Amazon is holding a high stakes shareholder vote on whether or not to limit some of its cutting edge technology, Shareholders hold back their own company because of users’ privacy when they’re offline//Natasha Singer, The New York Times
Facebook CEO Mark Zuckerberg oversaw plans to consolidate the social network’s power and control competitors by treating its users’ data as a bargaining chip, while publicly proclaiming to be protecting that data, according to about 4,000 pages of leaked company documents largely spanning 2011 to 2015 and obtained by NBC News.
The documents, which include emails, webchats, presentations, spreadsheets and meeting summaries, show how Zuckerberg, along with his board and management team, found ways to tap Facebook’s trove of user data — including information about friends, relationships and photos — as leverage over companies it partnered with.
Facebook turns to Twitter to explain outages
On Wednesday, in what seemed like a major shift, Mark Zuckerberg wrote that he wants to reorient Facebook around private, encrypted, and ephemeral messaging, rather than public sharing. This could have significant implications not just for regulators, who have been trying to get Facebook to crack down on offensive and violent content, but also for the future of news and information—including misinformation.
To see the warfare of the future, head to the top floor of a nondescript office tower on a potholed street on the scruffy outskirts of Ukraine’s capital. There, next to a darkened conference room, engineers sit at dark gray monitors, waging war with lines of code.
“Attacks are happening every day,” says Oleh Derevianko, founder of the Ukrainian cybersecurity firm that employs them, Information Systems Security Partners. “We never thought we were going to be the front line of cyber and hybrid war.”
There may be no better place to witness cyber conflict in action than Ukraine today. Open warfare with Russia, a highly skilled, computer-literate pool of talent and a uniquely vulnerable political, economic and IT environment have made the country the perfect sandbox for those looking to test new cyberweapons, tactics and tools.
“Ukraine is live-fire space,” says Kenneth Geers, a veteran cybersecurity expert and senior fellow at the Atlantic Council who advises NATO’s Tallinn cyber center and spent time on the ground in Ukraine to study the country’s cyber conflict. Much like global powers fought proxy wars in the Middle East or Africa during the Cold War, Ukraine has become a battleground in a cyberwar arms race for global influence.
Derevianko’s outfit works closely with the Ukrainian government and its U.S. and European allies to fend off onslaughts against the country’s networks. On the other side of the virtual front line: Not just sophisticated Russian-affiliated hacker groups like Fancy Bear, Cozy Bear and Sandworm — the group behind “NotPetya,” the most devastating cyberattack to date — but also hosts of other governmental, nongovernmental and criminal players testing out their capabilities on the country’s networks.