Moderators: Elvis, DrVolin, Jeff
On a more human level, though, here's a fascinating Top Secret America crossover: "Who Are Google's Super Users?" Who actually has the access to their top-level interfaces for the Ocean of Petabytes?
Google Fires Engineer For Spying On Users
Staffer accused of accessing four minors' private Gmail and GTalk accounts.
By Mathew J. Schwartz InformationWeek
September 15, 2010 10:35 AM
Google on Tuesday said that it had fired an engineer for breaking the company's internal privacy policies.
The company's statement did not contradict a report published earlier that day by Gawker that David Barksdale, a 27-year-old former engineer at Google and part of an elite technical group at Google , had been dismissed for using his position "to access users' accounts, violating the privacy of at least four minors during his employment."
In the statement, Bill Coughran, senior VP of engineering for Google, confirmed Barksdale's dismissal "for breaking Google's strict internal privacy policies."
Gawker reported that Barksdale used his access credentials to spy on people's private Gmail and GTalk accounts, as well as contact lists and transcripts of chats, and that the victims of his spying included four minors. Furthermore, while his actions reportedly did not extend to sexual harassment, there was at least one incident involving taunting.
According to Gawker, "in an incident this spring involving a 15-year-old boy who he'd befriended, Barksdale tapped into call logs from Google Voice, Google's Internet phone service, after the boy refused to tell him the name of his new girlfriend , according to our source. After accessing the kid's account to retrieve her name and phone number, Barksdale then taunted the boy and threatened to call her."
According to Techcrunch, a Google spokesperson on Tuesday also disclosed that a similar incident involving a privacy breach by a Google insider had occurred once before, but that it didn't involve a minor. The employee involved was dismissed.
In the wake of this privacy breach, Google's Coughran said that the company will be increasing its access control monitoring. "We carefully control the number of employees who have access to our systems, and we regularly upgrade our security controls -- for example, we are significantly increasing the amount of time we spend auditing our logs to ensure those controls are effective," he said. "That said, a limited number of people will always need to access these systems if we are to operate them properly -- which is why we take any breach so seriously."
When it comes to insiders abusing their access privileges, Google is far from alone. Earlier this year, for example, the government charged Bradley Manning with releasing to Wikileaks.org a video of a U.S. helicopter strike in Iraq that killed two Reuters employees and wounded two children.
As a result, the Defense Advanced Research Projects Agency (DARPA) recently launched a new program aimed at stopping insiders from abusing their access to sensitive Department of Defense computer networks.
Stephen Morgan wrote:fire is insufficiently destructive against HDD platters.
"Be a web detective.
Ghostery is your window into the invisible web – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior.
Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
Build an information foundation.
Each of the over 500 companies has a profile that will help you learn more about their technology, their business, and their privacy policies.
At Ghostery, we believe in enabling informed decisions about your control over your online privacy. The more you learn about the companies trading your online behavioral data, the better you can make decisions about how to control your exposure to those companies.
Ghostery allows zero-tolerance blocking of anything ad related, complete (visible) open communication with ad companies, or countless measures in between - determined by you, the informed web user."
"Where GoogleSharing Comes In
GoogleSharing is a system that mixes the requests of many different users together, such that Google is not capable of telling what is coming from whom. GoogleSharing aims to do a few very specific things:
Provide a system that will prevent Google from collecting information about you from services which don't require a login.
Make this system completely transparent to the user. No special websites, no change to your work flow.
Leave your non-Google traffic completely untouched, unredirected, and unaffected.
The GoogleSharing system consists of a custom proxy and a Firefox Addon. The proxy works by generating a pool of GoogleSharing "identities," each of which contains a cookie issued by Google and an arbitrary User-Agent for one of several popular browsers. The Firefox Addon watches for requests to Google services from your browser, and when enabled will transparently redirect all of them (except for things like Gmail) to a GoogleSharing proxy. There your request is stripped of all identifying information and replaced with the information from a GoogleSharing identity.
This "GoogleShared" request is then forwarded on to Google, and the response is proxied back to you. Your next request will get a different identity, and the one you were using before will be assigned to someone else. By "sharing" these identities, all of our traffic gets mixed together and is very difficult to analyze.
The result is that you can transparently use Google search, images, maps, products, news, etc... without Google being able to track you by IP address, Cookie, or any other identifying HTTP headers. And only your Google traffic is redirected. Everything else from your browser goes directly to its destination.
GoogleSharing Privacy
With all of your Google traffic being redirected to GoogleSharing for anonymization, there is the risk that we could become the ones who monitor, record, and track users. While our privacy policy is that we do not record, monitor, or log any user traffic, and while all of the source code for the GoogleSharing addon and proxy are open source, it is no longer necessary to trust that we (or any other GoogleSharing proxy operator) is behaving appropriately.
With Google's introduction of SSL support for search requests (encrypted.google.com), the GoogleSharing system now allows clients to checkout GoogleSharing identities and route encrypted traffic through GoogleSharing to Google. So while client requests are anonymized by GoogleSharing, the actual traffic that the GoogleSharing proxy sees is encrypted to Google, and hence can not be monitored."
Stephen Morgan wrote:If worried about Google spying upon self, think twice about using Chrome, methinks.
Gnomad wrote:Stephen Morgan wrote:fire is insufficiently destructive against HDD platters.
Nuke it from orbit.
Wombaticus Rex wrote:"Does Google Know How Much It Knows Yet?"
On a more human level, though, here's a fascinating Top Secret America crossover: "Who Are Google's Super Users?" Who actually has the access to their top-level interfaces for the Ocean of Petabytes?
Joe Hillshoist wrote:Wombaticus Rex wrote:"Does Google Know How Much It Knows Yet?"
It, well something, has been sentient be it google or possibly the entire "internet" (every connected device) for a while now. What that means tho, thats a really intresting question I reckon. (Don't ask me why I think that either, or what "sentience" is cos I won't be able to give you a satisfactory answer.)
On a more human level, though, here's a fascinating Top Secret America crossover: "Who Are Google's Super Users?" Who actually has the access to their top-level interfaces for the Ocean of Petabytes?
Thats a good question. (Also - does anyone have access to "all" of it? Serious question btw)
Users browsing this forum: No registered users and 158 guests