Seenthis
•
 
Identifiants personnels
  • [mot de passe oublié ?]

 
  • #m
  • #me
  • #met
  • #meta
RSS: #metadata

#metadata

  • #metadatas
  • #metadata_tag
0 | 25
  • @cdb_77
    CDB_77 @cdb_77 9/11/2018
    4
    @simplicissimus
    @02myseenthis01
    @fil
    @sodaa
    4

    Europe is using smartphone data as a weapon to deport refugees

    European leaders need to bring immigration numbers down, and #metadata on smartphones could be just what they need to start sending migrants back.

    Smartphones have helped tens of thousands of migrants travel to Europe. A phone means you can stay in touch with your family – or with people smugglers. On the road, you can check Facebook groups that warn of border closures, policy changes or scams to watch out for. Advice on how to avoid border police spreads via WhatsApp.

    Now, governments are using migrants’ smartphones to deport them.

    Across the continent, migrants are being confronted by a booming mobile forensics industry that specialises in extracting a smartphone’s messages, location history, and even #WhatsApp data. That information can potentially be turned against the phone owners themselves.

    In 2017 both Germany and Denmark expanded laws that enabled immigration officials to extract data from asylum seekers’ phones. Similar legislation has been proposed in Belgium and Austria, while the UK and Norway have been searching asylum seekers’ devices for years.

    Following right-wing gains across the EU, beleaguered governments are scrambling to bring immigration numbers down. Tackling fraudulent asylum applications seems like an easy way to do that. As European leaders met in Brussels last week to thrash out a new, tougher framework to manage migration —which nevertheless seems insufficient to placate Angela Merkel’s critics in Germany— immigration agencies across Europe are showing new enthusiasm for laws and software that enable phone data to be used in deportation cases.

    Admittedly, some refugees do lie on their asylum applications. Omar – not his real name – certainly did. He travelled to Germany via Greece. Even for Syrians like him there were few legal alternatives into the EU. But his route meant he could face deportation under the EU’s Dublin regulation, which dictates that asylum seekers must claim refugee status in the first EU country they arrive in. For Omar, that would mean settling in Greece – hardly an attractive destination considering its high unemployment and stretched social services.

    Last year, more than 7,000 people were deported from Germany according to the Dublin regulation. If Omar’s phone were searched, he could have become one of them, as his location history would have revealed his route through Europe, including his arrival in Greece.

    But before his asylum interview, he met Lena – also not her real name. A refugee advocate and businesswoman, Lena had read about Germany’s new surveillance laws. She encouraged Omar to throw his phone away and tell immigration officials it had been stolen in the refugee camp where he was staying. “This camp was well-known for crime,” says Lena, “so the story seemed believable.” His application is still pending.

    Omar is not the only asylum seeker to hide phone data from state officials. When sociology professor Marie Gillespie researched phone use among migrants travelling to Europe in 2016, she encountered widespread fear of mobile phone surveillance. “Mobile phones were facilitators and enablers of their journeys, but they also posed a threat,” she says. In response, she saw migrants who kept up to 13 different #SIM cards, hiding them in different parts of their bodies as they travelled.

    This could become a problem for immigration officials, who are increasingly using mobile phones to verify migrants’ identities, and ascertain whether they qualify for asylum. (That is: whether they are fleeing countries where they risk facing violence or persecution.) In Germany, only 40 per cent of asylum applicants in 2016 could provide official identification documents. In their absence, the nationalities of the other 60 per cent were verified through a mixture of language analysis — using human translators and computers to confirm whether their accent is authentic — and mobile phone data.

    Over the six months after Germany’s phone search law came into force, immigration officials searched 8,000 phones. If they doubted an asylum seeker’s story, they would extract their phone’s metadata – digital information that can reveal the user’s language settings and the locations where they made calls or took pictures.

    To do this, German authorities are using a computer programme, called Atos, that combines technology made by two mobile forensic companies – T3K and MSAB. It takes just a few minutes to download metadata. “The analysis of mobile phone data is never the sole basis on which a decision about the application for asylum is made,” says a spokesperson for BAMF, Germany’s immigration agency. But they do use the data to look for inconsistencies in an applicant’s story. If a person says they were in Turkey in September, for example, but phone data shows they were actually in Syria, they can see more investigation is needed.

    Denmark is taking this a step further, by asking migrants for their Facebook passwords. Refugee groups note how the platform is being used more and more to verify an asylum seeker’s identity.

    It recently happened to Assem, a 36-year-old refugee from Syria. Five minutes on his public Facebook profile will tell you two things about him: first, he supports a revolution against Syria’s Assad regime and, second, he is a devoted fan of Barcelona football club. When Danish immigration officials asked him for his password, he gave it to them willingly. “At that time, I didn’t care what they were doing. I just wanted to leave the asylum center,” he says. While Assem was not happy about the request, he now has refugee status.

    The Danish immigration agency confirmed they do ask asylum applicants to see their Facebook profiles. While it is not standard procedure, it can be used if a caseworker feels they need more information. If the applicant refused their consent, they would tell them they are obliged under Danish law. Right now, they only use Facebook – not Instagram or other social platforms.

    Across the EU, rights groups and opposition parties have questioned whether these searches are constitutional, raising concerns over their infringement of privacy and the effect of searching migrants like criminals.

    “In my view, it’s a violation of ethics on privacy to ask for a password to Facebook or open somebody’s mobile phone,” says Michala Clante Bendixen of Denmark’s Refugees Welcome movement. “For an asylum seeker, this is often the only piece of personal and private space he or she has left.”

    Information sourced from phones and social media offers an alternative reality that can compete with an asylum seeker’s own testimony. “They’re holding the phone to be a stronger testament to their history than what the person is ready to disclose,” says Gus Hosein, executive director of Privacy International. “That’s unprecedented.”
    Read next

    Everything we know about the UK’s plan to block online porn
    Everything we know about the UK’s plan to block online porn

    By WIRED

    Privacy campaigners note how digital information might not reflect a person’s character accurately. “Because there is so much data on a person’s phone, you can make quite sweeping judgements that might not necessarily be true,” says Christopher Weatherhead, technologist at Privacy International.

    Bendixen cites the case of one man whose asylum application was rejected after Danish authorities examined his phone and saw his Facebook account had left comments during a time he said he was in prison. He explained that his brother also had access to his account, but the authorities did not believe him; he is currently waiting for appeal.

    A spokesperson for the UK’s Home Office told me they don’t check the social media of asylum seekers unless they are suspected of a crime. Nonetheless, British lawyers and social workers have reported that social media searches do take place, although it is unclear whether they reflect official policy. The Home Office did not respond to requests for clarification on that matter.

    Privacy International has investigated the UK police’s ability to search phones, indicating that immigration officials could possess similar powers. “What surprised us was the level of detail of these phone searches. Police could access information even you don’t have access to, such as deleted messages,” Weatherhead says.

    His team found that British police are aided by Israeli mobile forensic company Cellebrite. Using their software, officials can access search history, including deleted browsing history. It can also extract WhatsApp messages from some Android phones.

    There is a crippling irony that the smartphone, for so long a tool of liberation, has become a digital Judas. If you had stood in Athens’ Victoria Square in 2015, at the height of the refugee crisis, you would have noticed the “smartphone stoop”: hundreds of Syrians, Iraqis, and Afghans standing or sitting about this sun-baked patch of grass and concrete, were bending their heads, looking into their phones.

    The smartphone has become the essential accessory for modern migration. Travelling to Europe as an asylum seeker is expensive. People who can’t afford phones typically can’t afford the journey either. Phones became a constant feature along the route to Northern Europe: young men would line the pavements outside reception centres in Berlin, hunched over their screens. In Calais, groups would crowd around charging points. In 2016, the UN refugee agency reported that phones were so important to migrants moving across Europe, that they were spending up to one third of their income on phone credit.

    Now, migrants are being forced to confront a more dangerous reality, as governments worldwide expand their abilities to search asylum seekers’ phones. While European countries were relaxing their laws on metadata search, last year US immigration spent $2.2 million on phone hacking software. But asylum seekers too are changing their behaviour as they become more aware that the smartphone, the very device that has bought them so much freedom, could be the very thing used to unravel their hope of a new life.

    ►https://www.wired.co.uk/article/europe-immigration-refugees-smartphone-metadata-deportations
    #smartphone #smartphones #données #big_data #expulsions #Allemagne #Danemark #renvois #carte_SIM #Belgique #Autriche

    • #Europe
    • #smartphone
    • #smartphones
    CDB_77 @cdb_77
    Écrire un commentaire
  • @oanth_rss
    oAnth_RSS @oanth_rss CC BY 2/11/2018
    2
    @simplicissimus
    @02myseenthis01
    2

    “It’s like Minority Report come to life”
    ▻https://diasp.eu/p/7957923

    “It’s like Minority Report come to life”

    The case of Bilal Abdul Kareem explains how the U.S. use #AI on #metadata to create kill list. It is an exceptionally bold example for the deep state. A second-layer United States government that has given itself the power to decide who might live – and who might be extralegally executed. An excellent piece of #journalism – from a magazine you wouldn’t expect. ▻https://www.rollingstone.com/politics/politics-features/how-to-survive-americas-kill-list-699334

    A century ago, Franz Kafka wrote a parable about a man who comes to a gatekeeper, begging for entrance to the Law. He is obsessed with questions of guilt or innocence. But the gatekeeper never allows him past, and all he learns in the end is that the heavens are indifferent to his most (...)

    oAnth_RSS @oanth_rss CC BY
    Écrire un commentaire
  • @oanth_rss
    oAnth_RSS @oanth_rss CC BY 20/08/2017

    Hashtag | WP

    #Hashtag, #Metadata_tag
    ▻https://en.wikipedia.org/wiki/Hashtag

    #Mot-dièse, marqueur de #métadonnées
    ▻https://fr.wikipedia.org/wiki/Hashtag

    #Meta-Kommentierung
    ▻https://de.wikipedia.org/wiki/Hashtag

    [...]

    The pound sign [hashtag /oAnth] was adopted for use within IRC networks circa 1988 to label groups and topics.[9] Channels or topics that are available across an entire IRC network are prefixed with a hash symbol # (as opposed to those local to a server, which use an ampersand ‘&’).[10]

    The use of the pound sign in IRC inspired[11] Chris Messina to propose a similar system to be used on Twitter to tag topics of interest on the #microblogging network.[12] He posted the first hashtag on Twitter:

    How do you feel about using # (pound) for groups. As in #barcamp [msg]?
    — Chris Messina, ("factoryjoe"), August 23, 2007[13]

    Messina’s suggestion to use the hashtag was not adopted by Twitter, but the practice took off after hashtags were widely used in tweets relating to the 2007 San Diego forest fires in Southern California.[14][15]

    According to Messina, he suggested use of the hashtag to make it easy for “lay” users to search for content and find specific relevant updates; they are for people who do not have the technological knowledge to navigate the site. Therefore, the hashtag “was created organically by Twitter users as a way to categorize messages." [16]

    Internationally, the hashtag became a practice of writing style for Twitter posts during the 2009–2010 Iranian election protests; Twitter users inside and outside Iran used both English- and Persian-language hashtags in communications during the events.[17]

    The first published use of the term “hash tag” was in a blog post by Stowe Boyd, “Hash Tags = Twitter Groupings,”[18] on August 26, 2007, according to lexicographer Ben Zimmer, chair of the American Dialect Society’s New Words Committee.

    Beginning July 2, 2009,[19] Twitter began to #hyperlink all hashtags in tweets to Twitter search results for the hashtagged word (and for the standard spelling of commonly misspelled words). In 2010, Twitter introduced “Trending Topics” on the Twitter front page, displaying hashtags that are rapidly becoming popular. Twitter has an algorithm to tackle attempts to spam the trending list and ensure that hashtags trend naturally.[20]

    Although the hashtag started out most popularly on Twitter as the main social media platform for this use, the use has extended to other social media sites including Instagram, Facebook, Flickr, Tumblr, and Google+.[21]

    […]

    #Style

    On #microblogging or #social_networking sites, hashtags can be inserted anywhere within a sentence, either preceding it, following it as a postscript, or being included as a word within the sentence (e.g. “It is [hushtag]sunny today”).

    The quantity of hashtags used in a post or tweet is just as important as the types of hashtags used. It is currently considered acceptable to tag a post once when contributing to a specific conversation. Two hashtags are considered acceptable when adding a location to the conversation. Three hashtags are seen by some as the “absolute maximum”, and any contribution exceeding this risks “raising the ire of the community.”[24]

    As well as frustrating other users, the misuse of hashtags can lead to account suspensions. Twitter warns that adding hashtags to unrelated tweets, or repeated use of the same hashtag without adding to a conversation, could cause an account to be filtered from search, or even suspended.

    […]

    via ▻https://diasp.eu/p/5930657

    #histoire_numérique #signe_fonctionel #fonction_formatique #usage #réseaux_sociaux #métadonnées

    oAnth_RSS @oanth_rss CC BY
    • @02myseenthis01
      oAnth @02myseenthis01 CC BY 23/08/2017

      cf. ▻https://seenthis.net/messages/624097 [de ;fr]

      oAnth @02myseenthis01 CC BY
    Écrire un commentaire
  • @changaco
    Changaco @changaco CC BY-SA 13/12/2015

    A couple of email privacy tips:

    Make sure your email client isn’t leaking your local hostname. For example if you use Claws Mail ►http://www.claws-mail.org enable the “Send account mail address in Message-ID” in each account’s settings.

    If you run your own SMTP server make sure it’s not leaking your IP address. For example if you use OpenSMTPD ▻https://opensmtpd.org use its “mask-source” option:

    listen on net0 port 587 tls pki example.net auth mask-source

    Note: only use that option on submission ports and not on port 25 otherwise it’ll mask the source of incoming messages as well as outgoing ones.

    #email #smtp #privacy #metadata

    Changaco @changaco CC BY-SA
    Écrire un commentaire
  • @martinlessard
    martinlessard @martinlessard CC BY-NC-SA 2/09/2015

    TGit : sauver votre culture
    ▻http://www.zeroseconde.com/2015/09/tgit-sauver-votre-culture

    http://www.zeroseconde.com/wp-content/uploads/2015/09/jeanrobertbisaillon.jpg

    Baladodiffusion #M2 numéro 29 TGit : sauver votre culture Jean-Robert Bisaillon milite depuis longtemps dans le monde de la musique au Québec et s’intéresse aux enjeux de la musique numérique. Quand il dit s’intéresser aux métadonnées, c’est parce que tout le monde a intérêt aussi à s’y intéresser. Sinon, oubliez vouloir retrouver votre culture en ligne. […]

    #Metadata

    martinlessard @martinlessard CC BY-NC-SA
    Écrire un commentaire
  • @notabene
    Stéphane Deschamps @notabene CC BY-NC-SA 6/01/2015
    10
    @rastapopoulos
    @fil
    @reflets
    @james
    @7h36
    @monolecte
    @whilelm
    @colporteur
    @rezo
    10

    Rien à cacher : Reflets
    ▻http://reflets.info/rien-a-cacher

    Quand on est, comme moi, un vieil activiste désabusé, il y a des lieux et des moments où on s’attend à déposer les armes.

    Se reposer l’esprit en assistant à un débat réunissant des gens qui partagent nos idées. Écouter tranquillement sans avoir à repérer les pièges et les non-dits. Lâcher prise.

    Et puis, paf le chien.

    #vie_privée

    Stéphane Deschamps @notabene CC BY-NC-SA
    • @simplicissimus
      Simplicissimus @simplicissimus 6/01/2015

      http://i2.wp.com/reflets.info/wp-content/uploads/2015/01/y6ej1qcwlcgtowjwz3uk.jpg

      Simplicissimus @simplicissimus
    • @fil
      Fil @fil 6/01/2015
      @laurent

      par @laurent

      Fil @fil
    • @colporteur
      colporteur @colporteur CC BY-NC-SA 19/01/2015

      Mais ce qui constitue la vraie nouveauté, l’information principale du programme #PRISM et de ses suites, c’est que l’information recherchée n’est pas ce que nous disons, mais à qui nous le disons. Le contenu de nos conversations reste intéressant bien sûr (surtout pour les entreprises qui ont intérêt à tout savoir de nos vies), mais pas tellement pour les états. Ce que veulent les états, c’est tout savoir de nos réseaux.

      Ce sont nos « #metadatas » qu’ils stockent, pour ensuite pouvoir, quand bon leur semble, décider qui #surveiller plus spécifiquement.

      colporteur @colporteur CC BY-NC-SA
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 15/11/2014

    We have #Metadata Games for every type of player! Challenge your friends or play by yourself!

    ▻http://www.metadatagames.org
    #crowdsourcing

    • #player
    grommeleur @grommeleur
    Écrire un commentaire
  • @cdb_77
    CDB_77 @cdb_77 25/10/2014
    4
    @fil
    @grommeleur
    @goom
    @touti
    4
    @albertocampiphoto

    Aidez le #CERN avec ses photos mystères

    Au cours de ses 50 ans d’existence le CERN a accumulé des archives photographiques contenants plus de 250 000 images dont 120 000 en noir et blanc prises entre 1955 et 1985.
    Il y a une grande diversité dans les images déjà en ligne avec des photos qui vont du suivi de chantier à la photo technique d’expérience en passant par des événements sociaux et des images plus éditoriales.
    Un gros effort est en cours pour toutes les numériser et les placer sur internet mais le CERN fait face à un gros problème : une partie de ces images n’ont pas été accompagnées de légendes.
    Ils ont donc décidés de progressivement mettre les photos en ligne et de faire appel au public pour essayer d’identifier ce que les photographies montrent.
    Vous pouvez aller voir les archives ( il y a déjà plus de 13 000 photos disponibles et plusieurs centaines sont ajoutées chaque semaine ) et si vous reconnaissez quelqu’un, un lieu ou un équipement, n’hésitez pas à les prévenir.

    http://www.laboiteverte.fr/wp-content/uploads/2014/10/01-photo-mystere-CERN-70-2-051-870x705.jpg http://www.laboiteverte.fr/wp-content/uploads/2014/10/07-photo-mystere-CERN-65-9-057-795x800.jpg http://www.laboiteverte.fr/wp-content/uploads/2014/10/03-photo-mystere-CERN-65-1-324-870x694.jpg

    ▻http://www.laboiteverte.fr/aidez-cern-ses-photos-mysteres

    #archive
    cc @albertocampiphoto

    CDB_77 @cdb_77
    • @grommeleur
      grommeleur @grommeleur 25/10/2014

      #metadata #crowdsourcing

      http://static1.seenthis.net/local/cache-vignettes/L179xH180/07-photo-mys4538-6ac50.jpg

      1947 : Invention du suppositoire

      grommeleur @grommeleur
    • @nidal
      Nidal @nidal CC BY 25/10/2014

      Faudrait demander à Brave Patrie : ils ont une section spécialement destinée à demander à leurs lecteurs de trouver la légende des photos.

      Sinon, pour la troisième image que tu as reproduite ici, c’est facile :

      http://drapeaux.d.r.pic.centerblog.net/cdwzrvvg.png

      Nidal @nidal CC BY
    • @touti
      vide @touti 15/11/2014

      http://www.laboiteverte.fr/wp-content/uploads/2014/10/01-photo-mystere-CERN-70-2-051-870x705.jpg

      Tchernobyl 1986

      Allo le Kremlin ? y’a le bouton rouge qui s’est allumé

      vide @touti
    Écrire un commentaire
  • @booz
    BoOz @booz 18/09/2014

    Just how much information can be squeezed from one week of your #metadata? | Naked Security
    ▻http://nakedsecurity.sophos.com/2014/09/16/just-how-much-information-can-be-squeezed-from-one-week-of-you

    So the next time you hear a politican append the word “only”, “mere” or “just” to the term “metadata”, think of Ton Siedsma.

    Think about how much you now know about him. Bear in mind that this intimate, detailed portrait comes courtesy of your mobile phone and the immense wealth of metadata it has the power to silently hand over.

    #mega_données #espionnage #vie_privée

    • #cellular telephone
    BoOz @booz
    • @thibnton
      tbn @thibnton PUBLIC DOMAIN 18/09/2014

      #métadonnées

      tbn @thibnton PUBLIC DOMAIN
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 8/09/2014

    W3C Publishes Linked Data Platform Best Practices and Guidelines
    ▻http://semanticweb.com/w3c-publishes-linked-data-platform-best-practices-guidelines_b44199

    The W3C’s Linked Data Platform (LDP) Working Group has published a document outlining best practices and guidelines for implementing Linked Data Platform servers and clients.

    ▻http://www.w3.org/TR/ldp-bp
    #metadata #semantic

    grommeleur @grommeleur
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 29/05/2014

    Algorithms and crowd-sourcing for digital archives
    ▻http://www.create-hub.com/comment/algorithms-and-crowd-sourcing-for-digital-archives

    With 50,000 radio programmes, spanning 45 years, it is always going to be a challenge to create a useful archive. But how do you archive programmes when you are not even sure what they are about? Tristan Ferne explains how the BBC Research & Development team overcame this exact challenge.

    #metadata #audio

    grommeleur @grommeleur
    Écrire un commentaire
  • @severo
    severo @severo PUBLIC DOMAIN 9/05/2014

    CSW Client Library for JavaScript : the Adventure Begins « tommy’s scratchpad
    ▻http://www.kralidis.ca/blog/2014/04/28/csw-client-library-for-javascript-the-adventure-begins

    Une nouvelle librairie pour récupérer les metadonnées (auteur, dates, références, etc.) associées aux données géographiques, pour le standard web CSW - c’est l’equivalent en javascript de OWSLib pour python.

    ▻https://github.com/tomkralidis/csw4js

    #csw #map #metadata #geo #javascript

    severo @severo PUBLIC DOMAIN
    Écrire un commentaire
  • @fil
    Fil @fil 15/02/2014
    1
    @reka
    1

    You Know Who Else Collected Metadata? The Stasi. - ProPublica
    ▻http://www.propublica.org/article/how-the-stasi-spied-on-social-networks

    The East German secret police, known as the Stasi, were an infamously intrusive secret police force. (...) [but it] was also technologically primitive by today’s standards. While researching my book Dragnet Nation, I obtained the above hand drawn social network graph and other files from the Stasi Archive in Berlin, where German citizens can see files kept about them and media can access some files, with the names of the people who were monitored removed.

    The graphic shows forty-six connections, linking a target to various people (an “aunt,” “Operational Case Jentzsch,” presumably Bernd Jentzsch, an East German poet who defected to the West in 1976), places (“church”), and meetings (“by post, by phone, meeting in Hungary”).

    http://www.propublica.org/images/uploads/ht_stasi_network_analysis_940px_140211.jpg

    #metadata #surveillance #stasi #NSA

    Fil @fil
    Écrire un commentaire
  • @kassem
    Kassem @kassem CC BY-NC-SA 10/02/2014
    2
    @simplicissimus
    @fil
    2

    The NSA’s Secret Role in the U.S. Assassination Program
    ▻https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role

    According to a former drone operator for the military’s Joint Special Operations Command (#JSOC) who also worked with the #NSA, the agency often identifies targets based on controversial #metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the #CIA or the U.S. military then orders a strike based on the activity and location of the #mobile phone a person is believed to be using.

    The #drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

    His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward #Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in #Iraq, #Afghanistan and #Yemen.

    (...)

    One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different #SIM_cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

    Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

    As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

    “Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

    (...)

    What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

    “People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones , in the hopes that the person on the other end of that missile is the bad guy.”

    #métadonnées

    • #Afghanistan
    • #Somalia
    • #United States
    • #Yemen
    • #drone operator
    • #Central Intelligence Agency
    • #Joint Special Operations Command
    • #NSA
    • #Taliban
    • #Brandon Bryant
    • #cellular telephone
    Kassem @kassem CC BY-NC-SA
    • @kassem
      Kassem @kassem CC BY-NC-SA 10/02/2014

      En 2011 #Gareth_Porter avait déjà dit l’essentiel
      ▻http://www.truth-out.org/news/item/3588:how-mcchrystal-and-petraeus-built-an-indiscriminate-killing-machine

      Although the raids have undoubtedly killed a large number of Taliban commanders and fighters, it is now clear that they also killed and incarcerated thousands of #innocent civilians. The failure to discriminate between combatants and civilians flows directly from a targeting methodology that is incapable of such discrimination.

      (...)

      ... McChrystal’s operation relied on far more mundane technologies than Woodward’s sensational language suggested. In a new book, “Task Force Black,” by Mark Urban, the diplomatic editor at BBC’s “Newsnight,” reveals that McChrystal’s command gathered intelligence on al-Qaeda and Mahdi Army personnel from three well-known technologies: 24-hour surveillance by drone aircraft, monitoring of mobile phone traffic and pinpointing the physical location of the phones from their signals.

      (...)

      Targeting Phone Numbers, Not People

      #victimes_civiles

      Kassem @kassem CC BY-NC-SA
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 17/01/2014

    Speaker Identification for the whole World Service Archive
    ▻http://www.bbc.co.uk/rd/blog/2014/01/speaker-identification-for-the-whole-world-service-archive

    The World Service Radio Archive project aims to improve the #metadata available for the archive, by combining metadata extracted automatically from the audio, and crowd-sourced metadata generated by users.

    #crowd-sourcing

    • #Identification
    • #speaker
    grommeleur @grommeleur
    Écrire un commentaire
  • @cdb_77
    CDB_77 @cdb_77 8/01/2014
    @albertocampiphoto

    Discover Europe’s television heritage

    EUscreen offers free online access to videos, stills, texts and audio from European broadcasters and audiovisual archives. Explore selected content from early 1900s until today.

    Although audiovisual content is now being digitised and some of it is already available online, access to audiovisual archives, television in particular, remains fractured and scattered. #EUscreen has developed a content selection policy and #metadata framework that aligns the heterogeneous collections held throughout #Europe and encourages the exploration of Europe’s rich and diverse cultural history and European television history in particular. As one of the main audiovisual content aggregators for Europeana, EUscreen and its collection is also connected to an online collection of millions of digitized items from European museums, libraries and archives.

    http://euscreen.eu/images/ic_logo_white.png

    ▻http://euscreen.eu

    #TV #archive #archive_audiovisuelle #images #open_source #vidéo #audio #télévision #histoire

    cc @albertocampiphoto

    • #Europe
    • #free online access
    CDB_77 @cdb_77
    • @cdb_77
      CDB_77 @cdb_77 23/01/2014
      @fil @reka

      En lien avec cela, j’ai aussi découvert, à un séminaire qui a été organisé par EuScreen :

      #Historiana, your portal to the past
      ▻http://historiana.eu
      #histoire

      The #European_library :
      ▻http://www.theeuropeanlibrary.org/tel4

      Designed to meet the needs of the research community worldwide, our online portal offers quick and easy access to the collections of the 48 National Libraries of Europe and leading European Research Libraries.

      #bibliothèque

      #Europhoto :
      ▻http://www.europhoto.eu.com/heux/index.pl?cache=159127418053950.38

      Pictures in this huge archives are among the most valuable historical documents of the last century. They record the major domestic and international events (political, social, cultural, sporting), celebrities and daily life from the turn of the century to the mid 1990.

      #photographie #photo

      #Europeana, think #culture :
      ▻http://europeana.eu/portal

      Europeana #fashion :

      Europeana Fashion is a best practice network co-funded under the CIP ICT-PSP program and composed of 22 partners from 12 European countries, which represent the leading European institutions and collections in the fashion domain. The consortium will aggregate and provide Europeana with outstanding and rich material about the history of European fashion, including more than 700.000 fashion-related digital objects, ranging from historical dresses to accessories, photographs, posters, drawings, sketches, videos, and fashion catalogues.

      ▻http://www.europeanafashion.eu/portal/home.html
      #mode

      #archive #open_source

      cc @fil @reka

      CDB_77 @cdb_77
    Écrire un commentaire
  • @kassem
    Kassem @kassem CC BY-NC-SA 16/12/2013
    1
    @fil
    1

    Federal Judge: NSA’s ’Almost-Orwellian’ Data Collection Likely Violates Constitution
    ▻http://www.thewire.com/politics/2013/12/federal-judge-nsas-almost-orwellian-phone-data-collection-likely-violates-constitution/356207

    For the first time, a public court has determined that the National Security Agency’s collection of #metadata on Americans’ phone calls probably violates the Constitution and should be stopped.

    That’s the short version of a ruling on the NSA’s bulk collection of phone records released by the D.C. District Court on Monday. The injunction ruling determined that the plaintiffs had standing to file a lawsuit — in other words, that they were affected by the NSA’s data collection — and that a court would likely find that the collection violated the Fourth Amendment of the Constitution. Given that the plaintiffs suffered « irreparable harm » from the data collection, the court determined that the data collection should be halted — though that order was withheld, pending appeal.

    Un tribunal de Washington juge les agissements de la #NSA illégaux
    ▻http://www.rts.ch/info/monde/5462084-un-tribunal-de-washington-juge-les-agissements-de-la-nsa-illegaux.html

    Pour la première fois, le programme de #surveillance de l’agence américaine NSA a été jugé illégal par un tribunal, invoquant une « atteinte à la vie privée ».
    Un juge fédéral d’un tribunal civil de Washington a pour la première fois lundi infligé un revers au programme de surveillance de la NSA, estimant que la collecte de #métadonnées du téléphone d’un particulier constituait une « atteinte à la #vie_privée ».

    Dans une injonction préliminaire, le juge Richard Leon qualifie la collecte à grande échelle des métadonnées téléphoniques (numéros appelés, durée des appels...) sans feu vert préalable de la Justice d’"atteinte à la vie privée".

    Collecte des données interdite
    « Il est évident qu’un tel programme empiète » sur les valeurs défendues par le #quatrième_amendement de la #Constitution_américaine relatif à la protection de la vie privée, écrit le juge Leon.

    La Cour a interdit au gouvernement de collecter les métadonnées téléphoniques des deux plaignants. Si cette décision est remarquable de par son caractère inédit, le juge a cependant décidé de renvoyer le dossier vers une cour d’appel qui devra se prononcer sur le fond.

    • #For the first time
    • #National Security Agency
    Kassem @kassem CC BY-NC-SA
    • @kassem
      Kassem @kassem CC BY-NC-SA 16/12/2013

      Réaction de Snowden :
      ▻http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone-data-program.html?_r=0

      In a statement distributed by the journalist Glenn Greenwald, who was a recipient of leaked documents from Mr. #Snowden and who wrote the first article about the bulk data collection, Mr. Snowden hailed the ruling.

      “I acted on my belief that the N.S.A.’s mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts,” Mr. Snowden said. “Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”

      Kassem @kassem CC BY-NC-SA
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 15/12/2013
    3
    @fil
    @simplicissimus
    3

    A million first steps
    ▻http://britishlibrary.typepad.co.uk/digital-scholarship/2013/12/a-million-first-steps.html

    We have released over a million images onto Flickr Commons for anyone to use, remix and repurpose. These images were taken from the pages of 17th, 18th and 19th century books digitised by Microsoft who then generously gifted the scanned images to us, allowing us to release them back into the Public Domain.

    Merci MS ;-)

    Which brings me to the point of this release. We are looking for new, inventive ways to navigate, find and display these ’unseen illustrations’.

    #navigation

    • #Microsoft
    grommeleur @grommeleur
    • @fil
      Fil @fil 15/12/2013

      #domaine_public #scan

      Fil @fil
    • @grommeleur
      grommeleur @grommeleur 16/12/2013

      The British Library Just Made One Million Images Public Domain, and It’s a Big Deal
      ▻http://theappendix.net/blog/2013/12/the-british-library-just-made-one-million-images-public-domain

      Our intention is to use this data to train automated classifiers that will run against the whole of the content. The data from this will be as openly licensed as is sensible (given the nature of crowdsourcing) and the code, as always, will be under an open license.

      grommeleur @grommeleur
    • @fil
      Fil @fil 16/12/2013

      fabuleux, #data_mining

      an early #data_visualization of historical information, but I have no idea what.
      R. Quinton, The Chromatographic Chronicle of English History, illustrated by ... coloured charts (London, 1864)

      http://s3.amazonaws.com/appendixjournal-images/images/attachments/000/000/942/medium/QUINTON__R._%22The_Chromatographic_Chronicle_of_English_History__illustrated_by_..._coloured_charts__(London__1864).jpg

      Fil @fil
    • @simplicissimus
      Simplicissimus @simplicissimus 16/12/2013
      @fil

      @fil
      Effectivement, c’est particulièrement alléchant !
      Apparemment, il y a, au moins, 4 dimensions représentées. Et contrairement à ce que dit le début de la légende — que tu as tronqué —

      A good example of how the metadata sometimes isn’t sufficient - this is clearly an early data visualization of historical information, but I have no idea what.

      ce qui manque ici ce sont justement les #métadonnées.

      À force de se gaver des #metadata de la NSA, on finit par oublier que métadonnées veut juste dire description des données…

      PS : apparemment, cette image n’a été reprise nulle part bien que le bouquin dont elle est issue soit réédité.

      Simplicissimus @simplicissimus
    • @grommeleur
      grommeleur @grommeleur 16/12/2013

      Knight v Snail
      ▻http://britishlibrary.typepad.co.uk/digitisedmanuscripts/2013/09/knight-v-snail.html
      ▻http://britishlibrary.typepad.co.uk/.a/6a00d8341c464853ef019aff95ab29970c-800wi
      Knight v Snail II: Battle in the Margins (from the Gorleston Psalter, England (Suffolk), 1310-1324

      grommeleur @grommeleur
    • @simplicissimus
      Simplicissimus @simplicissimus 16/12/2013

      De la généalogie ?
      Mais alors, pourquoi la division en quatre ? Deux générations ?

      Simplicissimus @simplicissimus
    Écrire un commentaire
  • @fil
    Fil @fil 17/10/2013
    4
    @simplicissimus
    @liotier
    @thibnton
    @reka
    4

    The Declassification Engine: Reading Between the Black Bars : The New Yorker
    ▻http://www.newyorker.com/online/blogs/elements/2013/10/the-declassification-engine-reading-between-the-black-bars.html

    the Declassification Engine (...) has “gotten to the point where we can see it might be possible to predict content of redacted text.

    ▻http://www.newyorker.com/online/blogs/elements/nsa-docs-580.jpeg

    #censure #secret #lol

    • #N.S.A.
    • #The New Yorker
    Fil @fil
    • @simplicissimus
      Simplicissimus @simplicissimus 17/10/2013

      #lol yes…
      Le Manuel du caviardage de la NSA…

      The rise of born-digital documents has brought new challenges: in 2009, the N.S.A. released an updated version of “Redacting with Confidence,” its how-to guide for the declassification of digital documents. The manual emphasizes a new set of actions; when working with a word processor, sanitizers must delete sensitive content, replace it with “innocuous text” to preserve formatting, and only then cover the innocuous text with a digitally drawn black—or, as it recommends, gray—box. “Complex file formats offer substantial avenues for hidden data,” it warns. “Once a user enters data into the document, effectively removing it can be difficult.”

      Ici, c’est la version de 03/2008 (pour Word 2007 et la production de pdf avec Acrobat)
      ▻http://www.nsa.gov/ia/_files/support/i733-028r-2008.pdf
      On trouve facilement des versions précédentes et, sur WP ▻http://en.wikipedia.org/wiki/Sanitization_(classified_information) , en note, la version de 2011 pour Acrobat X. Je n’ai pas trouvé plus récent.

      et aussi #metadata #métadonnées

      Together with a group of historians, computer scientists, and statisticians, Connelly is developing an ambitious project called the Declassification Engine, which, among other things, employs machine-learning and natural language processing to study the semantic patterns in declassified text. The project’s goals range from compiling the largest digitized archive of declassified documents in the world to plotting the declassified geographical metadata of over a million State Department cables on an interactive global map, which the researchers hope will afford them new insight into the workings of government secrecy.

      Simplicissimus @simplicissimus
    • @fil
      Fil @fil 23/10/2013
      @nautilus

      @nautilus en a fait un article aussi ▻http://seenthis.net/messages/187642

      Fil @fil
    Écrire un commentaire
  • @vlentz
    vlentz @vlentz CC BY-SA 20/06/2013

    AlchemyAPI | Transforming text into knowledge
    ▻http://www.alchemyapi.com

    Tags : #semantic #api #metadata

    • #API
    vlentz @vlentz CC BY-SA
    Écrire un commentaire
  • @grommeleur
    grommeleur @grommeleur 5/06/2013
    1
    @fil
    1

    Help tag this collection of BBC radio programmes from the past 45 years
    ▻http://worldservice.prototyping.bbc.co.uk

    BBC Research & Development is running an experiment with the BBC’s World Service radio archive to demonstrate how to put large media archives online using a combination of algorithms and people. With your help we aim to comprehensively and accurately tag this collection of BBC programmes.

    #crowdsourcing #archives #metadata

    • #BBC
    grommeleur @grommeleur
    Écrire un commentaire
  • @nhoizey
    Nicolas Hoizey @nhoizey CC BY-NC-SA 6/07/2011
    2
    @fil
    @julien
    2

    About #Migratr | Calling Shotgun
    ►http://www.callingshotgun.net/about/migratr

    Migratr is a #desktop #application which moves photos between popular #photo sharing services. Migratr will also #migrate your #metadata, including the titles, tags, descriptions and album organization. Whether you want to copy your photos from #Flickr to #Faces, #Picasa to #Phanfare, or #Zenfolio to #Zooomr, Migratr is the app for you. Migratr will copy your photos FROM any supported photo service, TO any supported photo service.

    #portability

    • #photo sharing services
    Nicolas Hoizey @nhoizey CC BY-NC-SA
    • @fil
      Fil @fil 6/07/2011

      super, par contre je ne vois pas si ça peut aussi sync en local ? J’ai 35000 images dans mon compte FlickR…

      Fil @fil
    • @fil
      Fil @fil 6/07/2011

      et je les recopie déjà en local avec un script maison, FlickrStore ►http://zzz.rezo.net/-Flickr-Store-.html

      Fil @fil
    • @nhoizey
      Nicolas Hoizey @nhoizey CC BY-NC-SA 6/07/2011

      J’avais vu ton script, effectivement. Je ne suis pas sûr que Migratr fasse le sync local.

      Nicolas Hoizey @nhoizey CC BY-NC-SA
    Écrire un commentaire
  • @owni
    OWNI [RSS] @owni 21/06/2011

    [POUR PRÉPARER MNW3] Interview de Michel Allain (SACEM) | Owni Music
    ►http://owni.fr/2011/06/21/pour-preparer-mnw3-interview-de-michel-allain-sacem

    Michel Allain, directeur de l’Organisation et des Systèmes d’Information de la SACEM répond aux questions de « Music.Net Works » afin de préparer la troisième édition portant sur les métadonnées de la musique le 22 juin à la Cantine.

    #Industrie_musicale #Sélection_Music #bureauexport #cantine #metadata #ownimusic #sacem #silicon_sentier

    • #Music.Net Works
    • #Owni Music
    • #Sélection Music
    • #Michel Allain
    OWNI [RSS] @owni
    Écrire un commentaire
  • @owni
    OWNI [RSS] @owni 21/06/2011

    [POUR PREPARER #MNW3] : Interview de Denis Gaucher | Owni Music
    ►http://owni.fr/2011/06/21/pour-preparer-mnw3-interview-de-denis-gaucher

    Le 22 juin à la Cantine, l’équipe de « Music.Net Works » aborde les problématiques liées aux #métadonnées de la musique. Afin de préparer cette session, Denis Gaucher, explique la base de données BIPP élaborée par Kantar Media.

    #Artistes #Top_music #bipp #bureauexport #cantine #metadata #MNW #ownimusic #silicon_sentier

    • #Music.Net Works
    • #Owni Music
    • #Denis Gaucher
    OWNI [RSS] @owni
    Écrire un commentaire
  • @0gust1
    0gust1 @0gust1 CC BY-NC 24/11/2008

    Pad.ma
    ►http://pad.ma

    Une mise en oeuvre d’0xdb

    #video #opensource #metadata #free #streaming #archive #collaborative #film #spipmedia2008 #spipbxl2008

    0gust1 @0gust1 CC BY-NC
    Écrire un commentaire
0 | 25

Thèmes liés

  • #métadonnées
  • #archive
  • #spipbxl2008
  • #cantine
  • #ownimusic
  • #semanticweb
  • #silicon_sentier
  • company: owni music
  • company: music.net works
  • #bureauexport
  • #spipmedia2008
  • #photo
  • #nsa
  • country: united states
  • #crowdsourcing
  • #vie_privée
  • #api
  • technology: cellular telephone
  • person: michel allain
  • url: music.net
  • continent: europe
  • company: sélection music
  • #artistes
  • #sacem
  • #sélection_music
  • #top_music
  • #mnw3
  • #zooomr
  • #snowden
  • #desktop
  • #surveillance
  • #audio
  • #semantic
  • #metadata
  • #histoire
  • #open_source
  • #lol
  • #migratr
  • #application
  • industryterm: photo sharing services