Search
Content type: Examples
19th December 2018
The US Securities and Exchange Commission announced in April 2018 that it would fine Altaba, formerly known as Yahoo, $35 million for failing to disclose its massive 2014 data breach. Yahoo did not notify the hundreds of millions of customers until the end of 2016, when it was closing its acquisition by Verizon, even though the SEC found that the company knew within days that Russian hackers had stolen their user names, email addresses, phone numbers, birth dates, encrypted passwords, and the…
Content type: Examples
5th May 2018
A report for the US National Academy of Sciences explains the methods used by a team of computer scientists to derive accurate, neighbourhood-level estimates of the racial, economic, and political characteristics of 200 US cities using the images collected by Google Street View in 2013 and 2014. The key element: the pictures captured of 22 million cars parked along or driving down those streets. The scientists trained a computer algorithm to recognise the make, model, and year of each…
Content type: Examples
5th May 2018
Scientists at MIT have created an algorithm called "EQ Radio" that detects and measures individual heartbeats and therefore individuals' emotions by bouncing radio frequency signals - such as ordinary wifi- off of people. The algorithm works the same as an electrocardiogram but needs no leads to be attached, but must process the information it receives differently. With no leads physically attached, EQ Radio can't anticipate the size and shape of the wavelengths it will receive but must develop…
Content type: Examples
9th February 2019
After a series of scandals, in the year up to September 2018 54% of American Facebook users had changed their privacy settings and 42% had skipped visiting the platform for several weeks or more. About 26% said they had deleted the Facebook app from their smartphone. Some 74% of Facebook users had taken at least one of these three actions, split evenly across Democrats and Republicans. Across age groups, younger users (18 to 29) were more likely to have deleted the app (44%), and only a third…
Content type: Examples
12th July 2019
Absher, an online platform and mobile phone app created by the Saudi Arabian government, can allow men to restrict women’s ability to travel, live in Saudi Arabia, or access government services. This app, which is available in the Google and Apple app stores, supports and enables the discriminatory male guardianship system in Saudi Arabia and violations of womens’ rights, including the right to leave and return to one’s own country. Because women in Saudi Arabia are required to have a male…
Content type: Examples
5th May 2018
The Satellite Sentinel Project, a constellation of high-powered satellites trained to find atrocities on the ground with a half-metre resolution, was set up in 2009 to find human rights abuses in the conflict in Sudan. Conceived by former Clinton administration State department staffer John Prendergast and the actor George Clooney, the system collectively orbits the Earth 45 times a day and by using eight different spectral bands can "see" through both darkness and clouds. By 2011, the ability…
Content type: Examples
5th May 2018
In 2014, DataKind sent two volunteers to work with GiveDirectly, an organisation that makes cash donations to poor households in Kenya and Uganda. In order to better identify villages with households that are in need, the volunteers developed an algorithm that classified village roofs in satellite images as iron or thatch - because there is a strong correlation between the number of roofs in a village that are iron and the village's relative wealth.
http://www.datakind.org/blog/using-satellite…
Content type: Examples
30th April 2019
During the primary elections in November 2016, the former French president, Nicolas Sarkozy, reportedly used an app, called Knockin, that made it possible to identify and geolocate supporters for door-to-door campaigning. Based on a report by the French Radio RMC, the app would harvest public data about anyone that liked a page or a post that the candidate put on his campaign page in order to find the supporter's address. Door-to-door volunteers were then able to see on the app the address and…
Content type: Examples
5th May 2018
In 2014, the UK suicide prevention group The Samaritans launched Radar, a Twitter-based service intended to leverage the social graph to identify people showing signs of suicidal intent on social media and alert their friends to reach out to offer them help. The app was quickly taken offline after widespread criticism and an online petition asking them to delete the app. Among the complaints: the high error rate, intrusiveness, and the Samaritans' response, which was to suggest that people…
Content type: Examples
20th December 2018
Facebook ads purchased in May 2016 by the Internet Research Agency, a notorious Russian troll farm, urged users to install the FaceMusic app. When installed, this Chrome extension gained wide access to the users' Facebook accounts and web browsing behaviour; in some cases it messaged all the user's Facebook Friends. The most successful of these ads specifically targeted American girls aged 14 to 17 and said the app would let them play their favourite music on Facebook for free and share it with…
Content type: Examples
3rd May 2018
In 2016, 21-year-old Russian photographer Egor Tsvetkov launched the "Your Face is Big Data" project. He created the project by semi-secretly photographing passengers seated across from him on the St. Petersburg metro, then uploading the images to an online service called FindFace. FindFace's service, which is intended to facilitate checking out potential dates met through online sites, takes uploaded random photographs and searches for matches on Russia's most popular social network, Vkontakte…
Content type: Examples
13th August 2019
In February 2019, after investigative journalists used social media posts to investigate the country's hidden role in conflicts such as those in Ukraine and Syria, Russia began moving to ban its soldiers from posting any information that would expose their whereabouts or their role in the military. The ban would include photographs, video, geolocation data, and other information, and prohibit soldiers from sharing information about other soldiers and their relatives.
https://www.reuters.com/…
Content type: Examples
4th May 2018
In 2015, the Royal Parks conducted a covert study of visitors to London's Hyde Park using anonymised mobile phone signals provided by the network operator EE to analyse footfall. During the study, which was conducted via government-funded Future Cities Catapult, the Royal Parks also had access to aggregated age and gender data, creating a detailed picture of how different people used the park over the period of about a year. The study also showed the percentage of EE subscribers who visited…
Content type: Examples
19th December 2018
In 2018, documents filed in a court case showed that a few days before the 2017 inauguration of US president Donald Trump - timing that may have been a coincidence - two Romanian hackers took over 123 of the police department's 187 surveillance cameras in Washington, DC with the intention of using police computers to email ransomware to more than 179,000 accounts. The prosecution also said the alleged hackers had stolen banking credentials and passwords and could have used police computers to…
Content type: Examples
13th August 2019
In February 2019, the city of Rio de Janeiro announced that its police security operation for the annual five-day Carnival would include facial recognition and vehicle license plate cameras to identify wanted individuals and cars. Municipal officials said the system would help reduce thefts and robberies; critics dissented on the basis that a period when people are wearing masks, heavy makeup, glitter, and costumes is a bad time to test the technology.
https://riotimesonline.com/brazil-news/…
Content type: Examples
9th February 2019
In July 2018 the three-year-old payment system Revolut notified the UK's National Crime Agency and the Financial Conduct Authority that it had found evidence of money laundering on its system. From its beginnings as a prepaid credit card operator, Revolut had branched out into small business services and cryptocurrencies. Former employees suggest that although the company recently participated in an industry-wide review of money laundering checks and was in compliance with the EU's PSD2, its…
Content type: Examples
7th May 2019
In this review of Virginia Eubanks's book Automating Inequality, the author of the review looks at the three main case studies Eubanks explores in her book: the attempt to automate and privatise the welfare system elligibility management in the state of Indiana in 2006, the use of a coordinated entry system in Los Angeles County to address homelessness and the Allegheny Family Screening Tool that attempts to predict child abuse in Pennsylvania. He focuses in particular on Indiana, a state that…
Content type: Examples
26th October 2018
In 2010, customers of the online shoe retailer Zappos, which was acquired by Amazon in 2009, began noticing that recommendations for products they had viewed on the site were following them around the web. The culprit was a then-new practice known as "retargeting", which uses cookies to identify users as they move around the web. The source was quickly - via links on the ads themselves - identified as the French company Criteo, which tells retailers its personalised banners will help them "…
Content type: Examples
8th December 2018
In 2018, a group of researchers from the Campaign for Accountability posed as Russian trolls and were able to purchase divisive online ads and target them at Americans using Google's advertising platform. The researchers constructed fake profiles using the name and identifying details of the Internet Research Agency, a known Kremlin-linked troll farm; the ads appeared on the YouTube channels and websites belonging to CNN, CBS, Huffington Post, and the Daily Beast. The ads were approved in less…
Content type: Examples
14th April 2019
In December 2018, the Institute for Policy Research and Advocacy (ELSAM) warned that data misuse and voter behavioural targeting and micro-targeting could prove factors in the 2019 Indonesian general elections. Researcher Wahyudi Djafar cited examples from Kenya, where Cambridge Analytica had sent tailored personal text messages to voters in order to promote ethnic division. Djafar thought the risk in Indonesia was particularly intense because 130 million of the country's 132 million internet…
Content type: Examples
5th May 2018
In a presentation given at the Knowledge Discovery and Data Mining conference in 2016, researchers discussed a method of using the data generated by smart card public transport tickets to catch pickpockets. In a study of 6 million passenger movements in Beijing, the researchers used a classifier to pick out anomalous journeys - sudden variations in the patterns of ordinary travellers or routes that made no sense. A second classifier primed with information derived from police reports and social…
Content type: Examples
3rd May 2019
In August 2017, it was reported that a researcher scraped videos of transgender Youtubers documenting their transition process without informing them or asking their permission, as part of an attempt to train artificial intelligence facial recognition software to be able to identify transgender people after they have transitioned.
These videos were primarily of transgender people sharing the progress and results of hormone replacement therapy, including video diaries and time-lapse videos. The…
Content type: Examples
3rd May 2018
In 2016, Danish researchers Emil Kirkegaard and Julius Daugbjerg Bjerrekær released a dataset onto the Open Science Framework that included details of almost 70,000 users of the online dating site OkCupid. The researchers created the dataset themselves by using software to scrape information from OkCupid's site including user names (though not real names), ages, gender, religion, and personality traits, along with the answer to the questions the sites asks new users in order to help identify…
Content type: Examples
3rd May 2018
In a presentation at London's 2016 Black Hat cybersecurity conference, researchers from UCL showed that it was possible to use ultrasound to track consumers across multiple devices. Marketers were already using beacons inaudible to the human ear to activate functions on devices via their microphones, and retailers were using shopping reward apps such as Shopkick to push department or aisle-specific ads while customers were in their stores. The UCL researchers noted, however, the inherent…
Content type: Examples
5th May 2018
At the 2016 Usenix Workshop on Offensive Technologies, researchers from the University of Michigan presented the results of tests that showed that industrial vehicles - a 2006 semi-trailer and a 2001 school bus - were subject to the same security flaws as had already been found in domestic cars. Via digital signals sent within a big truck's internal network, the researchers were able to change the truck's instrument panel readout, trigger unintended acceleration, and even disable part of the…
Content type: Examples
3rd May 2018
In 2016, researchers affiliated with Verto Analytics and the Qatar Computing Research Institute published work in which they analysed the app usage and demographics of more than 3,700 people in order to find correlations. Based on the models they developed, they found they could predict a user's gender, age, marital status, and income with between 61% and 82% accuracy.
https://www.washingtonpost.com/news/the-intersect/wp/2016/03/03/quiz-can-we-guess-your-age-and-income-based-solely-on-the-…
Content type: Examples
3rd May 2018
In 2016, researchers at Dalhousie University in Canada and the Weizman Institute of Science in Israel developed a proof-of-concept attack that allowed them to take control of LED light bulbs from a distance of up to 400 metres by exploiting a flaw in the Zigbee protocol implementation used in the Philips Hue system. Because the same key was used in every bulb, once it had been extracted from one bulb it could be reused on all of them. Writing a new operating system to one of the bulbs enabled…
Content type: Examples
9th February 2019
In October 2018, researcher Johannes Eichstaedt led a project to study how the words people use on social media reflect their underlying psychological state. Working with 1,200 patients at a Philadelphia emergency department, 114 of whom had a depression diagnosis, Eichstaedt's group studied their EMRs and up to seven years of their Facebook posts. Matching every person with a depressive diagnosis with five who did not, to mimic the distribution of depression in the population at large, from…
Content type: Examples
5th May 2018
In 2016, security expert Ken Munro discovered security bugs in the onboard wifi in Mitsubishi's Outlander hybrid car that could be exploited to turn off the car's alarm. Some aspects of the Outlander can be controlled by a smartphone app that talks to the car via the onboard wifi. Security flaws in the way the wifi is set up include using a distinctive format for the cars' access points, enabling outsiders to track these cars. Munro also found the car was vulnerable to replay attacks; he was…
Content type: Examples
4th May 2018
A 2016 study from the French Institute for Research in Computer Science and Automation found that in 95% of cases it takes as few as four of the apps users have installed on their smartphones to reidentify them within a dataset. Based on a study of 54,893 Android users over seven months, the researchers found that just two apps were sufficient to reidentify users about 75% of the time. However, the list of apps an individual uses is more revealing than that: it can predict traits like religion…