Translate
GPA Store: Featured Products
Showing posts with label corporate takeover of internet. Show all posts
Showing posts with label corporate takeover of internet. Show all posts
Saturday, April 16, 2011
Wednesday, March 23, 2011
Strangling of the Free Internet Begins
Editor's Note: For additional details about what Matt Ryan correctly calls a "cocktail of attacks" on the free Internet, please read the series of articles by practicing attorney and Activist Post contributing writer, David Makarewicz.
Matt Ryan -- Infowars
AT&T’s pending acquisition of T-Mobile USA has the tech world buzzing with various pros and cons of what this merging would mean for the consumer. Among the pros are the possibility of having a single mobile standard (4G LTE) and a market where phones aren’t restricted to a single carrier. The cons include having less choice between carriers and rate plans, millions of customers suddenly being subject to a more restricted terms of service, and the loss of what T-Mobile customers considered to be a much better overall customer experience.
What’s more troubling, are recent announcements by AT&T to begin capping the monthly usage and impose overage fees on their DSL and U-Verse customers. These customers were originally given a promise of unlimited usage by AT&T only to find an essential mode of communication is now restricted. In a sense, AT&T is forcing their customers to buy in to their cable and phone service to defer the bandwidth used by their online competitors, Skype, Hulu, Netflix, and others.
![]() |
Dees Illustration |
AT&T’s pending acquisition of T-Mobile USA has the tech world buzzing with various pros and cons of what this merging would mean for the consumer. Among the pros are the possibility of having a single mobile standard (4G LTE) and a market where phones aren’t restricted to a single carrier. The cons include having less choice between carriers and rate plans, millions of customers suddenly being subject to a more restricted terms of service, and the loss of what T-Mobile customers considered to be a much better overall customer experience.
What’s more troubling, are recent announcements by AT&T to begin capping the monthly usage and impose overage fees on their DSL and U-Verse customers. These customers were originally given a promise of unlimited usage by AT&T only to find an essential mode of communication is now restricted. In a sense, AT&T is forcing their customers to buy in to their cable and phone service to defer the bandwidth used by their online competitors, Skype, Hulu, Netflix, and others.
Monday, March 21, 2011
Friday, November 26, 2010
Insurers use "Predictive Modeling", Spy on Internet Posts to Gauge Risks
Leslie Scism and Mark Maremont
Wall Street Journal
Life insurers are testing an intensely personal new use for the vast dossiers of data being amassed about Americans: predicting people's longevity.
Insurers have long used blood and urine tests to assess people's health—a costly process. Today, however, data-gathering companies have such extensive files on most U.S. consumers—online shopping details, catalog purchases, magazine subscriptions, leisure activities and information from social-networking sites—that some insurers are exploring whether data can reveal nearly as much about a person as a lab analysis of their bodily fluids.
In one of the biggest tests, the U.S. arm of British insurer Aviva PLC looked at 60,000 recent insurance applicants. It found that a new, "predictive modeling" system, based partly on consumer-marketing data, was "persuasive" in its ability to mimic traditional techniques.
The research heralds a remarkable expansion of the use of consumer-marketing data, which is traditionally used for advertising purposes.
This data increasingly is gathered online, often with consumers only vaguely aware that separate bits of information about them are being collected and collated in ways that can be surprisingly revealing. The growing trade in personal information is the subject of a Wall Street Journal investigation into online privacy.
Read Full Article
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
Wall Street Journal
Life insurers are testing an intensely personal new use for the vast dossiers of data being amassed about Americans: predicting people's longevity.
Insurers have long used blood and urine tests to assess people's health—a costly process. Today, however, data-gathering companies have such extensive files on most U.S. consumers—online shopping details, catalog purchases, magazine subscriptions, leisure activities and information from social-networking sites—that some insurers are exploring whether data can reveal nearly as much about a person as a lab analysis of their bodily fluids.
In one of the biggest tests, the U.S. arm of British insurer Aviva PLC looked at 60,000 recent insurance applicants. It found that a new, "predictive modeling" system, based partly on consumer-marketing data, was "persuasive" in its ability to mimic traditional techniques.
The research heralds a remarkable expansion of the use of consumer-marketing data, which is traditionally used for advertising purposes.
This data increasingly is gathered online, often with consumers only vaguely aware that separate bits of information about them are being collected and collated in ways that can be surprisingly revealing. The growing trade in personal information is the subject of a Wall Street Journal investigation into online privacy.
Read Full Article
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Monday, November 15, 2010
US Senate Bill S.3804 - Allows Government To Shutdown Whistleblower Websites
Just the other day, President Obama urged other countries to stop censoring the Internet. But now the United States Congress is trying to censor the Internet here at home. A new bill being debated this week would have the Attorney General create an Internet blacklist of sites that US Internet providers would be required to block. - The first vote is scheduled Thursday!
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Monday, November 1, 2010
More Government Idiocy: Internet Black Lists
Karl Denninger
Market Ticker
There's dumb - and then there's really dumb, predicated on people who simply don't understand what they're doing, and should be barred from authoring legislation until they consult with some people who do know what they're doing.
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
Market Ticker
There's dumb - and then there's really dumb, predicated on people who simply don't understand what they're doing, and should be barred from authoring legislation until they consult with some people who do know what they're doing.
The Combating Online Infringement and Counterfeits Act (COICA) was introduced just one week ago, but it's greased and ready to move, with a hearing in front of the Judiciary Committee this Thursday. If people don't speak out, US citizens could soon find themselves joining Iranians and Chinese in being blocked from accessing broad chunks of the public Internet.
Help us stop this bill in its tracks! Click here to sign our petition.
COICA creates two blacklists of Internet domain names. Courts could add sites to the first list; the Attorney General would have control over the second. Internet service providers and others (everyone from Comcast to PayPal to Google AdSense) would be required to block any domains on the first list. They would also receive immunity (and presumably the good favor of the government) if they block domains on the second list.
The lists are for sites "dedicated to infringing activity," but that's defined very broadly -- any domain name where counterfeit goods or copyrighted material are "central to the activity of the Internet site" could be blocked.Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Saturday, October 30, 2010
COICA kills free speech: Write to Sen. Leahy
Chris Pratt
COTO Report
Blacklisted domains and terminated websites are both possibilities if bill S.3804 becomes law. It is called “Combating Online Infringement and Counterfeits Act” (COICA) and it was introduced by Senator Patrick Leahy on September 20, 2010.
Hard to imagine that the same man who could say:
“I commend Secretary of State Clinton for reaffirming our nation’s deep commitment to openness and freedom of expression on the Internet. The Internet has become a vital tool to protect and ensure the rights and basic freedoms of Americans and the human rights of people everywhere.” Released by Leahy’s Office in January 2010
–or–
“Why did 9/11 happen on George Bush’s watch when he had clear warnings that it was going to happen?…. Had there been an independent congress, one that could ask questions, these questions would have been asked years ago. We’d be much better off…..” U.S. Senator Patrick Leahy — interview with Amy Goodman, 9/29/2006
is now proposing legislation that will allow the government to blacklist and close down websites engaged in “infringing activities.”
Although “infringing activities” are ill defined by this legislation, it appears that websites engaged primarily in copyright infringement are targets. Websites like mine and thousands of bloggers and documentarians who use the copyrighted material of others to develop their work could well be in Leahy’s cross hairs.
As a Citizen Journalist and a Citizen Filmmaker, I was so appalled by what I saw first under Republican rule and now under Democratic leadership that I produced a film, deceptions, with zero background and for less than $1,000. I then made this film available to the public on a website I created called DeceptionsUSA.com. Rady Ananda reviewed deceptions as a “brilliant clarion to save the Internet.”
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
COTO Report
Blacklisted domains and terminated websites are both possibilities if bill S.3804 becomes law. It is called “Combating Online Infringement and Counterfeits Act” (COICA) and it was introduced by Senator Patrick Leahy on September 20, 2010.
Hard to imagine that the same man who could say:
“I commend Secretary of State Clinton for reaffirming our nation’s deep commitment to openness and freedom of expression on the Internet. The Internet has become a vital tool to protect and ensure the rights and basic freedoms of Americans and the human rights of people everywhere.” Released by Leahy’s Office in January 2010
–or–
“Why did 9/11 happen on George Bush’s watch when he had clear warnings that it was going to happen?…. Had there been an independent congress, one that could ask questions, these questions would have been asked years ago. We’d be much better off…..” U.S. Senator Patrick Leahy — interview with Amy Goodman, 9/29/2006
is now proposing legislation that will allow the government to blacklist and close down websites engaged in “infringing activities.”
Although “infringing activities” are ill defined by this legislation, it appears that websites engaged primarily in copyright infringement are targets. Websites like mine and thousands of bloggers and documentarians who use the copyrighted material of others to develop their work could well be in Leahy’s cross hairs.
As a Citizen Journalist and a Citizen Filmmaker, I was so appalled by what I saw first under Republican rule and now under Democratic leadership that I produced a film, deceptions, with zero background and for less than $1,000. I then made this film available to the public on a website I created called DeceptionsUSA.com. Rady Ananda reviewed deceptions as a “brilliant clarion to save the Internet.”
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Monday, October 11, 2010
New Class of Malware Will Steal Behavioral Patterns
Computer scientists predict that a new generation of malware will mine social networks for people's private patterns of behavior.
Technology Review
It's not hard to find frightening examples of malware which steals personal information, sometimes for the purpose of making it public and at other times for profit. Details such as names, addresses and emails are hugely valuable for companies wanting to market their wares.
But there is another class of information associated with networks that is potentially much more valuable: the pattern of links between individuals and their behavior in the network--how often they email or call each other, how information spreads between them and so on.
Why is this more valuable? An email address associated with an individual who is at the hub of a vibrant social network is clearly more valuable to a marketing company than an email address at the edge of the network. Patterns of contact can also reveal how people are linked, whether they are in a relationship for example, whether they are students or executives, or whether they prefer celebrity gossip to tech news.
This information would allow a determined attacker to build a remarkably detailed picture of the lifestyle of any individual, a picture that would be far more useful than the basic demographic information that marketeers use today that consists of little more than sex, age and social grouping.
Today, Yaniv Altshuler at Ben Gurion University and a few pals argue that the value of this data makes it almost inevitable that malicious attackers will attempt to steal it. They point out that many companies already mine the pattern of links in their data for things like recommender systems.
"There is no reason to think that developers of malicious applications will not implement the same method and algorithms into future malware, or that they have not already started doing so," they say.
The idea would be to release some kind of malware that records the patterns of links in a network. This kind of malware will be very hard to detect, say Altshuler and co. They've studied the strategies that best mine behavioral pattern data from a real mobile phone network consisting of 800,000 links between 200,000 phones. (They call this type of attack "Stealing Reality".)
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
Technology Review
It's not hard to find frightening examples of malware which steals personal information, sometimes for the purpose of making it public and at other times for profit. Details such as names, addresses and emails are hugely valuable for companies wanting to market their wares.
But there is another class of information associated with networks that is potentially much more valuable: the pattern of links between individuals and their behavior in the network--how often they email or call each other, how information spreads between them and so on.
Why is this more valuable? An email address associated with an individual who is at the hub of a vibrant social network is clearly more valuable to a marketing company than an email address at the edge of the network. Patterns of contact can also reveal how people are linked, whether they are in a relationship for example, whether they are students or executives, or whether they prefer celebrity gossip to tech news.
This information would allow a determined attacker to build a remarkably detailed picture of the lifestyle of any individual, a picture that would be far more useful than the basic demographic information that marketeers use today that consists of little more than sex, age and social grouping.
Today, Yaniv Altshuler at Ben Gurion University and a few pals argue that the value of this data makes it almost inevitable that malicious attackers will attempt to steal it. They point out that many companies already mine the pattern of links in their data for things like recommender systems.
"There is no reason to think that developers of malicious applications will not implement the same method and algorithms into future malware, or that they have not already started doing so," they say.
The idea would be to release some kind of malware that records the patterns of links in a network. This kind of malware will be very hard to detect, say Altshuler and co. They've studied the strategies that best mine behavioral pattern data from a real mobile phone network consisting of 800,000 links between 200,000 phones. (They call this type of attack "Stealing Reality".)
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Thursday, October 7, 2010
Microsoft proposes public health approach to internet infections: Only vaccinated computers can get online
Byron Acohido
USA Today
Microsoft has proposed a bold new Internet security model based on the principles used to preserve public health on a global basis.
Scott Charney, corporate vice president of trustworthy computing at Microsoft, unveiled the software giant'sCollective Defense proposal on Tuesday during his keynote at theInformation Security Solutions Europe(ISSE) conference in Berlin.
Charney urged government and tech industry officials to act collectively to protect citizens and critical infrastructure from growing cyberthreats. He compared unprotected and infected computers to unvaccinated and contagious individuals. Both, he said, can pose a threat to society.
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
USA Today
Microsoft has proposed a bold new Internet security model based on the principles used to preserve public health on a global basis.
Scott Charney, corporate vice president of trustworthy computing at Microsoft, unveiled the software giant'sCollective Defense proposal on Tuesday during his keynote at theInformation Security Solutions Europe(ISSE) conference in Berlin.
Charney urged government and tech industry officials to act collectively to protect citizens and critical infrastructure from growing cyberthreats. He compared unprotected and infected computers to unvaccinated and contagious individuals. Both, he said, can pose a threat to society.
Read Full Article
RELATED ARTICLE:
Age of Censorship and Internet Trade Wars
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Subscribe to:
Posts (Atom)