TikTok: No Big Deal? Data Collection: No Big Deal Either
September 7, 2021
Here’s an interesting and presumably dead accurate statement from “TikTok Overtakes YouTube for Average Watch Time in US and UK.”
YouTube’s mass audience means it’s getting more demographics that are comparatively light internet users… it’s just reaching everyone who’s online.
So this means Google is number one? The write up points out:
The Google-owned video giant has an estimated two billion monthly users, while TikTok’s most recent public figures suggested it had about 700 million in mid-2020.
Absolutely. To me, it looks as if two billion is bigger than 700 million.
But TikTok has “upended the streaming and social landscape.”
How? Two billion is bigger than 700 million. Googlers like metrics, and that’s a noticeable difference.
I learned that the average time per user spent on the apps is higher for TikTok than for YouTube. TikTok has a high levels of “engagement.”
Google YouTube has more users, but TikTok users are apparently more hooked on the short form content from the quasi-China influenced outfit.
Advertisers will care. Retailers who want to hose users with product pitches via TikTok care.
Data harvesters at TikTok will definitely care. The more time spent on a monitored app provides a more helpful set of data about the users. These users can be tagged and analyzed using helpful open source tools like Bootleg.
Just a point to consider: How useful will time series data be about a TikTok user or user cluster? How useful will such data be when it comes time to identify a candidate for insider action? But some Silicon Valley wizards pooh pooh TikTok data collection. Maybe a knowledge gap for this crowd?
Stephen E Arnold, September 9, 2021
Protonmail Anecdote
September 6, 2021
Protonmail has been mentioned in come circles as a secure email service. Users pay to use the system. I have included it in my lectures about online messaging as an example of a “secure” service.
I spotted this Twitter thread which may be true, but, on the other hand, it may be an example of disinformation. The thread includes a screenshot and comments which may indicate that Protonmail has provided to law enforcement details about a specific user.
The person creating the tweet with the information points out:
I appreciate protonmail transparency on what happened, they provide a onion domain to avoid that issue (and a VPN), every service has to follow the law of the country they are in and a biggest issue here is the criminalization of climate activists by the french police [sic]
Additional information or disinformation may be available from this link.
Stephen E Arnold, September 6, 2021
Palantir: A Blinded Seeing Stone?
August 27, 2021
I try to keep pace with the innovations in intelware. That’s my term for specialized software designed to provide the actionable information required by intel professionals, law enforcement, and one or two attorneys who have moved past thumbtyping.
I am not sure if the article “FBI Palantir Glitch Allowed Unauthorized Access to Private Data” is on the money. The “real news” story asserted:
A computer glitch in a secretive software program used by the FBI allowed some unauthorized employees to access private data for more than a year, prosecutors revealed in a new court filing. The screw-up in the Palantir program — a software created by a sprawling data analytics company co-founded by billionaire Peter Thiel — was detailed in a letter by prosecutors in the Manhattan federal court case against accused hacker Virgil Griffith.
Please, read the source document. Also, my personal view is that such an access lapse is not good, but if the story is accurate, I am less concerned that other FBI officials may have had access to content in Gotham or whatever the system is branded these days is less problematic than oligarchs snooping or a Xi Jinping linked tong IT wonk poking around FBI only data.
My thoughts went in a different direction, and I want to capture them. Keep in mind, I don’t know if the access revelation is “true.” Nevertheless, here’s what I jotted down whilst sitting in a lecture about a smart bung for booze lovers:
- Was the access issue related to Microsoft Windows or to the AWS-type services on which some Palantir installations depend? Microsoft is another “here we go again” question, but the AWS question puts the Bezos bulldozer squarely in the security breach spotlight.
- How many days, weeks, or months was the access control out of bounds? An hour is one thing; the answer “We don’t have a clue” is another.
- If — note the if, please — the access issue is due to a Palantir specific feature or function, is there a current security audit of LE, military, and intel related installations of the “seeing stone” itself? If the answer is “yes”, why was this access issue missed? Who did the audit? Who vetted the auditor? If the answer is “no,” what are the consequences for the other software vendors and IT professionals in the “fault chain”?
The article points out that a royal “we” is troubled. That’s nice. But let’s focus on more pointed questions and deal with what might be a digital Humpty Dumpty. Just my opinion from the underground bunker in rural Kentucky.
Stephen E Arnold, August 27, 2021
DarkCyber for August 24, 2021, Now Available
August 24, 2021
The program for August 24, 2021, is now available at this link. This program, number 17 in the 2021 series, contains five stories. These are:
The NSO Group matter has produced some interesting knock on effects.
The consequence of NSO Group’s activities include criticism from the United Nations and Edward Snowden, a whistle blower and resident of Moscow. The Taliban’s takeover of Afghanistan was remarkable.
The core technology for the antagonists is discussed. You will learn about the musician Tankz and his method for making illegal credit card fraud accessible to young people in the UK and elsewhere. In addition to alleged financial crime, Tankz sings about Pyrex whipping. Ask your children what this is and then decide if you need to take action.
The program includes another reminder than one can find anti-security actors on the Regular Web and the Dark Web. The challenge is to make sure you do not become the victim of a scam.
The US government created an interesting report about nuclear war. It is not clear how lo9ng this document will remain available from a public Web server. You can check the link in the DarkCyber video for yourself. Tip: The document explains how the US may select a target for a nuclear strike.
The final story reports that the drone called Avenger has a new capability: Autonomous decision capability enabled by track and follow electronics. No human operator needed when a target is identified.
DarkCyber is produced by Stephen E Arnold and the DarkCyber research team. New programs appear every two weeks unless one of the video distribution services decides to remove the content derived from open sources of information. Tankz and a fellow traveler named DankDex, purveyor of the Fraud Bible, appear to post without pushback.
Kenny Toth, August 24, 2021
Remember Who May Have Wanted to License Pegasus?
August 20, 2021
Cyber intelligence firm NSO, makers of Pegasus spyware, knows no bounds when it comes to enabling government clients to spy on citizens. Apparently, however, it draws the line at helping Facebook spy on its users. At his Daring Fireball blog, computer scientist John Gruber reports that “Facebook Wanted NSO Spyware to Monitor iOS Users.” We learn that NSO CEO Shalev Hulio has made a legal declaration stating he was approached in 2017 by Facebook reps looking to purchase certain Pegasus capabilities. Gruber quotes Motherboard’s Joseph Cox, who wrote:
“At the time, Facebook was in the early stages of deploying a VPN product called Onavo Protect, which, unbeknownst to some users, analyzed the web traffic of users who downloaded it to see what other apps they were using. According to the court documents, it seems the Facebook representatives were not interested in buying parts of Pegasus as a hacking tool to remotely break into phones, but more as a way to more effectively monitor phones of users who had already installed Onavo. ‘The Facebook representatives stated that Facebook was concerned that its method for gathering user data through Onavo Protect was less effective on Apple devices than on Android devices,’ the court filing reads. ‘The Facebook representatives also stated that Facebook wanted to use purported capabilities of Pegasus to monitor users on Apple devices and were willing to pay for the ability to monitor Onavo Protect users.’”
We are glad to learn NSO has boundaries of any sort. And score one for Apple security. As for Facebook, Gruber asserts this news supports his oft-stated assertion that Facebook is a criminal operation. He bluntly concludes:
“Facebook’s stated intention for this software was to use it for mass surveillance of its own honest users. That is profoundly [messed] up — sociopathic.”
Perhaps.
Cynthia Murrell, August 20, 2021
Silicon Valley Neologisms: The Palantir Edition
August 19, 2021
Do you remember the Zuckerland metaverse? (Yes, I know he borrowed the word, but when you are president of a digital country, does anyone dare challenge Zuck the First, Le Roi Numérique?)
Palantir Technologies (the Seeing Stone outfit with the warm up jacket fashion bug) introduced a tasty bit of jargon-market speak in its Q2 2021 earnings call:
Palantir’s meta-constellation software harnesses the power of growing satellite constellations, deploying AI into space to provide insights to decision-makers here on Earth. Our meta-constellation integrates with existing satellites, optimizing hundreds of orbital sensors and AI models and allowing users to ask time-sensitive questions across the entire planet. Important questions like, where are the indicators of wildfires or how are climate changes affecting crop productivity? And when and where are naval fleets conducting operations? Meta-constellation pushes Palantir’s Edge AI technology to a new frontier.
I think meta-constellation is a positive contribution to the American Silicon Valley-Denver lingo.
One of the interesting factoids in the write up is that the average customer “invests” lots of money in the firm’s software and services. The average customer yields $7.9 million. Let’s assume there was a touch of spreadsheet fever whipping the accountants. Chop that down to a couple of million, and the cowboy outfit is doing okay. Now the job is to corral those customers so there is sustainable, recurring revenue and generous profits going forward like little doggies heading to the meat processing facility.
Also, deploying the Palantirians’ system is as easy as cooking some of Cowboy Ken’s beans in an iron pot over a wood fire. The transcript faithfully reports:
In just two days, we were able to deploy an entire solution for this customer, leveraging our out-of-the-box functionality built in foundry, a time line previously unthinkable in the eyes of the customer. And frankly, it would have been unthinkable to us even three years ago, where an equivalent project might have taken three months. This is only possible because of our product. Innovations from software-defined data integration are driving the marginal cost of data integration to 0, archetypes and our no-code technologies that are driving the marginal cost of application development to zero.
Those data cowboys are moving faster than a branded calf on a crisp April morning.
The most interesting factoid is contained in this statement:
Given our strong cash flow position, we repaid our outstanding $200 million term loan facility and are currently debt-free. After paying off the debt, we ended the quarter with $2.3 billion in cash and cash equivalents.
I don’t want to raise a touchy subject, but this chart caught my attention:
That yellow line means that the company is losing money if I am interpreting the Google Finance graph correctly.
It may be helpful to consider that Palantir has never turned a profit. Let’s hope those Colorado transplants can covert expensive cows into hard cash after more than a decade grazing on the range. No digital cows, please. Leave those for the Facebook metaverse which is less than a meta-constellation in JRR Tolkien fantasy space.
Stephen E Arnold, August 19, 2021
A Simple Question: Just One Cyber Security Firm?
August 17, 2021
There are quite a few cyber security, cyber intelligence, and cyber threat companies. I have a list of about 100 of the better known outfits in this business. Presumably there are dozens, maybe hundreds of trained analysts and finely tuned intelware programs looking for threats and stolen data 24×7.
I read “Secret Terrorist Watchlist with 2 million Records Exposed Online.” The write up states:
July this year, Security Discovery researcher Bob Diachenko came across a plethora of JSON records in an exposed Elasticsearch cluster that piqued his interest.
Here’s my question: Why was a single researcher the only expert aware of this serious breach (if indeed it is valid)?
My hunch is that the Fancy Dan 24×7 smart systems and the legions of developers refining smart intelware have produced systems that simply don’t work. If they did, numerous alerting services would have spotted the alleged do not fly data. The “single researcher” would have been late to the party. He wasn’t. Thank goodness for this research, Mr. Diachenko.
Those systems, as far as I know, did not. The question remains, “Maybe these commercial services don’t work particularly well?” Marketing is really easy, even fun. Delivering on crazy assertions is a different sort of job.
Stephen E Arnold, August 17, 2021
NSO Group: Okay, Now the UN Is Agitated. Good Job!
August 17, 2021
Once upon a time, intelware was essentially unknown. I think back to the late 1990s when relationship diagrams were talked about quietly in rooms with tinfoil on the windows.
Those halcyon days are gone. The go-go-go MBA-thinking masters of the universe decided that public conferences, online advertisements, and explaining their systems to academics with bobble heads was a spiffy idea.
Where are we now?
“Spyware Scandal: UN Experts Call for Moratorium on Sale of Life Threatening Surveillance Tech” is a high-water mark for the flood-lit specialized software and services sector.
Outstanding!
The write up says:
UN human rights experts* today called on all States to impose a global moratorium on the sale and transfer of surveillance technology until they have put in place robust regulations that guarantee its use in compliance with international human rights standards.
How’s this going to work out? Is there a marketing time machine which will undo the conference publicity? Is there a way to undo the content outputs about what should have been secret software and systems? Is there a way to get those investigative journalists redirected to issues like the homeless and gray market gun sales?
Nope.
The UN may not be a pace-setter in many things. But the organization is quite good at outputting reports and news which can ripple through the deciders in more than 190 member states. That pretty much looks like a global reach.
Remarkable, and I am not sure the Berkeley negotiators are going to deal with the problems of this digital Pandora’s box. Whose fingers will get smashed as fixer uppers try to get the lid locked down?
Stephen E Arnold, August 17, 2021
Quote to Note: When Is the Best Time to Snag Mobile Data?
August 17, 2021
I read “We’re Late Closing the Barn Door on Pegasus.” The write up contains a statement I found interesting. Here’s the passage I noted:
Intelligence agencies around the world have shifted from collecting data in transit to collecting data at rest, since encryption uptake has made the former less fruitful. Sniffing packets in the air or over the wire has traditionally been the first choice for intelligence agencies only because it was the easiest. Intelligence agencies historically targeted devices, too, but usually only for their top targets. But now that so much traffic is encrypted, it makes more sense to focus on its endpoints.
This may seem obvious to some. The point is that specifically articulating a method in mass media is probably not high on my list of communication musts. This is one more example of the knock-on effect of the NSO Group’s media magnetism. I wish I could say that the NSO Group matter was lost in the ever decreasing news cycle. I cannot.
Stephen E Arnold, August 17, 2021
Peraton: Some Notes
August 16, 2021
Peraton received another juicy Federal contract. “Peraton Wins Nearly $1B DOD Contract” reports:
Herndon-based Peraton Inc., a national security contractor, won a nearly $1 billion task order to provide the U.S. Department of Defense’s U.S. Central Command (USCENTCOM) and its mission partners with operational planning, implementation and assessment services (OPIAS). USCENTCOM directs military operations with allies in the Middle East.
Peraton is, to some degree, the Harris Corp’s government unit. Backed by Veritas Capital, the contract winner is an example of the shift taking place in cyber intelligence.
The company is active in a number of government centric sectors; for example, digital forensics, cyber crime, and mission operations and analysis.
What work will Peraton perform? I don’t know and it is highly unlikely that the company will follow NSO Group’s method for generating publicity. I mention this Israeli firm’s misstep because it is continuing to send shockwaves through the intelware sector.
Stephen E Arnold, August 16, 2021