 17, 2012, many organizations had
not received an approval or denial letter for more than two years
after they submitted their

applications. Some cases have been open during two election cycles (2010 and 2012). [my bold]

On 13 May 2013, a day before the IG Report was issued, President Obama stated that the practice was "Outrageous, if true."

The next day, when it was clear that the charges were indeed true, Obama followed up stating:
"The IRS must apply the law in a fair and impartial way, and its employees must act with utmost integrity.
“This report shows that some [IRS] employees failed that test. I’ve directed Secretary Lew to hold those responsible for these failures accountable, … so that such conduct never happens again.
“But regardless of how this conduct was allowed to take place, the bottom line is, it was wrong."
The IG Report included a detailed list of some of the "unnecessary" questions asked of targeted organizations by the "specialists" to delay approval.
1 Requests the names of donors. 2 Requests a list of all issues that are important to the organization and asks that the organization indicate its position regarding such issues. 3 Requests 1) the roles and activities of the audience and participants other than members in the activity and 2) the type of conversations and discussions members and participants had during the activity. 4 Asks whether the officer, director, etc., has run or will run for public office. 5 Requests the political affiliation of the officer, director, speakers, candidates supported, etc., or otherwise refers to the relationship with identified political party–related organizations. 6 Requests information regarding employment, other than for the organization, including hours worked. 7 Requests information regarding activities of another organization – not just the relationship of the other organization to the applicant.
Were "Progressive" Organizations also Targeted?

The Democrats on the House Ways and Means Committee published what they said was evidence that "progressive" groups were also targeted (.pdf available here: http://democrats.waysandmeans.house.gov/sites/democrats.waysandmeans.house.gov/files/November%202010%20BOLO%20IRS0000001349-IRS0000001364.pdf).

Indeed, the term "Progressive" does appear on a spreadsheet utilized by the IRS reviewers, however, that line of the spreadsheet applies only to § 501 (c)(3) applications, which are very different from the 501 (c)(4) applications that are the main object of the IRS political profiling controversy.

As the IG Report makes clear, § 501 (c)(3) organizations may NOT "engage in political campaign intervention" while § 501 (c)(4) groups may do so up to 40% of their activities. Another difference is that contributions to § 501 (c)(3) groups ARE tax deductible by the donors while § 501 (c)(4) are NOT tax deductible by the donors.

The House Ways and Means Democrats include one example of a "Tea Party" group that appears on an IRS spreadsheet, but careful observation shows that that line applies to BOTH § 501 (c)(3) and § 501 (c)(4) groups. It should be obvious that tax exemption should not be allowed for donors for any "political campaign intervention", whether Liberal or Conservative.

Thus, there is no evidence that "Progressive" groups were subjected to any profiling related to § 501 (c)(4), while it is clear, even from the IRS spreadsheet example published by the Democrats, that such profiling was inappropriately applied to Conservative groups.

Should ANY "Political" Organizations Enjoy BOTH Tax-Exemption AND Anonymity for their Donors?

In reviewing this controversy, I wondered why the IRS allows MAJOR DONORS to make ANONYMOUS contributions to ANY tax-exempt organization that engages in any form of "political campaign intervention" (be it Liberal or Conservative) .

Well, it turns out that this strange rule dates from the 1958 Supreme Court decision regarding the NAACP vs Alabama (see http://en.wikipedia.org/wiki/NAACP_v._Alabama) where the Supremes ruled that disclosure of names could render private donors vulnerable to retaliation.

OK, if that is the Law of the Land, so be it, but it should be applied EQUALLY to both Liberal and Conservative groups. Don't you think?

In this case, IRS political profiling, targeting Conservative groups, over two election cycles (2010 and 2012), has almost certainly resulted in a net benefit for Liberal organizations in terms of fund-raising, because some donors will justifiably hesitate to contribute to any organization that has not been approved by the IRS for tax-exempt status.

Has this affected election results at the National level (House, Senate, Presidency), and/or local levels (Governors, State Legislators, etc.)? No one will ever know for sure, but I would think at least some close elections could have gone the other way absent IRS targeting of Conservative "political campaign intervention" groups.

NSA SNOOPING CONTROVERSY

Which brings us to the second part of this (admittedly long) topic posting.

The reason I have linked the IRS and NSA controversies should be painfully obvious:

If any Administration, whether Democrat or Republican, misuses an agency of the government for political profiling purposes, as the Democrats have clearly misused the IRS for two election cycles, how can we trust them not to similarly misuse the awesome snooping powers we now know have been entrusted to the NSA ?

We all know that Edward Snowden, an employee of an NSA contractor, went to Hong Kong (controlled by China) and released several TOP SECRET documents revealing that the NSA has engaged in large-scale domestic snooping. There is no doubt that all TOP SECRET materials contained on the laptop computers and other computer media he had with him have been downloaded by the Chinese and are now in their possession. Snowden subsequently went to Russia, and has been there long enough for the Russians to have downloaded all material he had with him. Also, there is no doubt that both the Chinese and Russians have interrogated Snowden thoroughly and extracted the critical TOP SECRET NSA information that he possessed.  

After the NSA leak was made public by Snowden, President Obama assured the American public:
“… nobody is listening to your telephone calls… 
“… you can't have 100 percent security, and also then have 100 percent privacy and zero inconvenience. We're going to have to make some choices as a society… 
"I don't welcome leaks … There's a reason these programs are classified." [my bold and italic]

Please note that I have bolded the President's word "Nobody". Does that mean no person is listening to our telephone calls (and that no person is reading our emails and other computer communications)?


For example, what if some automatic computer program was listening to our telephone calls (and emails) and searching for some combinations of words that might indicate criminal or terroristic intent? And, only if and when the computer program discovered some suspicious messages and identified the people involved, then the NSA went to the FISA court to get a warrant to have some person listen to phone calls (and emails) to and from the identified persons?

I have also bolded and italicized the word "is". As President Bill Clinton famously observed, "It depends upon what the meaning of the word 'is' is."

Is Obama assuring us that nobody is listening to our phone calls (and emails) right now? What if our phone calls (and emails) are being automatically recorded and stored away by the NSA for future use if and when subsequent analysis reveals that they may relate to suspicious activities and then the NSA gets a FISA warrant to have some person listen to them?

That said, I agree with Obama that we cannot expect "100 percent privacy and zero inconvenience" and maintain reasonable security against criminal and terrorist attacks. Like him, given this difficult choice, I come down on the side of security.

What do we know about NSA snooping?

Started as early as 2006 (under G.W. Bush), continued through present (2008-2013 under Obama).

Key members of Senate and Congress are aware of classified details of NSA programs and exercise oversight. Judicial oversight is exercised by FISA court.

MetaData is being collected on virtually ALL domestic home phone and cellphone calls (at least the Calling number, Called number, Date, Time, Duration, …) Internet data (VoIP, Emails, Chat, Photos, Videos, Files, Stored Data [“cloud”], Logins, SPECIAL REQUESTS, …)

What do I suspect about NSA snooping?

I’ve worked on classified military projects, but never NSA projects or any projects related to surveillance or data mining, so I am free to “speculate” without revealing classified information.

Based on my knowledge of electronics and computers and the Internet and “artificial intelligence” I never type anything into my computer that I would not mind seeing on the front page of tomorrow’s newspaper or TV news!

For many years I have suspected that NSA (not to mention Google :^) has metadata on all Internet activity and phone calls and that they utilize advanced data mining algorithms to associate Phone numbers, Email addresses, Blogs, Social networks, and so on.

It is also likely they use “artificial intelligence” and “key word analysis” computer techniques to “gist” voice phone calls, looking for languages and word combinations that may indicate criminal or terrorist activities as well as semantic analysis to identify individual writing styles. It is also likely they similarly “gist” Emails, Blogs, Photos and other Internet data and use facial recognition, voice prints, and other biometrics to associate multi-modal communications with particular groups of people and individuals.

Bottom Line

I (along with Obama) am appalled that Edward Snowden violated his pledge to protect classified government documents. Internal government processes (and specialized lawyers) exist for reporting abuses. Snowden should have used these before going to China and before revealing these Top Secret activities to the press. (Hong Kong is an “autonomous” region under the control of China.) We should assume China and Russia have all Snowden’s NSA data.

I generally SUPPORT all the known and most of my suspected NSA snooping activities, assuming proper oversight. As I’ve stated in presentations to The Villages Philosophy Club and my Novel and Blogs, advocates of “privacy” are fighting a phony and lost battle. If you have a home and a job and a credit card and a cellphone and a car – in other words if you are a “respectable” citizen – YOU HAVE NO “PRIVACY”. (The only person with real privacy is the guy using your stolen credit card to buy stuff!)

However, the IRS scandal has increased my distrust of the government. I worry that POLITICALLY-motivated NSA employees may abuse Phone and Internet data for partisan purposes (as some IRS employees have done).

Get the PowerPoint Presentation!

If you'd like more technical background on the "six degrees of separation" between (virtually) any two people on Earth and on the issue of privacy in the Internet age, please download the PowerPoint presentation I gave to the Philosophy Club of The Villages, FL.

Please download that PowerPoint here: https://sites.google.com/site/bigira/philosophy-related-pps/Philo%20IRS%20NSA%20July%202013.pptx?attredirects=0&d=1,

Feel free to express your opinions on this issue by posting a Comment to this Blog.


advTHANKSance


Ira Glickstein 




 


Sunday, June 6, 2010

How to Dry Clean the Money-Launderers


LARGE CASH TRANSACTIONS ARE OFTEN CRIMINAL

In 2005, $90,000 in cash was found in Congressman William J. Jefferson's (D-LA) freezer, wrapped in foil and stored in a Boca-Burger box. When that news came out, I had two questions: 1) Are vegetarians trustworthy? (Boca-Burgers are vegetarian :^), and 2) Exactly who gave him that money and what did he intend to do with it?

The Serial Numbers on some of the money found in the freezer matched bills given to an FBI informant. Despite the evidence, and the serious charges, Jefferson was re-elected in 2006. He won the Democratic primary again in 2008, but was defeated by a Republican.

In 2009, Jefferson was convicted on several counts, including conspiring to bribe a Nigerian official to aid his business ventures in Africa. However, he got off on the actual bribery charge because the money, having been seized by the FBI, did not actually get to that foreign official. Based on FBI videotapes and other evidence, the $90,000 seized was but a fraction of the hundreds of thousands he solicited while a congressman and co-chair of the caucus on Nigeria and African trade.

Wouldn't it be interesting to know where that money came from? Indeed, would it not be great if we could trace at least some of the cash money seized from drug dealers and other criminals?

HOW TO TRACE CASH MONEY COST-EFFECTIVELY

A currency counter with counterfeit detection capability is shown above. Machines of this type, which cost less than $500, are routinely used by banks and companies that have to process large amounts of paper currency.

It would be relatively inexpensive to add the ability to read and record the Serial Number of each bill processed, and associate the numbers with the time, date, and location of the counting machine. Indeed, here is a Serial Number recording machine offered for sale to law-enforcement agencies.

If all regulated banks were required to add this capability to their currency counters and ATM machines, and if businesses that deal in cash were encouraged to do so as well, we would have a tidy record of the time and location of many of the bills involved in cash transactions. It would not take much more effort for the computers to also record the account numbers of the people who deposited or withdrew the cash and associate that information with the Serial Numbers as well.

The Serial Numbers on money seized in criminal investigations could be compared to the Serial Numbers on the bank and business records and that would provide the past date and location history of at least some of the bills in that bunch. If the record also included the account numbers of some of the people who handled that cash, that could help trace it and provide clues to the source of the money and perhaps the names of the individuals who would be persons of interest in the crime under investigation.

Ira Glickstein