industryterm:social media site

  • Neo-Nazis on DeviantArt Radicalized a Woman Who Planned a Mass Shooting - VICE
    https://www.vice.com/en_us/article/zmp5y3/neo-nazis-on-deviantart-radicalized-a-woman-who-planned-a-mass-shooting

    DeviantArt, founded in 2000, is home to millions of users and hundreds of millions of pieces of art. It’s offered a home for marginalized artists and communities to create and share work. If you can visualize it, odds are DeviantArt has it.

    But like many large social media platforms, there exists a small but thriving hive of extremists on DeviantArt, similar to the ones Souvannarath came across. These extremists have created a network of far-right user groups where they create and share far-right propaganda, talk and write about fascism, and recruit vulnerable users.

    The far-right propaganda posted on DeviantArt is then disseminated across the web, which experts say works as a gateway drug to recruitment to neo-Nazi groups.

    Jeremy Blackburn, a professor at the University of Alabama at Birmingham, studies memes and the online spaces of the far-right. Blackburn said that in the far-right ecosystem like 4Chan’s /pol/ board or Gab, images like the ones created and stored on DeviantArt are immensely important.

    "Essentially what is happening is that people’s brains are being hacked, especially in terms of imagery—it’s very digestible, it’s super-duper easy to share,” said Blackburn. “It takes like 15 to 20 seconds, at most, to look at a meme and that’s where I think the danger is. You can become inundated with them and basically read the equivalent of reams of propaganda.”

    When VICE provided spokespeople for DeviantArt with evidence of neo-Nazi content on the site, they referenced the site’s commitment to freedom of artistic expression and its zero tolerance policy for “hate propaganda.”

    “As an art-centric social network, the DeviantArt community has traditionally been allowed a wide range of expression both in comments and in artistic themes,” spokespeople said in an emailed statement. “This is important for a site that aims to represent all artists. However, we draw a hard line when it comes to hate speech that aims to purposely cause pain to others in a hateful way. DeviantArt’s Etiquette Policy clearly states that ‘hate propaganda is met with zero tolerance.’”

    eviantArt was founded at the turn of the millennium by three friends. In 2017, the site was bought by the web development company Wix for $36 million. At the time of purchase, Techcrunch reported that the site had over 40 million members and over 325 million pieces of individual art online.

    While the vast majority of the site is innocuous, if you stumble across the wrong keyword, the website will feed you content ranging from graphic art of neo-Nazis gunning people down to Hitler drawn as an anime girl.

    Fascist groups on DeviantArt have hundreds of members and hundreds of thousands of views. All of the pages are pretty similar, but have a flavour that couldn’t be found anywhere but DeviantArt.

    “We are a group of Fascist, National Socialists, Phalangist, Intergalists, Civic Nationalists, and others who also happen to like anime,” reads the description of one page called Fascist Anime. “The main purpose of the group is to combine fascist propaganda with anime, usually with cute anime girls. Why? Because the internet needed something like this!”

    Souvannarath’s case is one amplified to an extreme degree, but it is an outsized reflection of the way the content economy works. DeviantArt has long been a core source of artwork that powers the rest of the internet’s image and meme-based economy, with original work from DeviantArt spreading throughout the message boards and the rest of the social web. So it goes with DeviantArt’s fascist repositories, with images first posted there later spreading among white supremacist groups on Twitter, Gab, 4Chan, and Reddit.

    Non-hierarchical, but predictable, behaviour from neo-Nazi propagandists is exactly what Blackburn found when researching 4Chan. There, he found that the best art or memes would be curated and shared through a pipeline by power users to other social media sites.

    One propagandist, who goes by the alias “Dark Foreigner” and has been connected to Atomwaffen and its sister groups, has been uploading his propaganda to DeviantArt and cross-linking it to his other accounts for over a year. Dark Foreigner uses the automated DeviantArt system to sell his prints for $4.79 USD a pop. DeviantArt controls the prints section of its website and takes upwards of an 80 percent cut, meaning that if someone buys neo-Nazi propaganda on DeviantArt, the company not only ships it to them, but makes a profit.

    VICE asked DeviantArt questions regarding Dark Foreigner’s business selling propaganda but did not receive any responses. His work remains for sale on the website.

    #Faschosphère #DeviantArt #Wix #Economie_numérique

  • Hacking #instagram: How Vince Van Meer Grew A #fashion Influencer Empire
    https://hackernoon.com/hacking-instagram-how-vince-van-meer-grew-a-fashion-influencer-empire-e6

    A picture of Vince Van MeerLet’s face it, if you are trying to grow a brand today, then Instagram is a must. No other social media site has a combination of aesthetics, reach, and positive perception as Instagram does (it has even escaped its parent company Facebook’s PR disaster over the past year). You could find all the negatives that you want about social media like how it is addicting and how we compare ourselves too much on it, but the matter of fact is that we are on it and it has become intertwined with our real lives much more than people want to give credit for.From this, a new class of young entrepreneurs has risen to take advantage of this new cyber landscape of business opportunities. One of them is the 23-year-old Dutchman Vince Van Meer who at one point had six different (...)

    #hacking-instagram #instagram-hack #social-media

  • What is #hacking? Common Objectives, Types, and How to Guard Against It
    https://hackernoon.com/what-is-hacking-common-objectives-types-and-how-to-guard-against-it-ab99

    Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Cracking is the term which specifies the method by which the password or code is obtained. The person who undertakes hacking is known as the hacker. The hacking can be done on single systems, a group of systems, an entire LAN network, a website or a social media site or an email account. The access to a password is obtained by the hacker through password cracking algorithms programs.It goes without saying that most of the individuals, as well as business associations, use computers and laptops for all their daily needs. Especially for organizations (of any form), it is essential to have a (...)

    #types-of-hacker #hacking-techniques #cybersecurity #cybercrime

  • Long untouchable, web giants now know what it feels like to be hunted
    https://www.theguardian.com/commentisfree/2019/feb/10/long-untouchable-web-giants-know-now-what-it-feels-like-to-be-hunted

    Governments, after years of indulgence, are rightly getting tough on social media sites The key question to ask when a shocking tragedy comes to light is this : does it signify a scandal or a crisis ? Scandals happen all the time in societies. They generate a lot of heat, outrage and public angst. But, eventually, the media caravan moves on and nothing much changes. When in 2011, for example, the Guardian printed shocking revelations of tabloid phone-hacking and, particularly, the news (...)

    #Google #Facebook #algorithme #manipulation #domination #écoutes #publicité #hacking (...)

    ##publicité ##profiling
    https://i.guim.co.uk/img/media/931d280d109339807c379f206489366f130862c4/0_343_3500_2100/master/3500.jpg

  • When Was the Las Time You Googled Yourself?
    https://hackernoon.com/when-was-the-las-time-you-googled-yourself-828f024f0a55?source=rss----3a

    By 2025, the world will create 163 zettabytes of data — nearly 55 gigabytes of new data every single day per person. In just under a decade, this information explosion could be more personal than we realize. Today, #google already handles over 3.5 billion searches on a daily basis and it may be surprising how much of that data accounts for our own information.Half of Americans believe that their personal information online is less secure than it was just five years ago — and yet we are sharing more information about ourselves than ever. Social media sites like Facebook and Instagram make it easy to overshare, a bad habit most of us have fallen into at least once. Aside from the TMI factor, oversharing can lead to more sinister outcomes; namely the smart scammers that know how to put two and (...)

    #infographics #cybersecurity #phishing #social-media

  • Trump claims Twitter is stopping him from getting more followers | The Independent
    https://www.independent.co.uk/news/world/americas/us-politics/trump-twitter-followers-tweets-today-facebook-google-democrats-accoun

    Donald Trump has accused Twitter of blocking followers from his account, despite lacking any evidence to support such a claim, in his latest complaint about how he is treated by social media companies.

    The president wrote on Twitter that the site had “made it much more difficult for people to join @realDonaldTrump,” despite his account featuring the same, one-click follow button as any other profile. He also claimed the platform had “removed many names & greatly slowed the level and speed of increase,” suggesting Twitter had targeted him and other Republicans by reducing following counts. 

    Facebook, Twitter and Google are so biased toward the Dems it is ridiculous!” Mr Trump said Tuesday during a series of angry morning tweets. “_They have acknowledged-done NOTHING!

    Twitter and other major social media sites have spent the year purging millions of fake accounts and bots, with countless celebrities — including the president — and regular users alike seeing slight reductions in their followings due to the loss of false profiles.

    The effort has been part of a response to criticism from Congress that companies have not been doing enough to combat efforts at election meddling such as those seen during the 2016 presidential race. In October, Twitter announced it had removed at least nine million accounts as part of an effort that had been underway since July. 

    Facebook has also been steadily purging fake accounts throughout the year, and executives from all three platforms the president attacked on Twitter have testified before Congress in 2018 about their company’s responses to the spread of disinformation, Russian interference in the 2016 election and other issues. 

    It was previously reported the president’s personal Twitter handle, @realDonaldTrump, was followed by millions of fake accounts and bots. During one purge in July, Mr Trump lost at least 300,000 followers.

    Gallup conducted a survey in May that found nearly 15m — 29 per cent — of Mr Trump’s Twitter followings appeared to be fake accounts. 

    The president has a Twitter following of 56.3m as of Tuesday, compared to his predecessor, Barack Obama, who has a following of 104m. 

    The same Gallup survey found Mr Obama’s following to have a fake following of nearly 15 per cent. 

    The tweets from the president come a day after a pair of reports were released by the Senate Intelligence Committee said Moscow’s interference in the 2016 election was more widespread than previously thought and aimed at dividing Americans.

  • Campaigners begin action against male-targeted job ads on Facebook
    https://www.theguardian.com/technology/2018/sep/18/facebook-sued-gender-bias-male-targeted-job-ads

    Lawsuit claims that Facebook provides job ads which allows employers to choose who they want based on their age and sex Facebook and a group of 10 employers are being sued by workers for alleged gender discrimination after job adverts on the social media site targeted male users and did not appear to women. The case is being brought by three female workers and the union, the Communications Workers of America, which represents hundreds of thousands of female workers. They claim that most (...)

    #Facebook #algorithme #travail #publicité #discrimination #ACLU #CommunicationsWorkersAmerica (...)

    ##publicité ##Outten&Golden
    https://i.guim.co.uk/img/media/1661ae638fd6b412fcc290f0dc29e043189ac709/0_49_5000_3001/master/5000.jpg

  • Amazon is investigating claims that employees deleted reviews and sold sales data to sellers
    https://www.theverge.com/2018/9/16/17867358/amazon-investigation-employee-seller-bribery-internal-data-deleting-negati

    Employees have reportedly turned over proprietary sales information, deleted negative reviews, turned over reviewer e-mail addresses, or unbanned banned accounts On Sunday, The Wall Street Journal published a report that revealed that sellers have bribed Amazon employees to get access to internal sales data or to delete negative reviews, and that the company has launched an investigation into the practice. According to the report, middlemen use social media sites like WeChat to track down (...)

    #Amazon #corruption

  • Hacking #instagram : How To Add Infinite Hashtags To Your Post
    https://hackernoon.com/hacking-instagram-how-to-add-infinite-hashtags-to-your-post-6f3e5795b099

    The Anti-Climactic Exploit Every Instagram Influencer Has Been Dreaming OfPhoto by Jakob Owens on UnsplashHaving grown by over 40 million users in the United States alone since 2015, Instagram is the second most popular social media site in the world. Nestled between flashy photos and worldwide communities is the potential for fame and fortune— if you know how to use hashtags.Aside from the photos themselves, many Instagram celebrities claim that hashtags are the most important factor in acquiring Instagram success.You can’t find a “Top-Ten Best Ways to Increase Your Instagram Following” guide that doesn’t talk about hashtags at length. Simply put, hashtags are the single best way to be discovered by users who are not already following you because they land your photos on Instagram’s (...)

    #hacking-instagram #instagram-hashtag #social-media #add-infinite-hashtags

  • Stepping Back From Technology #addiction
    https://hackernoon.com/stepping-back-from-technology-addiction-a97fc3a1b9bb?source=rss----3a814

    “Nearly everyone I know is addicted in some measure to the Internet,” wrote Tony Schwartz in an essay in The New York Times. It’s a common complaint these days. A steady stream of similar headlines accuse the Net and its offspring apps, social media sites and online games of addicting us to distraction.There’s little doubt that nearly everyone who comes in contact with the Net has difficulty disconnecting. Just look around. People everywhere are glued to their devices. Many of us, like Schwartz, struggle to stay focused on tasks that require more concentration than it takes to post a status update. As one person ironically put it in the comments section of Schwartz’s online article, “As I was reading this very excellent article, I stopped at least half a dozen times to check my (...)

    #startup #tech #technology-addiction #tech-addiction

  • Can #blockchain Stop The Mass Social Media Exit?
    https://hackernoon.com/can-blockchain-stop-the-mass-social-media-exit-479fb4239c44?source=rss--

    https://medium.com/media/33ab014606c1b2519fe6b5850914b4f9/hrefPeople are starting to get tired of social media. In fact, according to recent findings, 4 in 10 people have deleted a social media account in the past year. The key reasons given for the mass exodus are privacy issues and the rapid circulation of violent content and fake news.With top social media sites such as Facebook and Twitter in the limelight for misusing users’ data, the public trust in social media is on a downward spiral. As traditional social media continue to lose popularity, a new and more advanced way of connecting people is gaining traction.The main goal of the blockchain based social media approach is to prioritize connecting high-level data security while also connecting people. For security, the distributed (...)

    #social-media #social-media-exit #social-media-blockchain

  • Market Cap, Schmarket Cap
    https://hackernoon.com/market-cap-schmarket-cap-dadb07f8c56e?source=rss----3a8144eabfe3---4

    Fullstack Academy, our weekly sponsor, is one of the nation’s most prestigious coding bootcamps with grads hired at Google, Facebook, Amazon, and more.Heyo Hacker,Sometimes you just got to say f*ck your daily responsibilities and build something simple. Hit that moment this week myself, and built ami polls. For now, it’s our most popular Twitter polls and an ask for you to contribute your poll idea/s through our distribution network. We’re getting tons of voters for ideas like, “which social media site causes the most negative externalities?” and “what industry will blockchain technology disrupt the most?” We can do a lot with these polls. Your ideas can drive what we publish. Get involved at AMIpolls.com.This week’s top twelve tech stories:How to Structure Your Organization to Profit from (...)

    #market-cap #schmarket-cap #tech-companies #tech-companies-market-cap #hackernoon-letter

  • How #blockchain Can Help SMBs Compete with the Big Dogs
    https://hackernoon.com/how-blockchain-can-help-smbs-compete-with-the-big-dogs-865dc2c06528?sour

    image source: UnsplashA few days ago, Mark Zuckerberg, the founder of Facebook, testified before Congress about the measures taken by the social media giant to protect users’ data. And if there is a theme that emerged in the testimony, it is the significant role that big data analytics play in business success.It is no wonder that a good number of the world largest corporations including Facebook, Google, and Twitter are in the business of selling marketing insights. One area of big data analytics that has recently attracted a lot of attention from corporations, politicians, and government agencies in sentiment analysis.This method involves analyzing comments and suggestions left on social media sites and identifying their attitude towards a brand by using variables such as emotion, (...)

    #smb #smb-blockchain #small-business #blockchain-for-smbs

  • The Laborers Who Keep Dick Pics and Beheadings Out of Your Facebook Feed | WIRED
    https://www.wired.com/2014/10/content-moderation

    Les travailleurs et travailleuses sous-payées du nettoyage dans le cyberespace. Un article ancien, pourtant toujours d’actualité. Et ce ne sont pas les intelligences artificielles qui résoudront ce problème.

    Baybayan is part of a massive labor force that handles “content moderation”—the removal of offensive material—for US social-networking sites. As social media connects more people more intimately than ever before, companies have been confronted with the Grandma Problem: Now that grandparents routinely use services like Facebook to connect with their kids and grandkids, they are potentially exposed to the Internet’s panoply of jerks, racists, creeps, criminals, and bullies. They won’t continue to log on if they find their family photos sandwiched between a gruesome Russian highway accident and a hardcore porn video. Social media’s growth into a multibillion-dollar industry, and its lasting mainstream appeal, has depended in large part on companies’ ability to police the borders of their user-generated content—to ensure that Grandma never has to see images like the one Baybayan just nuked.

    “EVERYBODY HITS THE WALL. YOU JUST THINK, ‘HOLY SHIT, WHAT AM I SPENDING MY DAY DOING?’”

    So companies like Facebook and Twitter rely on an army of workers employed to soak up the worst of humanity in order to protect the rest of us. And there are legions of them—a vast, invisible pool of human labor. Hemanshu Nigam, the former chief security officer of MySpace who now runs online safety consultancy SSP Blue, estimates that the number of content moderators scrubbing the world’s social media sites, mobile apps, and cloud storage services runs to “well over 100,000”—that is, about twice the total head count of Google and nearly 14 times that of Facebook.

    This work is increasingly done in the Philippines.

    #Fake_news #Modération #Hébergeurs

  • Twitter Followers Vanish Amid Inquiries Into Fake Accounts - The New York Times
    https://www.nytimes.com/interactive/2018/01/31/technology/social-media-bots-investigations.html

    More than a million followers have disappeared from the accounts of dozens of prominent Twitter users in recent days as the company faces growing criticism over the proliferation of fake accounts and scrutiny from federal and state inquiries into the shadowy firms that sell fake followers.

    The people losing followers include an array of entertainers, entrepreneurs, athletes and media figures, many of whom bought Twitter followers or artificial engagement from a company called Devumi. Its business practices were detailed in a New York Times article on Saturday describing a vast trade in fake followers and fraudulent engagement on Twitter and other social media sites, often using personal information taken from real users. Twitter said on Saturday that it would take action against Devumi’s practices. A Twitter spokeswoman on Tuesday declined to comment about whether the company was purging fake accounts.

    “I don’t think your user handle or profile has to reflect your actual name or picture,” Mr. Cuban said. “I do think Twitter would benefit from requiring every account(s) being tied back to an individual. If someone wants to run a bot account, great, but identify a person behind it.”

    Some federal and state lawmakers have called for more stringent laws regulating social media companies, in part to combat the epidemic of fake accounts. Many fake accounts are deployed by Russia and other countries seeking to influence American politics, but others are used by marketing companies to influence consumers and even policymakers.

    Marc Levine, a California state assemblyman from outside San Francisco, introduced legislation on Monday that would require social media companies doing business in California to link every account to a human being. The legislation would also require that social media companies allow only human account holders to place advertisements on their platforms.

    #Twitter #Faux_comptes #Followers

  • Why Facebook’s news feed is changing – and how it will affect you
    https://www.theguardian.com/technology/2018/jan/12/why-facebooks-news-feed-changing-how-will-affect-you

    The social media site wants its users to ‘have more meaningful interactions’, but what does that mean in practice ? What has Facebook announced ? The company is altering the algorithm that runs the news feed, which displays a computer-curated selection of posts from other users and Facebook pages. No longer will it prioritise “helping you find relevant content”, says the site’s founder, Mark Zuckerberg. The new goal is to help you “have more meaningful interactions”. What will change ? Today, (...)

    #Facebook #algorithme #domination #harcèlement

  • Facebook use of third-party apps ’violates data protection principles’
    https://www.theguardian.com/technology/2017/dec/19/facebook-use-of-third-party-apps-violates-data-protection-principles

    German watchdog accuses site of merging data from WhatsApp and Instagram into users’ Facebook accounts without consent Germany’s competition authority has accused Facebook of abusing its dominant market position to improperly amass third-party data on its users. A statement released on Tuesday criticised the world’s largest social media site for collecting data via Facebook-owned services, such as WhatsApp or Instagram, and then absorbing it into users’ Facebook accounts. “We are mostly (...)

    #Facebook #Instagram #WhatsApp #données #publicité #profiling

    ##publicité

  • Dubai security chief calls for bombing of Al Jazeera | UAE News | Al Jazeera
    http://www.aljazeera.com/news/2017/11/dubai-security-chief-calls-bombing-al-jazeera-171125143439231.html

    “The alliance must bomb the machine of terrorism ... the channel of ISIL, al-Qaeda and the al-Nusra front, Al Jazeera the terrorists,” the former police chief and now head of security in the Emirate told his 2.42 million followers on the social media site.

    #monde_arabe

  • Over 400 of the World’s Most Popular Websites Record Your Every Keystroke, Princeton Researchers Find - Motherboard
    https://motherboard.vice.com/en_us/article/59yexk/princeton-study-session-replay-scripts-tracking-you

    Most people who’ve spent time on the internet have some understanding that many websites log their visits and keep record of what pages they’ve looked at. When you search for a pair of shoes on a retailer’s site for example, it records that you were interested in them. The next day, you see an advertisement for the same pair on Instagram or another social media site.

    The idea of websites tracking users isn’t new, but research from Princeton University released last week indicates that online tracking is far more invasive than most users understand. In the first installment of a series titled “No Boundaries,” three researchers from Princeton’s Center for Information Technology Policy (CITP) explain how third-party scripts that run on many of the world’s most popular websites track your every keystroke and then send that information to a third-party server.

    But the scripts don’t just aggregate general statistics, they record and are capable of playing back individual browsing sessions. The scripts don’t run on every page, but are often placed on pages where users input sensitive information, like passwords and medical conditions.

    Le marché des sites-tiers est pourri de la tête aux pieds

    “Collection of page content by third-party replay scripts may cause sensitive information such as medical conditions, credit card details, and other personal information displayed on a page to leak to the third-party as part of the recording,” the researchers wrote in their post.

    It’s not just session scripts that are following you around the internet. A study published earlier this year found that nearly half of the world’s 1,000 most popular websites use the same tracking software to monitor your behavior in various ways.

    #surveillance #tracking #tiers_parties #vie_privée

  • So Long, Selfies : Why Candid Photos Make a Better Impression - Knowledge Wharton
    http://knowledge.wharton.upenn.edu/article/power-candid-photos

    In our increasingly digital society, a friend or colleague’s first impression of you is just as likely to come from a profile photo on a social media site as it is from an in-person meeting. While it’s tempting to display only images where every hair is in place, new research from Wharton marketing professor Jonah Berger finds that people are more attracted to authenticity than perfection. In, “A Candid Advantage? The Social Benefits of Candid Photos,” Berger and co-author Alixandra Barasch of New York University compare audience reactions to posed vs. candid photos in online profiles. When observers viewed profiles that displayed unvarnished images — or those that seemed to be unvarnished — they reported feeling more connected to those people and more interested in getting to know them. Berger recently spoke to Knowledge@Wharton about the research and its implications for how individuals and companies present themselves.

    What’s interesting is that would suggest that that photo makes you look the best; that by sharing those posed photos, you’re not only looking good, but you’re helping others get to know you and making them want to interact with you. But we found something that wasn’t entirely in line with that. If you ask posters which photo they would choose, which one they would post, which one they think other people would like more, people have this intuition that posed photos are better. And that is because as a photo taker, you think a lot about how you come off to others. You think by controlling the lighting and your smile, that you’re presenting your best self.

    But as an observer, someone who’s looking at those photos, what we found was quite surprising. Candid photos, where someone isn’t looking directly at the camera or looks like they’re not posing, actually lead to better impressions. People are more interested in getting to know someone, more interested in dating them and potentially more interested in being friends with them if that person has a candid rather than posed photo. The reason why is somewhat surprising, but simple once you hear it. It’s all about authenticity or whether someone is genuine. We think that by posting posed photos, people are getting the best version of us. But what we don’t realize is that when people see that best version, they don’t really have a good sense of who we are. Sure, there are a lot of photos online of people looking perfect and smiling. But that doesn’t really tell us much about them because they all look the same. It’s everyone presenting their best self, not their real self.

    As a side note, there was a great piece of research recently looking at how stock images have changed over time, particularly of women. The most popular stock image of women, say, 10 years ago was a woman at a spa. Now, it’s a woman mountain climbing. The way these stock images are used really change our perceptions of the world.

    #Images #Selfies #Médias_sociaux #Présentation_de_soi

  • Hashtag | WP

    #Hashtag, #Metadata_tag
    https://en.wikipedia.org/wiki/Hashtag

    #Mot-dièse, marqueur de #métadonnées
    https://fr.wikipedia.org/wiki/Hashtag

    #Meta-Kommentierung
    https://de.wikipedia.org/wiki/Hashtag

    [...]

    The pound sign [hashtag /oAnth] was adopted for use within IRC networks circa 1988 to label groups and topics.[9] Channels or topics that are available across an entire IRC network are prefixed with a hash symbol # (as opposed to those local to a server, which use an ampersand ‘&’).[10]

    The use of the pound sign in IRC inspired[11] Chris Messina to propose a similar system to be used on Twitter to tag topics of interest on the #microblogging network.[12] He posted the first hashtag on Twitter:

    How do you feel about using # (pound) for groups. As in #barcamp [msg]?
    — Chris Messina, ("factoryjoe"), August 23, 2007[13]

    Messina’s suggestion to use the hashtag was not adopted by Twitter, but the practice took off after hashtags were widely used in tweets relating to the 2007 San Diego forest fires in Southern California.[14][15]

    According to Messina, he suggested use of the hashtag to make it easy for “lay” users to search for content and find specific relevant updates; they are for people who do not have the technological knowledge to navigate the site. Therefore, the hashtag “was created organically by Twitter users as a way to categorize messages." [16]

    Internationally, the hashtag became a practice of writing style for Twitter posts during the 2009–2010 Iranian election protests; Twitter users inside and outside Iran used both English- and Persian-language hashtags in communications during the events.[17]

    The first published use of the term “hash tag” was in a blog post by Stowe Boyd, “Hash Tags = Twitter Groupings,”[18] on August 26, 2007, according to lexicographer Ben Zimmer, chair of the American Dialect Society’s New Words Committee.

    Beginning July 2, 2009,[19] Twitter began to #hyperlink all hashtags in tweets to Twitter search results for the hashtagged word (and for the standard spelling of commonly misspelled words). In 2010, Twitter introduced “Trending Topics” on the Twitter front page, displaying hashtags that are rapidly becoming popular. Twitter has an algorithm to tackle attempts to spam the trending list and ensure that hashtags trend naturally.[20]

    Although the hashtag started out most popularly on Twitter as the main social media platform for this use, the use has extended to other social media sites including Instagram, Facebook, Flickr, Tumblr, and Google+.[21]

    […]

    #Style

    On #microblogging or #social_networking sites, hashtags can be inserted anywhere within a sentence, either preceding it, following it as a postscript, or being included as a word within the sentence (e.g. “It is [hushtag]sunny today”).

    The quantity of hashtags used in a post or tweet is just as important as the types of hashtags used. It is currently considered acceptable to tag a post once when contributing to a specific conversation. Two hashtags are considered acceptable when adding a location to the conversation. Three hashtags are seen by some as the “absolute maximum”, and any contribution exceeding this risks “raising the ire of the community.”[24]

    As well as frustrating other users, the misuse of hashtags can lead to account suspensions. Twitter warns that adding hashtags to unrelated tweets, or repeated use of the same hashtag without adding to a conversation, could cause an account to be filtered from search, or even suspended.

    […]

    via https://diasp.eu/p/5930657

    #histoire_numérique #signe_fonctionel #fonction_formatique #usage #réseaux_sociaux #métadonnées

  • WaPo: UAE Hacked Qatar to Invent Pretense for Retaliation – Mother Jones

    http://www.motherjones.com/kevin-drum/2017/07/wapo-uae-hacked-qatar-to-invent-pretense-for-retaliation

    As you know, Saudi Arabia and other Gulf countries have imposed a blockade on Qatar, allegedly due to concerns over Qatar’s support for various and sundry terrorist groups. The blockade began in May, after Qatar’s official news agency published incendiary remarks from Qatar’s leader, and then claimed they had been hacked:

    The fake article quoted Qatar emir Sheikh Tamim bin Hamad Al Thani as calling Iran an “Islamic power” and saying Qatar’s relations with Israel were “good” during a military ceremony.

    The Qatari state television’s nightly newscast…scrolling ticker…included calling Hamas “the legitimate representative of the Palestinian people,” as well as saying Qatar had “strong relations” with Iran and the United States. “Iran represents a regional and Islamic power that cannot be ignored and it is unwise to face up against it,” the ticker read at one point. “It is a big power in the stabilization of the region.”

    Hacked? Get serious. Does anyone seriously believe that—

    The United Arab Emirates orchestrated the hacking of Qatari government news and social media sites in order to post incendiary false quotes attributed to Qatar’s emir, Sheikh Tamim Bin Hamad al-Thani, in late May that sparked the ongoing upheaval between Qatar and its neighbors, according to U.S. intelligence officials.

    Officials became aware last week that newly analyzed information gathered by U.S. intelligence agencies confirmed that on May 23, senior members of the UAE government discussed the plan and its implementation. The officials said it remains unclear whether the UAE carried out the hacks itself or contracted to have them done.

    That’s from the Washington Post. The UAE denies everything, of course.

    This is a very big deal. For starters, what are the odds that the UAE did this alone? Pretty slim, I think. Saudi Arabia was almost certainly involved too. And what does President Trump do now? He’s taken the Saudi side of this dispute, but now his own intelligence agencies are telling him that other Arab countries conducted the hack as a deliberate way of giving themselves an excuse to create the blockade. In fact, he probably learned this a week ago.

    Someone in the intelligence community apparently decided that (a) Trump was never going to go public with this, and (b) it really needed to become public. But who? And why?

  • Alleged Mosul phosphorus attack ‘smoke screen’ to protect civilians : Army
    http://www.kurdistan24.net/en/news/750ba96d-69ae-4175-91bb-71f5682bc044

    ERBIL, Kurdistan Region (Kurdistan24) – The Iraqi army on Sunday denied using white phosphorus while shelling Islamic State (IS) positions in western Mosul.

    In a statement, the Iraqi Joint Operations Command in Mosul rejected reports of the use of white phosphorus by Iraqi and coalition warplanes in Mosul.

    The report stated the alleged chemical attack was an “intentional smoke screen to protect civilian lives.”

    The statement said some news and social media sites published inaccurate reports on the use of phosphorus during the military operations against IS in Mosul.

    On June 3, several civilians were fleeing IS-held areas toward the Iraqi security forces near Jimhuri hospital in western Mosul, and there was the danger of being targeted by IS snipers, the statement added.

    “We relied on the international coalition to launch smoke screen attacks to hide the movement of the civilians from the IS extremists’ line of sight,” the report continued.

    “[We wanted] to give the civilians a chance to flee toward the Iraqi forces,” the statement informed, stating the forces “succeeded in rescuing the civilians and protecting their lives.”

    The Iraqi command explained that such smoke screen attacks were previously used in several areas in eastern and western Mosul for the purpose of protecting civilians from enemy fire.

    Iraqi air forces on Saturday heavily shelled IS insurgents in the al-Zinjili neighborhood located in western Mosul.

    While Kurdistan24 was streaming live from the region, Iraqi forces repeatedly struck the militant group’s positions in the area.

    The shelling seen in the footage shows white smoke rising from air raids.

    #Irak images #EI de bombardements au phosphore blanc du centre hospitalier #Mossoul ouest datées d’aujourd’hui
    https://twitter.com/SimNasr/status/871295988023136256

  • Unlike Us | About
    http://networkcultures.org/unlikeus/about

    Invitation to join the network (a series of events, reader, workshops, online debates, campaigns etc.)

    Concept: Geert Lovink (Institute of Network Cultures/HvA, Amsterdam) and Korinna Patelis (Cyprus University of Technology, Limassol)

    Thanks to Marc Stumpel, Sabine Niederer, Vito Campanelli, Ned Rossiter, Michael Dieter, Oliver Leistert, Taina Bucher, Gabriella Coleman, Ulises Mejias, Anne Helmond, Lonneke van der Velden, Morgan Currie and Eric Kluitenberg for their input.

    Summary
    The aim of Unlike Us is to establish a research network of artists, designers, scholars, activists and programmers who work on ‘alternatives in social media’. Through workshops, conferences, online dialogues and publications, Unlike Us intends to both analyze the economic and cultural aspects of dominant social media platforms and to propagate the further development and proliferation of alternative, decentralized social media software.

    Whether or not we are in the midst of internet bubble 2.0, we can all agree that social media dominate internet and mobile use. The emergence of web-based user to user services, driven by an explosion of informal dialogues, continuous uploads and user generated content have greatly empowered the rise of participatory culture. At the same time, monopoly power, commercialization and commodification are also on the rise with just a handful of social media platforms dominating the social web. These two contradictory processes – both the facilitation of free exchanges and the commercial exploitation of social relationships – seem to lie at the heart of contemporary capitalism.

    On the one hand new media create and expand the social spaces through which we interact, play and even politicize ourselves; on the other hand they are literally owned by three or four companies that have phenomenal power to shape such interaction. Whereas the hegemonic Internet ideology promises open, decentralized systems, why do we, time and again, find ourselves locked into closed corporate environments? Why are individual users so easily charmed by these ‘walled gardens’? Do we understand the long-term costs that society will pay for the ease of use and simple interfaces of their beloved ‘free’ services?

    The accelerated growth and scope of Facebook’s social space, for example, is unheard of. Facebook claims to have 700 million users, ranks in the top two or three first destination sites on the Web worldwide and is valued at 50 billion US dollars. Its users willingly deposit a myriad of snippets of their social life and relationships on a site that invests in an accelerated play of sharing and exchanging information. We all befriend, rank, recommend, create circles, upload photos, videos and update our status. A myriad of (mobile) applications orchestrate this offer of private moments in a virtual public, seamlessly embedding the online world in users’ everyday life.

    Yet despite its massive user base, the phenomena of online social networking remains fragile. Just think of the fate of the majority of social networking sites. Who has ever heard of Friendster? The death of Myspace has been looming on the horizon for quite some time. The disappearance of Twitter and Facebook – and Google, for that matter – is only a masterpiece of software away. This means that the protocological future is not stationary but allows space for us to carve out a variety of techno-political interventions. Unlike Us is developed in the spirit of RSS-inventor and uberblogger Dave Winer whose recent Blork project is presented as an alternative for ‘corporate blogging silos’. But instead of repeating the entrepreneurial-start-up-transforming-into-corporate-behemoth formula, isn’t it time to reinvent the internet as a truly independent public infrastructure that can effectively defend itself against corporate domination and state control?

    Agenda
    Going beyond the culture of complaint about our ignorance and loss of privacy, the proposed network of artists, scholars, activists and media folks will ask fundamental and overarching questions about how to tackle these fast-emerging monopoly powers. Situated within the existing oligopoly of ownership and use, this inquiry will include the support of software alternatives and related artistic practices and the development of a common alternative vision of how the techno-social world might be mediated.

    Without falling into the romantic trap of some harmonious offline life, Unlike Us asks what sort of network architectures could be designed that contribute to ‘the common’, understood as a shared resource and system of collective production that supports new forms of social organizations (such as organized networks) without mining for data to sell. What aesthetic tactics could effectively end the expropriation of subjective and private dimensions that we experience daily in social networks? Why do we ignore networks that refuse the (hyper)growth model and instead seek to strengthen forms of free cooperation? Turning the tables, let’s code and develop other ‘network cultures’ whose protocols are no longer related to the logic of ‘weak ties’. What type of social relations do we want to foster and discover in the 21st century? Imagine dense, diverse networked exchanges between billions of people, outside corporate and state control. Imagine discourses returning subjectivities to their ‘natural’ status as open nodes based on dialogue and an ethics of free exchange.

    To a large degree social media research is still dominated by quantitative and social scientific endeavors. So far the focus has been on moral panics, privacy and security, identity theft, self-representation from Goffman to Foucault and graph-based network theory that focuses on influencers and (news) hubs. What is curiously missing from the discourse is a rigorous discussion of the political economy of these social media monopolies. There is also a substantial research gap in understanding the power relations between the social and the technical in what are essentially software systems and platforms. With this initiative, we want to shift focus away from the obsession with youth and usage to the economic, political, artistic and technical aspects of these online platforms. What we first need to acknowledge is social media’s double nature.

    Dismissing social media as neutral platforms with no power is as implausible as considering social media the bad boys of capitalism. The beauty and depth of social media is that they call for a new understanding of classic dichotomies such as commercial/political, private/public, users/producers, artistic/standardised, original/copy, democratising/ disempowering. Instead of taking these dichotomies as a point of departure, we want to scrutinise the social networking logic. Even if Twitter and Facebook implode overnight, the social networking logic of befriending, liking and ranking will further spread across all aspects of life.

    The proposed research agenda is at once a philosophical, epistemological and theoretical investigation of knowledge artifacts, cultural production and social relations and an empirical investigation of the specific phenomenon of monopoly social media. Methodologically we will use the lessons learned from theoretical research activities to inform practice-oriented research, and vice-versa. Unlike Us is a common initiative of the Institute of Network Cultures (Amsterdam University of Applied Science HvA) and the Cyprus University of Technology in Limassol.

    An online network and a reader connected to a series of events initially in Amsterdam and Cyprus (early 2012) are already in planning. We would explicitly like to invite other partners to come on board who identify with the spirit of this proposal, to organize related conferences, festivals, workshops, temporary media labs and barcamps (where coders come together) with us. The reader (tentatively planned as number 8 in the Reader series published by the INC) will be produced mid-late 2012. The call for contributions to the network, the reader and the event series goes out in July 2011, followed by the publicity for the first events and other initiatives by possible new partners.

    Topics of Investigation
    The events, online platform, reader and other outlets may include the following topics inviting theoretical, empirical, practical and art-based contributions, though not every event or publication might deal with all issues. We anticipate the need for specialized workshops and barcamps.

    1. Political Economy: Social Media Monopolies
    Social media culture is belied in American corporate capitalism, dominated by the logic of start-ups and venture capital, management buyouts, IPOs etc. Three to four companies literally own the Western social media landscape and capitalize on the content produced by millions of people around the world. One thing is evident about the market structure of social media: one-to-many is not giving way to many-to-many without first going through many-to-one. What power do these companies actually have? Is there any evidence that such ownership influences user-generated content? How does this ownership express itself structurally and in technical terms?

    What conflicts arise when a platform like Facebook is appropriated for public or political purposes, while access to the medium can easily be denied by the company? Facebook is worth billions, does that really mean something for the average user? How does data-mining work and what is its economy? What is the role of discourse (PR) in creating and sustaining an image of credibility and trustworthiness, and in which forms does it manifest to oppose that image? The bigger social media platforms form central nodes, such as image upload services and short ulr services. This ecology was once fairly open, with a variety of new Twitter-related services coming into being, but now Twitter takes up these services itself, favoring their own product through default settings; on top of that it is increasingly shutting down access to developers, which shrinks the ecology and makes it less diverse.

    2. The Private in the Public
    The advent of social media has eroded privacy as we know it, giving rise to a culture of self-surveillance made up of myriad voluntary, everyday disclosures. New understandings of private and public are needed to address this phenomenon. What does owning all this user data actually mean? Why are people willing to give up their personal data, and that of others? How should software platforms be regulated?

    Is software like a movie to be given parental guidance? What does it mean that there are different levels of access to data, from partner info brokers and third-party developers to the users? Why is education in social media not in the curriculum of secondary schools? Can social media companies truly adopt a Social Network Users’ Bill of Rights?

    3. Visiting the Belly of the Beast
    The exuberance and joy that defined the dotcom era is cliché by now. IT use is occurring across the board, and new labour conditions can be found everywhere. But this should not keep our eyes away from the power relations inside internet companies. What are the geopolitical lines of distribution that define the organization and outsourcing taking place in global IT companies these days? How is the industry structured and how does its economy work?

    Is there a broader connection to be made with the politics of land expropriation and peasant labour in countries like India, for instance, and how does this analytically converge with the experiences of social media users? How do monopolies deal with their employees’ use of the platforms? What can we learn from other market sectors and perspectives that (critically) reflect on, for example, techniques of sustainability or fair trade?

    4. Artistic Responses to Social Media
    Artists are playing a crucial role in visualizing power relationships and disrupting subliminal daily routines of social media usage. Artistic practice provides an important analytical site in the context of the proposed research agenda, as artists are often first to deconstruct the familiar and to facilitate an alternative lens to understand and critique these media. Is there such a thing as a social ‘web aesthetics’? It is one thing to criticize Twitter and Facebook for their primitive and bland interface designs. How can we imagine the social in different ways? And how can we design and implement new interfaces to provide more creative freedom to cater to our multiple identities? Also, what is the scope of interventions with social media, such as, for example, the ‘dislike button’ add-on for Facebook? And what practices are really needed? Isn’t it time, for example, for a Facebook ‘identity correction’?

    5. Designing culture: representation and software
    Social media offer us the virtual worlds we use every day. From Facebook’s ‘like’ button to blogs’ user interface, these tools empower and delimit our interactions. How do we theorize the plethora of social media features? Are they to be understood as mere technical functions, cultural texts, signifiers, affordances, or all these at once? In what ways do design and functionalities influence the content and expressions produced? And how can we map and critique this influence? What are the cultural assumptions embedded in the design of social media sites and what type of users or communities do they produce?

    To answer the question of structure and design, one route is to trace the genealogy of functionalities, to historicize them and look for discursive silences. How can we make sense of the constant changes occurring both on and beyond the interface? How can we theorize the production and configuration of an ever-increasing algorithmic and protocological culture more generally?

    6. Software Matters: Sociotechnical and Algorithmic Cultures
    One of the important components of social media is software. For all the discourse on sociopolitical power relations governed by corporations such as Facebook and related platforms, one must not forget that social media platforms are thoroughly defined and powered by software. We need critical engagement with Facebook as software. That is, what is the role of software in reconfiguring contemporary social spaces? In what ways does code make a difference in how identities are formed and social relationships performed? How does the software function to interpellate users to its logic? What are the discourses surrounding software?

    One of the core features of Facebook for instance is its news feed, which is algorithmically driven and sorted in its default mode. The EdgeRank algorithm of the news feed governs the logic by which content becomes visible, acting as a modern gatekeeper and editorial voice. Given its 700 million users, it has become imperative to understand the power of EdgeRank and its cultural implications. Another important analytical site for investigation are the ‘application programming interfaces’ (APIs) that to a large extent made the phenomenal growth of social media platforms possible in the first place. How have APIs contributed to the business logic of social media? How can we theorize social media use from the perspective of the programmer?

    7. Genealogies of Social Networking Sites
    Feedback in a closed system is a core characteristic of Facebook; even the most basic and important features, such as ‘friending’, traces back to early cybernetics’ ideas of control. While the word itself became lost in various transitions, the ideas of cybernetics have remained stable in fields such as artificial intelligence, robotics and the biopolitical arena. Both communication and information theories shaped this discourse. How does Facebook relate to such an algorithmic shape of social life? What can Facebook teach us about the powers of systems theory? Would Norbert Wiener and Niklas Luhmann be friends on Facebook?

    8. Is Research Doomed?
    The design of Facebook excludes the third person perspective, as the only way in is through ones own profile. What does this inbuilt ‘me-centricity’ imply for social media research? Does it require us to rethink the so-called objectivity of researchers and the detached view of current social research? Why is it that there are more than 200 papers about the way people use Facebook, but the site is ‘closed’ to true quantitative inquiry? Is the state of art in social media research exemplary of the ‘quantitative turn’ in new media research? Or is there a need to expand and rethink methods of inquiry in social media research? Going beyond the usual methodological approaches of the quantitative and qualitative, we seek to broaden the scope of investigating these media. How can we make sense of the political economy and the socio-technical elements, and with what means? Indeed, what are our toolkits for collective, transdisciplinary modes of knowledge and the politics of refusal?

    9. Researching Unstable Ontologies
    Software destabilizes Facebook as a solid ontology. Software is always in becoming and so by nature ontogenetic. It grows and grows, living off of constant input. Logging on one never encounters the same content, as it changes on an algorithmic level and in terms of the platform itself. What does Facebook’s fluid nature imply for how we make sense of and study it? Facebook for instance willingly complicates research: 1. It is always personalized (see Eli Pariser). Even when creating ‘empty’ research accounts it never gives the same results compared to other people’s empty research accounts. 2. One must often be ‘inside’ social media to study it. Access from the outside is limited, which reinforces the first problem. 3. Outside access is ideally (for Facebook and Twitter) arranged through carefully regulated protocols of APIs and can easily be restricted. Next to social media as a problem for research, there is also the question of social research methods as intervention.

    10. Making Sense of Data: Visualization and Critique
    Data representation is one of the most important battlefields nowadays. Indeed, global corporations build their visions of the world increasingly based on and structured around complex data flows. What is the role of data today and what are the appropriate ways in which to make sense of the burgeoning datasets? As data visualization is becoming a powerful buzzword and social research increasingly uses digital tools to make ‘beautiful’ graphs and visualizations, there is a need to take a step back and question the usefulness of current data visualization tools and to develop novel analytical frameworks through which to critically grasp these often simplified and nontransparent ways of representing data.

    Not only is it important to develop new interpretative and visual methods to engage with data flows, data itself needs to be questioned. We need to ask about data’s ontological and epistemological nature. What is it, who is the producer, for whom, where is it stored? In what ways do social media companies’ terms of service regulate data? Whether alternative social media or monopolistic platforms, how are our data-bodies exactly affected by changes in the software?

    11. Pitfalls of Building Social Media Alternatives
    It is not only important to critique and question existing design and socio-political realities but also to engage with possible futures. The central aim of this project is therefore to contribute and support ‘alternatives in social media’. What would the collective design of alternative protocols and interfaces look like? We should find some comfort in the small explosion of alternative options currently available, but also ask how usable these options are and how real is the danger of fragmentation. How have developers from different initiatives so far collaborated and what might we learn from their successes and failures? Understanding any early failures and successes of these attempts seems crucial.

    A related issue concerns funding difficulties faced by projects. Finally, in what ways does regionalism (United States, Europe, Asia) feed into the way people search for alternatives and use social media.

    12. Showcasing Alternatives in Social Media
    The best way to criticize platform monopolies is to support alternative free and open source software that can be locally installed. There are currently a multitude of decentralized social networks in the making that aspire to facilitate users with greater power to define for themselves with whom share their data. Let us look into the wildly different initiatives from Crabgrass, Appleseed, Diaspora, NoseRub, BuddyCloud, Protonet, StatusNet, GNU Social, Lorea and OneSocialWeb to the distributed Twitter alternative Thimbl.

    In which settings are these initiative developed and what choices are made for their design? Let’s hear from the Spanish activists who have recently made experiences with the n-1.cc platform developed by Lorea. What community does this platform enable? While traditional software focuses on the individual profile and its relation to the network and a public (share with friends, share with friends of friends, share with public), the Lorea software for instance asks you with whom to share an update, picture or video. It finegrains the idea of privacy and sharing settings at the content level, not the user’s profile. At the same time, it requires constant decision making, or else a high level of trust in the community you share your data with. And how do we experience the transition from, or interoperability with, other platforms? Is it useful to make a distinction between corporate competitors and grassroots initiatives? How can these beta alternatives best be supported, both economically and socially? Aren’t we overstating the importance of software and isn’t the availability of capital much bigger in determining the adoption of a platform?

    13. Social Media Activism and the Critique of Liberation Technology
    While the tendency to label any emergent social movement as the latest ‘Twitter revolution’ has passed, a liberal discourse of ‘liberation technology’ (information and communication technologies that empower grassroots movements) continues to influence our ideas about networked participation. This discourse tends to obscure power relations and obstruct critical questioning about the capitalist institutions and superstructures in which these technologies operate. What are the assumptions behind this neo-liberal discourse? What role do ‘developed’ nations play when they promote and subsidize the development of technologies of circumvention and hacktivism for use in ‘underdeveloped’ states, while at the same time allowing social media companies at home to operate in increasingly deregulated environments and collaborating with them in the surveillance of citizens at home and abroad? What role do companies play in determining how their products are used by dissidents or governments abroad? How have their policies and Terms of Use changed as a result?

    14. Social Media in the Middle East and Beyond
    The justified response to downplay the role of Facebook in early 2011 events in Tunisia and Egypt by putting social media in a larger perspective has not taken off the table the question of how to organize social mobilizations. Which specific software do the ‘movements of squares’ need? What happens to social movements when the internet and ICT networks are shut down? How does the interruption of internet services shift the nature of activism? How have repressive and democratic governments responded to the use of ‘liberation technologies’? How do these technologies change the relationship between the state and its citizens? How are governments using the same social media tools for surveillance and propaganda or highjacking Facebook identities, such as happened in Syria? What is Facebook’s own policy when deleting or censoring accounts of its users?

    How can technical infrastructures be supported which are not shutdown upon request? How much does our agency depend on communication technology nowadays? And whom do we exclude with every click? How can we envision ‘organized networks’ that are based on ’strong ties’ yet open enough to grow quickly if the time is right? Which software platforms are best suited for the ‘tactical camping’ movements that occupy squares all over the world?

    15. Data storage: social media and legal cultures
    Data that is voluntarily shared by social media users is not only used for commercial purposes, but is also of interest to governments. This data is stored on servers of companies that are bound to the specific legal culture and country. This material-legal complex is often overlooked. Fore instance, the servers of Facebook and Twitter are located in the US and therefore fall under the US jurisdiction. One famous example is the request for the Twitter accounts of several activists (Gonggrijp, Jónsdóttir, Applebaum) affiliated with Wikileaks projects by the US government. How do activists respond and how do alternative social media platforms deal with this issue?

  • ACLU finds social media sites gave data to company tracking black protesters
    https://www.theguardian.com/technology/2016/oct/11/aclu-geofeedia-facebook-twitter-instagram-black-lives-matter

    Facebook, Twitter and Instagram have previously provided users’ data to a software company that aids police surveillance programs and targets protesters of color, according to government records obtained by the American Civil Liberties Union. The ACLU revealed on Tuesday that the technology corporations gave “special access” to Geofeedia, a controversial social media monitoring company that partners with law enforcement and has marketed its services as a tool to track Black Lives Matter (...)

    #Facebook #Twitter #Instagram #profiling #web #activisme #surveillance #ACLU #Geofeedia