Facebook’s psychological experiments and Edward Snowden’s NSA leaks epitomize a world of increasing information awareness in the social media ecosystem. With over a billion monthly active users, Facebook as a nation is overtaking China as the largest country in the world.
President Barack Obama, in his 2011 State of the Union Address, called America “the nation of Edison and the Wright brothers” and “of Google and Facebook.” U.S. Chief Information Officer Steven VanRoekel opines that America has become a “Facebook nation” that demands increased transparency and interactivity from the federal government.
Ubiquitous social networks such as Facebook, Google+, Twitter, and YouTube are creating the technologies, infrastructures, and big data necessary for Total Information Awareness – a controversial surveillance program proposed by DARPA after the 9/11 attacks. NSA’s secret PRISM program has reinvigorated WikiLeaks founder Julian Assange’s accusation that “Facebook is the most appalling spying machine that has ever been invented.” Facebook CEO Mark Zuckerberg once said, “We exist at the intersection of technology and social issues.” This book offers discourse and practical advice on the privacy issue in the age of big data, business intelligence in social media, e-government and e-activism, as well as personal total information awareness.
This expanded edition also includes insights from Wikipedian Emily Temple-Wood and Facebook ROI experts Dennis Yu and Alex Houg.
Technical report representing the State of the Art of IoT Honeypots developed for the Seminar in Advanced Topics in Computer Science course of the Master Degree in Engineering in Computer Science curriculum in Cyber Security at University of Rome "La Sapienza".
The paper presents which are the current technologies for honeypots systems together with an introduction to IoT Malware and Botnets & Distributed Denial of Service (DDoS) attacks.
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecuritySymantec
Who should read this paper
For business leaders. In this sophisticated threat environment,traditional security tactics are failing. Symantec™ encourages organisations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists,but through evaluations based on the current threat environment and the acceptable risk level for the organisation. This whitepaper presents best practice-based approaches recommended for minimising cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
The most comprehensive iPad tips and tricks ebook, where you can find extremely useful and interesting iPad tips and tricks, whether you are an iPad rookie or iPad expert.
Technical report representing the State of the Art of IoT Honeypots developed for the Seminar in Advanced Topics in Computer Science course of the Master Degree in Engineering in Computer Science curriculum in Cyber Security at University of Rome "La Sapienza".
The paper presents which are the current technologies for honeypots systems together with an introduction to IoT Malware and Botnets & Distributed Denial of Service (DDoS) attacks.
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecuritySymantec
Who should read this paper
For business leaders. In this sophisticated threat environment,traditional security tactics are failing. Symantec™ encourages organisations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists,but through evaluations based on the current threat environment and the acceptable risk level for the organisation. This whitepaper presents best practice-based approaches recommended for minimising cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
The most comprehensive iPad tips and tricks ebook, where you can find extremely useful and interesting iPad tips and tricks, whether you are an iPad rookie or iPad expert.
There will be more change in the next 10 years than there has been in the previous 100. This paper describes these expected foundational shifts and explains how we can manage them to our advantage.
In their latest discussion presentation "Winning the Game", Geoff Hollingworth, Ericsson North America Evangelist, in collaboration with Jason Hoffman, founder and CTO of Joyent, discuss what these changes will mean for devices, the cloud and the network.
This interactive presentation is supported by 8 videos. It describes the foundational changes that will occur across industries and networks, and attempts to explain how we can manage them to our advantage. The target audience of this paper is those who are involved in planning, building and profitably operating digital networks.
My presentation from SMX Stockholm, 2012. My 'link building dos and don'ts' focus on some of the lessons I've learn't in the past whilst working for a variety of brands in competitive spaces.
Credit unions looking to take advantage of social media now and to be prepared for future compliance, they must consider the regulations that are already in place that govern other forms of electronic communications. Additionally, as major financial regulatory bodies around the globe, such as FINRA and the FSA, begin to issue additional guidelines to specifically include social media, it is clear that it is only a matter of time before the NCUA clarifies their position.
Samsung is World’s second largest Mobile manufacturing company launching various groundbreaking and attractive mobiles in all range of price from low to high. Samsung R680 Repp has 3.2-inch TFT touchscreen display with 320 X 480 pixels resolution. It has 3.15 MP camera with digital zoom, FM Radio with recorder, multi format music player with 3.5mm audio jack, and social networking integration.
There will be more change in the next 10 years than there has been in the previous 100. This paper describes these expected foundational shifts and explains how we can manage them to our advantage.
In their latest discussion presentation "Winning the Game", Geoff Hollingworth, Ericsson North America Evangelist, in collaboration with Jason Hoffman, founder and CTO of Joyent, discuss what these changes will mean for devices, the cloud and the network.
This interactive presentation is supported by 8 videos. It describes the foundational changes that will occur across industries and networks, and attempts to explain how we can manage them to our advantage. The target audience of this paper is those who are involved in planning, building and profitably operating digital networks.
My presentation from SMX Stockholm, 2012. My 'link building dos and don'ts' focus on some of the lessons I've learn't in the past whilst working for a variety of brands in competitive spaces.
Credit unions looking to take advantage of social media now and to be prepared for future compliance, they must consider the regulations that are already in place that govern other forms of electronic communications. Additionally, as major financial regulatory bodies around the globe, such as FINRA and the FSA, begin to issue additional guidelines to specifically include social media, it is clear that it is only a matter of time before the NCUA clarifies their position.
Samsung is World’s second largest Mobile manufacturing company launching various groundbreaking and attractive mobiles in all range of price from low to high. Samsung R680 Repp has 3.2-inch TFT touchscreen display with 320 X 480 pixels resolution. It has 3.15 MP camera with digital zoom, FM Radio with recorder, multi format music player with 3.5mm audio jack, and social networking integration.
These are the first 4 chapters of my book Refresh the Road Ahead (www.refreshroadahead.com). A book on how to work successfully with Microsoft. The full book is 12 chapters and 260 pages and you can buy it from the website www.refreshroadahead.com or on Amazon
Dotcomology The Science Of Making Money Online By Stone Evanslubano
Tired of spending money to learn how to market online? Now you can learn it for free. All the info you need can be found in "Dotcomology The Science Of Making Money Online" by Stone Evans.
Spring Security requires a Java 8 or higher Runtime Environment.
As Spring Security aims to operate in a self-contained manner, you do not need to place any special
configuration files in your Java Runtime Environment. In particular, you need not configure a
special Java Authentication and Authorization Service (JAAS) policy file or place Spring Security
into common classpath locations.
Similarly, if you use an EJB Container or Servlet Container, you need not put any special
configuration files anywhere nor include Spring Security in a server classloader. All the required
files are contained within your application.
This design offers maximum deployment time flexibility, as you can copy your target artifact (be it a
JAR, WAR, or EAR) from one system to another and it immediately works.
The report describes wireless applications in media, location based services, medical, telematics and unified messaging enabled by storage area networks.
Ralph Stuyver (2006) Interactive Brand Identity Designrealaudience
The thesis (2006) analyses existing design processes for online (interactive) brand identity design, and shows that none of them is apt to meet the new demands of the interactive Age. A new process is clearly needed, and here proposed and evaluated at several main Dutch Design agencies. This new design process will be applicable for both corporate brands and product brands, and is specifically aimed at the field of interactive brand design, such as website design.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
1. vii
Contents
Part I Prologue
1 From 1984 to Total Information Awareness ......................................... 3
1.1 President Ronald Reagan in 1984 .................................................. 3
1.2 Total Information Awareness ......................................................... 6
1.3 Edward Snowden’s NSA Leaks and PRISM.................................. 9
1.4 Social Networks’ Responses to NSA Leaks and PRISM............... 12
1.5 Reform Government Surveillance and Reset the Net .................... 14
References................................................................................................. 16
Part II Privacy in The Age of Big Data
2 Social Networks and Privacy ................................................................. 23
2.1 Zero Privacy and the Central Intelligence Agency......................... 24
2.2 The Archer, Carrier Pigeons, and President Jimmy Carter............ 24
2.3 The Pervasiveness of Facebook...................................................... 26
2.4 Chairs Are Like Facebook.............................................................. 27
2.5 Facebook and Personal Privacy...................................................... 28
2.6 Facebook Friends and Personal Privacy......................................... 31
2.7 Facebook, Children, and COPPA................................................... 32
2.8 Facebook, Peer Pressure, and Social Issues................................... 34
2.9 Reality TV and Social Media......................................................... 36
2.10 YouTube and Facebook Videos: Am I Pretty or Ugly?.................. 37
2.11 Netflix and Social Apps on Facebook............................................ 39
2.12 Facebook Timeline and Open Graph.............................................. 40
2.13 Ambient Social Apps ..................................................................... 41
2.14 Stalking Apps and Facebook for Sex............................................. 43
2.15 Facial Recognition Apps................................................................ 44
2.16 Facial Recognition on Facebook, Google+, and iPhone................ 45
2.17 Virtual Passports: from Privacy to Data Use.................................. 48
2. viii
2.18 Social Search: Google, plus Your World & Microsoft’s Bing ....... 49
2.19 Self-Destructing Messages............................................................. 51
2.20 Facebook Anonymous Login ......................................................... 52
2.21 Anonymous Social Apps................................................................ 53
2.22 Responses to Zero Privacy ............................................................. 55
References................................................................................................. 56
3 Smartphones and Privacy ...................................................................... 71
3.1 Smartphones................................................................................... 71
3.2 Location Tracking on iPhone and iPad .......................................... 72
3.3 Carrier IQ ....................................................................................... 73
3.4 Smartphone Data Collection Transparency.................................... 74
3.5 Always On...................................................................................... 75
3.6 Mobile Apps Privacy Invasion ....................................................... 76
3.7 Mobile Apps for Children.............................................................. 77
3.8 Android Market and Google Play .................................................. 78
3.9 Apple’s App Store.......................................................................... 79
3.10 Facebook App Center..................................................................... 80
References................................................................................................. 80
4 Privacy Breaches..................................................................................... 85
4.1 Google Street View ........................................................................ 85
4.2 Google Easter Eggs in Disguise..................................................... 87
4.3 Apple Software Bugs ..................................................................... 89
4.4 Facebook User Tracking Bug and Online Behavioral Tracking .... 90
4.5 Carrier IQ and Other Privacy Blunders.......................................... 91
References................................................................................................. 93
Part III Business Intelligence in Social Media
5 Business Intelligence............................................................................... 97
5.1 Intelligent Digital Billboards.......................................................... 97
5.2 Data Mining: Amazon.com, Lowe’s, Target, True&Co................. 98
5.3 Tumblr and Gmail: Yes to Advertisements.................................... 99
5.4 Social Ads on Facebook................................................................. 100
5.5 News Feed, Sponsored Stories, Custom Stories,
and Facebook Exchange................................................................. 102
5.6 Mobile Market 2011-Present: Facebook for Every Phone............. 103
5.7 Mobile Market 2012-Present: Instagram and Mobile
App Install Ads .............................................................................. 104
5.8 Mobile Market 2013-Present: Facebook Home and Parse............. 105
5.9 Mobile Market 2014-Present: WhatsApp
and Facebook Audience Network .................................................. 105
5.10 Location-based Mobile Advertisements ........................................ 107
5.11 Business Communications on Facebook........................................ 108
5.12 B2B, B2C, and H2H on Social Media ........................................... 109
References................................................................................................. 110
Contents
3. ix
6 Facebook Analytics, Advertising, and Marketing ............................... 117
Dennis Yu and Alex Houg
6.1 The Viral Cycle .............................................................................. 117
6.2 Metrics Analysis Action (MAA).................................................... 118
6.3 Everything You Need to Know about
Website Custom Audiences (WCA)............................................... 120
6.4 Ten Questions Any Facebook Marketing Consultant
should be Able to Answer.............................................................. 121
6.5 The Insider’s Guide to Facebook Traffic........................................ 123
6.6 Using Exclusion Targeting to Filter Out Unwanted Targets .......... 125
6.7 Guess Where Users are Spending More
Time — TV or Mobile/Web?......................................................... 126
6.8 The Mechanics of Facebook Ad Budgeting................................... 128
6.9 How Spending a Few Dollars on Facebook
can Turn You into an Influencer..................................................... 132
6.10 The Danger of Buying Facebook Fans........................................... 133
6.11 How to Tell if Your Ad is Working and Diagnose
Newsfeed Burnout.......................................................................... 135
References................................................................................................. 136
7 Consumer Privacy in the Age of Big Data............................................ 139
7.1 Oil of the Digital Age..................................................................... 139
7.2 Data Brokers: The Good, the Bad and the Ugly ............................ 140
7.3 Consumer Privacy Bill of Rights.................................................... 141
7.4 Federal Trade Commission Privacy Report ................................... 143
7.5 California Online Privacy Protection Act ...................................... 144
7.6 European Union’s “Right to be Forgotten” Law............................ 144
References................................................................................................. 146
Part IV The Rise of Facebook Nation
8 Twitter – a World of Immediacy............................................................ 151
8.1 The Pen is Mightier than the Sword............................................... 151
8.2 Citizen Journalists.......................................................................... 153
8.3 A World of Immediacy................................................................... 155
8.4 Prevalence of Twitter...................................................................... 156
8.5 Advertisements and Campaigns on Twitter ................................... 161
8.6 Cuban Twitter: ZunZuneo.............................................................. 162
8.7 Creative Uses of Twitter................................................................. 163
8.8 The Downside of Twitter................................................................ 164
References................................................................................................. 165
9 Misinformation and Disinformation ..................................................... 169
9.1 The War of the Worlds ................................................................... 169
9.2 Misinformation and Disinformation on Twitter and Facebook...... 170
9.3 Ramifications and Repercussions of Misinformation
and Disinformation......................................................................... 173
Contents
4. x
9.4 Trustworthiness of Wikipedia ........................................................ 175
9.5 Google Search Sabotage ................................................................ 177
9.6 Advertising Misinformation and Disinformation........................... 179
9.7 Authenticity of Facebook Profiles, Twitter Accounts,
and YouTube Videos ...................................................................... 180
9.8 Facebook Account Verification...................................................... 181
9.9 Twitter Verified Accounts............................................................... 182
9.10 Abuse of Power .............................................................................. 183
References................................................................................................. 184
10 Wikipedia and the New Web ................................................................. 189
Emily Temple-Wood
10.1 History of Wikipedia.................................................................... 189
10.2 Standard of Quality ...................................................................... 190
10.3 Learning Curve............................................................................. 192
10.4 Wikipedia as Major News Source................................................ 193
10.5 Wikipedians.................................................................................. 193
10.6 Acceptance of Wikipedia ............................................................. 195
10.7 Wikipedia Education Program ..................................................... 195
10.8 Systemic Bias and WikiProject Women Scientists ...................... 196
10.9 Native Language Wikipedias ....................................................... 197
10.10 Wikipedia Zero............................................................................. 197
References................................................................................................. 198
11 E-Government and E-Activism.............................................................. 201
11.1 President Barack Obama and Web 2.0......................................... 201
11.2 Gov 2.0 Apps ............................................................................... 205
11.3 The Kony 2012 Phenomenon....................................................... 208
11.4 Reactions to Kony 2012 ............................................................... 212
11.5 SOPA/PIPA Blackout Day ........................................................... 213
11.6 Reactions to SOPA/PIPA Blackout .............................................. 219
11.7 Battles over Internet Legislations – OPEN, ACTA, CISPA......... 220
11.8 Peace on Facebook and Facebook Donate................................... 221
11.9 Internet Activism and Occupy Democracy .................................. 223
11.10 Transnational (Arab-Israeli) Facebook Nation............................. 225
11.11 Internet Censorship in Western Democracies .............................. 226
11.12 Internet Censorship in China........................................................ 228
11.13 Arab Spring Uprisings, Egypt, Syria, Sandi Arabia,
and Turkey.................................................................................... 229
11.14 The Rise of Facebook Nation....................................................... 230
11.15 Electoral College, Social Network Constitution,
and Cyber Civil Rights................................................................. 232
References................................................................................................. 234
Contents
5. xi
Part V Total Information Awareness in Facebook Nation
12 Generation C in the Age of Big Data..................................................... 247
12.1 Digital Omnivores and Generation C........................................... 247
12.2 Big Data Research and Development Initiative ........................... 249
12.3 Big Data in Public Health and Economics................................... 249
12.4 Big Data in Facebook and Google ............................................... 250
References................................................................................................. 252
13 Living in Facebook Nation ..................................................................... 255
13.1 Digital Personalities and Identities............................................... 255
13.2 Intertwining Lives, Online and Offline ........................................ 256
13.3 Digital Footprint and Exhaust Data.............................................. 260
13.4 Social Media Regrets ................................................................... 261
13.5 Facebook Social Plug-in: Like..................................................... 263
13.6 Facebook Knows Who, When, and Where .................................. 265
13.7 Online Births and Deaths in Facebook Nation............................. 266
13.8 Memorialization on Facebook and Life after Death
on Social Networks ...................................................................... 267
13.9 The Facebook Cleanse or Face-to-Facebook ............................... 268
13.10 Connected Cars: In-vehicle Social Networks
and eXpressive Internet Architecture........................................... 269
13.11 Connected Home, Internet of Things, and Internet of Me........... 271
13.12 Internet Addiction and Digital Detox........................................... 272
References................................................................................................. 273
14 Personal Privacy and Information Management................................. 279
14.1 Personal Information for Sale ...................................................... 279
14.2 Personal Information at Risk........................................................ 281
14.3 Identity Theft Prevention ............................................................. 284
14.4 Password Protection..................................................................... 285
14.5 Password Security Questions ....................................................... 287
14.6 Privacy Protection ........................................................................ 288
14.7 Privacy on Facebook .................................................................... 289
14.8 Privacy on Google........................................................................ 291
14.9 Privacy on Smartphones............................................................... 293
14.10 Data Vault – Data is the New Oil................................................. 296
14.11 Personal Analytics and Social Networks ..................................... 297
14.12 Community Analytics and Social Networks................................ 298
References................................................................................................. 299
15 Personal Total Information Awareness ................................................. 305
15.1 Humanity’s Dashboard................................................................. 305
15.2 Ambient Awareness and Suicide Prevention................................ 307
15.3 Parental Awareness, School Bullying, and Cyberbullying........... 309
15.4 Student Awareness and School Safety ......................................... 313
Contents
6. xii
15.5 Crime Awareness and Video Surveillance ................................... 319
15.6 Community Awareness and Neighborhood Watch ...................... 321
15.7 Situational Awareness and Traffic Safety..................................... 324
15.8 Location Awareness and Personal Safety..................................... 325
15.9 Information Awareness and Law Enforcement............................ 327
15.10 Self-Awareness and Online Dating .............................................. 329
15.11 Pandora’s Box of Total Information Awareness........................... 333
References................................................................................................. 335
Part VI Epilogue
16 From Total Information Awareness to 1984 ......................................... 349
16.1 Brave New World of Total Information Awareness ....................... 349
16.2 George Orwell’s 1984 .................................................................... 353
16.3 Aldous Huxley’s Brave New World............................................... 355
16.4 Point of No Return and Internet.org: “Every one of us.
Everywhere. Connected.”............................................................... 356
16.5 Privacy and E-Activism: Mesh Networks
and Peer-to-Peer Social Networks.................................................. 357
16.6 Facebook Questions ....................................................................... 358
16.7 Two-Way Street of Total Information Awareness .......................... 359
References................................................................................................. 361
Appendix A: Facebook Timeline (October 2003 – August 2014)................ 367
2003................................................................................................................... 367
2004................................................................................................................... 367
2005................................................................................................................... 368
2006................................................................................................................... 369
2007................................................................................................................... 370
2008................................................................................................................... 370
2009................................................................................................................... 371
2010................................................................................................................... 372
2011................................................................................................................... 373
2012................................................................................................................... 375
2013................................................................................................................... 376
2014................................................................................................................... 378
Appendix B: Facebook’s Two-Year Historical Stock Prices
(May 18, 2012 – May 18, 2014) ...................................................................... 381
Index................................................................................................................. 383
Contents
9. 24
2.1 Zero Privacy and the Central Intelligence Agency
On May 7, 2013, the Central Intelligence Agency (CIA) selected undercover officer
Frank Archibald as the new head of its National Clandestine Service and kept his
identity secret while he remained undercover as the agency chief in Latin America.
However, within 24 hours, his name was outed onTwitter by Columbia University
journalism professor John Dinges (1) who successfully pieced together publicly
available information: The Washington Post described the new head as “a longtime
officer who served tours in Pakistan and Africa and was recently in charge of the
agency’s Latin America division, according to public records and former officials.”
The Associated Press added that he “once ran the covert action that helped remove
Serbian President Slobodan Milosevic from power” (2). Prof. Dinges said in a tele-
phone interview with Mashable, “It was pretty obvious who he was. It took me
about five minutes to find out. It wasn’t secret, nobody leaked it; it was not a big
secret” (3).
On May 9, 2013, 48 hours after the CIA appointment, one website used Intelius
to find Archibal’s address, date of birth, and names of relatives. The site also posted
online photos of his house taken from Google Maps and Google Street View (4).
Half a year earlier in November 2012, CIA director David Petraeus resigned as
head of the spy agency after the FBI uncovered his private emails that confirmed his
secret extramarital affair with his biographer Paula Broadwell. CNN’s John D.
Sutter asked, “When the CIA director cannot hide his activities online, what hope is
there for the rest of us?” (5).
Way back in January 1999, Scott McNealy, co-founder and CEO of Sun
Microsystems for 22 years, told a group of reporters and analysts: “You have zero
privacy anyway. Get over it” (6). A decade later in December 2009, Google’s then-
CEO Eric Schmidt said, “If you have something that you don’t want anyone to
know, maybe you shouldn’t be doing it in the first place” (7). In defense of the NSA
surveillance programs, President Barack Obama said in June 2013, “It’s important
to recognize that you can’t have 100% security and also then have 100% privacy and
zero inconvenience” (8).
2.2 The Archer, Carrier Pigeons, and President Jimmy Carter
A college friend of my wife, in his twenties, graduated from a well-known univer-
sity with a Master’s degree in computer science. Instead of looking for a well-paying
job, he prefers to spend most of his time living in the remote countryside without a
cell phone or Internet connection. He is a skilled archer who hunts for food in the
forest. He is also a self-proclaimed magician (think Tim Kring’s Heroes, not David
Copperfield). He enjoys a life of solitude and privacy. Nevertheless, even an eccen-
tric person like him cannot completely escape the temptation of social networks.
He has a Facebook profile with a small handful of photos of himself and his hand-
made enchanted objects. He updates his Facebook page rarely, but when he does, his
2 Social Networks and Privacy