"A surveillance contractor that has previously sold services to the U.S. military is advertising a product that it says can locate the real-time locations of specific cars in nearly any country on Earth", based on data sent by cars+components themselves: vice.com/en/article/k7a…
"automakers and Original Equipment Manufacturers (OEMs) often include sensors in vehicle parts that collect information such as their airbag and seatbelt status, engine temperature, and current location, and then transmit that information ... to the automaker or to third parties"
"Ulysses is a small surveillance contractor…that also claims to offer cellular interception and jamming technology [and] has worked with U.S. Special Operations Command (SOCOM), a branch of the military tasked with counterinsurgency, counterterrorism, and special reconnaissance"
"The document specifically suggests that this technology could be used for military operations" and includes "a map showing apparent vehicle locations spread across Russia, Ukraine, and Turkey ... An image on the company’s LinkedIn page appears to show data related to Bulgaria"
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Interesting. Google refers to Oracle's Datalogix, which sells consumer profiles based on purchase data from thousands of shops, as a "key external vendor".
In this newer list of "Ad technology providers", Google lists Oracle Data Cloud as a vendor who may serve and measure ads in EEA/UK: support.google.com/admanager/answ…
"Just as algorithms could be trained to predict who would click what ad, they could also be trained to predict who would like or share what post, and then give those posts more prominence"
"Teams had previously used design tactics, like experimenting with the content and frequency of notifications, to try to hook users more effectively. Their goal…was to increase a metric called L6/7, the fraction of people who logged in to Facebook six of the previous seven days"
After introducing ml-based optimization, "every user interaction once analyzed by engineers was being analyzed by algorithms. Those algorithms were creating ...more personalized feedback loops for tweaking and tailoring each user’s news feed to keep nudging up engagement numbers"
Yes, much of today's surveillance-based advertising is something between an empty promise and a giant fraud.
But the fact that we're all getting badly targeted ads does not mean that it doesn't work, because this is how it is intended to work, if it does. ft.com/content/b013d9…
It's a misunderstanding that surveillance advertising aims to accurately target everyone. If at all, it aims to accurately target a low percentage of addressed users in order to make them act how it wants them to act.
Spamming everyone else is always part of the calculation.
Much of the data is flawed or fraudulent in today's broken web economy, and many metrics, clicks and even users are fake.
At the same time, attempts to optimize behavior in digital environments based on mass profiling and testing can be successful and lead to many side effects.
T-Mobile US says it will start selling web+device usage data to the digital profiling industry by default.
But don't worry it's not tied to your name but only to personal identifiers that are much more suitable to track and follow you everywhere anyway. t-mobile.com/privacy-center…
Telecommunication services are basic digital infrastructure, and they should not be allowed to sell behavioral data at all.
It's bad enough if they trick people into 'opting in', selling it by default is beyond bad.
Such reckless and irresponsible business practices must end.
Also, T-Mobile US owns PushSpring, a consumer data broker that trades in extensive mobile data on hundreds of millions of people without their knowledge.
Diving into UEBA systems that large corporations use to protect themselves from cyber attacks, espionage, noncompliance, fraud, 'insider' threats and other risks ...I feel like this is a kind of totalitarian surveillance hellscape we'd never accept in any other area of life.
"A Watch List is used to monitor entities ...that are considered problematic or require special attention"
"...users who have received a poor performance review can be placed on a Watch List so that their activity can be closely monitored" #cybersecurity
An "abnormal number of logon failures", a "rare domain visited" or "flight risk behavior on web browsing to multiple job sites in a short period of time" ...put this employee on the Watch List #cybersecurity