Seven Years Ago, CERN Gave Open Access A Huge Boost; Now It's Doing The Same For Open Data
from the tim-berners-lee-would-be-proud dept
Techdirt readers will be very familiar with CERN, the European Council for Nuclear Research (the acronym comes from the French version: Conseil Européen pour la Recherche Nucléaire). It's best known for two things: being the birthplace of the World Wide Web, and home to the Large Hadron Collider (LHC), the world's largest and most powerful particle accelerator. Over 12,000 scientists of 110 nationalities, from institutes in more than 70 countries, work at CERN. Between them, they produce a huge quantity of scientific papers. That made CERN's decision in 2013 to release nearly all of its published articles as open access one of the most important milestones in the field of academic publishing. Since 2014, CERN has published 40,000 open access articles. But as Techdirt has noted, open access is just the start. As well as the final reports on academic work, what is also needed is the underlying data. Making that data freely available allows others to check the analysis, and to use it for further investigation -- for example, by combining it with data from elsewhere. The push for open data has been underway for a while, and has just received a big boost from CERN:
Follow me @glynmoody on Twitter, Diaspora, or Mastodon.
Filed Under: experiments, knowledge, open access, open data, science, sharing
Companies: cern
-----------------------------------------------------------------------------------------------------------------------------
Obscure Analytics Tool Helps Cops Make Sense Of All That Location Data They're Grabbing Without A Warrant
from the flying-under-the-radar-love dept
FOIA requests, leaked documents, data breaches, Congressional testimony… all of these have led to the outing of cellphone surveillance tech utilized by law enforcement. As far back as 2014, Chris Soghoian -- former ACLU "technologist" and current Senator Wyden advisor -- was telling cops their "secret" Stingray devices weren't all that secret anymore.
But the market for tracking people via their cellphones remains uncornered. For the most part, Stingrays (cell tower spoofers) need warrants to operate. The same goes for demanding weeks or months of historical cell site location data from service providers.
The courts may be deciding there's a bit more Fourth Amendment to go around these days, but cops seem to be deciding there's more Fourth than ever that should be avoided. New tools, toys, and tactics are in play. "Reverse warrants" contain the word "warrant," but they demand info on every cellphone user in a certain area at a certain time, flipping probable cause on its head. Data brokers collecting location data from apps sell access to law enforcement agencies, allowing them to engage in tracking that would be unconstitutional if it involved cell service providers.
There's a lot of data flowing towards law enforcement agencies. But it's useless if it can't be analyzed. That's where a little known company steps in, giving cops a way to wrangle all that subpoenaed data into something actionable. The Intercept's Sam Richards has the details. . .
Hawk Analytics is smart. It's built for the long run. Even if courts find mass collections of location data worthy of Fourth Amendment protections, cops will still be looking for someone to help them parse all the data they've obtained. Third-party data brokers may see their fortunes fall, but CellHawk will still be there to analyze the output of those that survive.
Filed Under: 4th amendment, analytics, cellhawk, law enforcement, location data, police, private data
Companies: hawk analytics
Judge Refuses To Extradite Julian Assange, Citing US Prison Conditions & Assange's Mental Health
from the a-slight-win-for-journalism dept
Even if you think that Julian Assange conspired against the US with the help of Russia, as some allege, you should still be extremely concerned about the US's prosecution of him. As we've explained, the details in the indictment would criminalize many activities that journalists do every single day. It would be a massive expansion of how the Espionage Act was interpreted and would try to blame him for hacking he had nothing to do with.
So, at least for now, it's good to see that a UK court has refused to extradite Assange to the US. The reasons have little to do with the sketchiness of the underlying case, but rather is a condemnation of US prison conditions. The judge notes that in Assange's current mental state, he'd likely end up killing himself if placed in the US prison system, but rejected the claims from Assange that the prosecution is politically motivated, and therefore invalid. . .
I agree that it's good that the extradition attempt has failed for now, but I'm extremely worried about the judge rejecting the free speech/journalism/political attack arguments. Again, much of what Assange did -- even if you disagree with it or think it was done under the auspices of a foreign country -- should not be considered criminal. The descriptions in the indictment could easily apply to tons of journalists, both in the US and abroad.
Whether or not Assange is a horrible person is unrelated to the legal principles at stake. The entire case appears to be a politically motivated attack on publishing embarrassing documents, and that should raise significant 1st Amendment questions.
Filed Under: 1st amendment, espionage act, extradition, free speech, journalism, julian assange, uk, us
Malware Merchant NSO Group Caught Leaving Harvested Location Data Exposed
from the oh-well-'little-people'-aren't-the-end-users-so-who-cares dept
Israeli surveillance tech firm NSO Group is something else. (Pejorative, yo.) It set up shop in a contested country where it's not all that paranoid to say everyone is out to get them. (But it's still a little paranoid, if not a lot racist.) That being said, Israel doesn't have a lot of nearby allies. And its ongoing conflict with Palestine hasn't made it any new friends.
You'd think a government contractor operating out of this space would be more judicious with its sales efforts. But finding new customers seems to be more important to NSO Group than defending its own country against attacks. NSO has sold its pervasive surveillance products -- ones that leverage popular messaging apps to create spy-holes in end-to-end encryption -- to anyone who wants them, including those that would turn these tools against Israeli citizens, journalists, and activists.
NSO has enabled a global war on dissent and criticism. It's not the only company that takes a hands-off approach to sales -- justifying the money in its pocket with claims it's nothing more than an exploit-hawking middleman. This has earned it some justifiable disdain. It has also earned it lawsuits, including one filed by a company too big to ignore: Facebook.
Multiple governments have purchased exploits from NSO, resulting in a worldwide war on journalists and activists. This makes NSO richer. But it doesn't make the company any smarter. NSO and Israel briefly joined forces to engage in domestic surveillance, utilizing NSO's malware to facilitate COVID contact tracing -- an effort swiftly blocked by an Israeli court. . .
NSO may be trying to rehabilitate its image by offering its considerable surveillance power to the fight against COVID, but its efforts show it's really still just in the business of collecting everything it can while expanding its user base to whoever's willing to buy -- even if it includes foreign enemies.
A failure to secure a database -- even if it's only filled with "trial" data -- is a monumental self-own. This indicates NSO isn't nearly as careful as it should be, considering the wealth of data/communications it helps government agencies siphon from targets' devices. When millions of people around the world are just grist for the surveillance mill, it rarely seems imperative to protect the data you've harvested from them. The only thing that matters to NSO is surveillance and the profit made. Collateral damage doesn't affect its bottom line -- not when there's a host of human rights violators lining up to buy your goods.
Filed Under: data breach, exploits, hacking, location data, security, surveillance
Companies: nso group
60 Minutes Episode Is Pure Misleading Moral Panic About Section 230; Blames Unrelated Issues On It
from the oh-come-on dept
I have a browser open with about a dozen different bad and wrong takes on Section 230 that one day I may write about, but on Sunday night, 60 Minutes jumped to the head of the line with an utterly ridiculous moral panic filled with false information on Section 230. The only saving grace of the program was that at least they spoke with Jeff Kosseff, author of the book on Section 230 (which is an excellent read). However, you can tell from the way they used Jeff that someone in the editorial meeting decided "huh, we should probably find someone to be the "other" side of this debate, so we can pretend we're even-handed" and then sprinkled in Jeff to explain the basics of the law (which they would then ignore in the rest of the report).
It's almost difficult to describe just how bad the 60 Minutes segment is. It is, quite simply, blatant disinformation. I guess somewhat ironically, much of the attack on 230 talks about how that law is responsible for disinformation. Which is not true. Other than, perhaps, this very report that is itself pure disinformation.
What's most astounding about the piece is that almost everything it discusses has nothing to do with Section 230. As with so many 230 stories, 60 Minutes producers actually seem upset about the 1st Amendment and various failures by law enforcement. And somehow... that's the fault of Section 230. It's somewhat insane to see a news organization like 60 Minutes basically go on an all-out assault on the 1st Amendment. . .
No comments:
Post a Comment