Facebook spammed with explicit and violent images

Facebook, which has heretofore managed to maintain a family friendly reputation, suffered a setback earlier this week when explicit and violent images began to show up on the site. According to news reports, hackers were able to exploit a security weakness to spread images which included “hardcore porn; photoshopped images of celebrities, including teen pop star Justin Bieber, in sexual positions; ‘extreme violence;’ and at least one image of an abused dog.” Images of this nature can be extremely disturbing and numerous victims of the scam have expressed outrage and intent to deactivate their accounts.

Facebook users whose accounts were hacked were unable to see the images that are being posted on their friends walls…even though the images appeared to be coming from their account activity. According to Facebook, “the spam attack all started with users being tricked into pasting and executing malicious JavaScript in their browser’s URL bar.” Some are suggesting that the security flaw was limited to a particular browser…specifically Internet Explorer. In any case, one lesson to be learned is to not click on links from questionable sources, and never copy and paste code into your browser’s URL bar.

Some suspected the hackivist group Anonymous who earlier had warned [YouTube] of a cyber-attack on Facebook for their policies which compromise users’ privacy. However, as of today Anonymous has not taken credit for this event and a new post on ZDNet claims that Facebook has identified the source of the attack.

If you think your Facebook account has been compromised, here’s a link to steps to take to try to restore order.

Steve Jobs, Typography and the Mac

Although the passing of Steve Jobs this past week was not unexpected, it still was an emotional event for Apple fans and anyone who followed technology and media. The death of Steve Jobs attracted extensive media attention with much of the coverage focusing on his contributions over the years to the development of a computer and media empire that consistently delivered more than it promised.

To commemorate his passing I had my Media & Society class watch the 2005 commencement address that Steve Jobs delivered to the 2005 graduating class of Stanford University. The speech is only 14 minutes in length and you can see it below. There’s much to reflect on when listening to Jobs talk about his upbringing, his abbreviated college years, the twists and turns of his professional career, and his bout with cancer.

The one thing that stood out to me was the role that a class in typography, from Reed College, had on Jobs’ design of the Macintosh computer and, in many ways, the direction of Apple computer. Font selection, leading, kerning, tracking and ligatures are the concerns of a fairly obscure group of individuals, namely printers and typography geeks, yet Jobs was captivated by the ancient art of arranging letters on a page. Prior to the Apple Mac, computer type was crude and utilitarian. Function certainly won out our over form for screen fonts and printer output. But Jobs equipped the Mac with Postscript font technology and that, married with the personal laser printer, made high quality screen and print typography accessible to the masses. We take for granted font selection and high quality print output…but for that we should thank Steve Jobs and his vision for the Macintosh computer that started when he dropped in on a typography class at Reed College.

Amazon’s Kindle is on “Fire”

Amazon just announced its new color media tablet called the Fire…which, at $199, is cheaper than the Nook Color by Barnes & Nobel and much cheaper than the Apple iPad. According to reports, the Android-powered tablet has a 7-inch touchscreen powered by Google’s Android OS. The Fire will be able to access Amazon’s app store where users can download books, music, movies and apps.

Analysts doubt that the Fire will dethrone the iPad which current has more than 70% of the tablet market share. However, other tablet makers will most certainly feel the squeeze from this new entry. Unlike the iPad, the Fire does not have a camera (still or video) and is intended for consumption, not creation. While later models may add features, the current product is aiming for a different audience than those who are in the market for an iPad.

The Fire also has a new browser called Amazon Silk. Web surfing will be faster because of Amazon’s decision to incorporate its “Cloud” of EC2 servers to enhance the browser’s performance. This decision may speed up browsing, but already has some industry experts expressing concerns about privacy.

The Kindle Fire is expected to be available in mid November…just in time for the Christmas shopping season. And for those of you who want your media content experience when you want it, where you want it, and on a screen larger than your smart phone, the Fire may be something to consider.

UPDATE 10.3.11: Here’s a chart comparing e-Book readers.

Sony Playing Hardball with new ToS

Do you enjoy using your PS3 to play online? Well, if you want to continue you’ll have to agree to waive your right to participate in any future class-action lawsuit against Sony if they should, say…for instance, compromise your account data by sloppy network security. The new Terms of Service (ToS) agreement that was released this week are designed to protect Sony…and only Sony. You, on the other hand, are at the mercy of a corporate power that has a pretty shoddy track record when it comes to protecting consumer data. You can read more about it here.

From Section 15 of the new terms and conditions:

If you have a Dispute with any Sony Entity or any of a Sony Entity’s officers, directors, employees and agents that cannot be resolved through negotiation within the time frame described in the “Notice of Dispute” clause below. Other than those matters listed in the Exclusions from Arbitration clause, you and the Sony Entity that you have a Dispute with agree to seek resolution of the Dispute only through arbitration of that Dispute in accordance with the terms of this Section 15, and not litigate any Dispute in court. Arbitration means that the Dispute will be resolved by a neutral arbitrator instead of in a court by a judge or jury.

There is an opt out…but it is pretty low-tech. If, within 30 days of signing the new ToS, you send a snail-mail letter to Sony’s legal department in California you can reject the dispute resolution clause. But seriously, how many PS3 users are going to read the new ToS, and how many of them are going to go to the trouble of writing and mailing a letter to Sony?

Happy birthday email!

You may be surprised to learn that it has been 29 years (and a few days) since email was copyrighted by then 16-year-old V. A. Shiva. While the growth of SMS (text messaging) and social media sites such as Facebook and Twitter have taken some of the traffic that might otherwise have gone to email, Shiva is confident that email will continue to be a significant form of electronic communication for some time.

Current estimates are that approximately 300 billion email messages are sent daily, and about 90% of those are spam. Fortunately for us spam filters delete most of the unwanted email messages before we have to deal with them.

For more information about the history of email and current statistics about users, see the article and info-graphic here.

iPad & the Future of Print Media

The iPad 2 will be available at Apple Stores this Friday at 5pm and the buzz on the street is that it will be another barn burner. In the first 9 months of iPad sales last year, Apple sold nearly 15 million units. Analysts expect that figure to double this year with the release of the iPad 2. The iPad is not the only tablet/e-reader/e-book/etc., it is simply the best-selling and is expected to hold that position for another 2-3 years. Unlike other tablets, the iPad is not first and foremost an e-reader. While the Amazon Kindle and the Barnes & Nobel Nook are about e-books, the iPad is about apps that range from games to business productivity. But the iPad can also be used for books, and perhaps more important, magazines. Condé Nast, one of the largest magazine publishers, has announced plans to release all of their titles as iPad apps. They already publish Wired, GQ, and Vanity Fair, amongst others, in digital format.

In deciding to go digital, Condé Nast design director Wyatt Mitchell said that the company considered the pros and cons of print and digital, and tried to capture the benefits of both. One of the benefits of print is the fixed design. Magazines ported to the web left designers frustrated by OS, browser, and html/css quirks that reduced their design decisions to mere suggestions. With the iPad, complete creative control is back in the hands of the designers and content experts. Advantages of electronic delivery are myriad and include: speed of publishing, interactivity, the compelling persuasive power of video and audio, and a much smaller carbon footprint.

If you’ve never seen a magazine on an iPad, it is certainly something to behold. More than just high-resolution images and text, iPad zines contain interactive features that make the content breath and pulse with life. What do you think, will the tablet-based digital magazine change the way you read magazines?

[polldaddy poll=4678599]

Academy Award Apps

Many people engage in simultaneous media use…often a laptop or smart phone while watching TV. If you’re one of them…and you’re planning to watch the Academy Awards show this Sunday evening on ABC…this may be just what you need to occupy your attention during those boring acceptance speeches.

According to USA Today,  apps for iPhones, iPads, Android and Blackberry devices are available offering a wide range of features.

For example, the Oscar Backstage Pass is, according to their promotional copy, the coolest thing since…well, the vuvuzela app from last summer’s world cup!

Get the ultimate insider’s view of Hollywood’s biggest night with Oscar Backstage Pass! The Oscar Backstage Pass app is the perfect companion app to have when you are watching the 83rd Academy Awards® on February 27th. You’ll get access to live streams from exclusive cameras placed throughout the Red Carpet, the Kodak Theatre and the Governors Ball so you can go beyond the tv broadcast and watch more live Oscar action as it’s taking place. With Oscar Backstage Pass you get more stars, more glamour, more of everything you love about the Oscars®!

To get the Oscar Backstage Pass for only $.99, visit the iTunes app store.

More coverage from the NYTimes.

Radical Transparency in the Internet Age

When it comes to managing your online identity you typically find yourself caught between the two extremes of full transparency and complete control of your image (which, BTW, is only possible by avoiding all online interaction). You may know some Facebook and Twitter users who fit into that first category. They post updates about every hiccup,  paper cut, and causal encounter with photo and video documentation for good measure.

Mark Zuckerberg, founder of Facebook, argues that “you have one identity.” What he means is that internet-enabled transparency makes maintaining more than one identity difficult at best and impossible for most. So if you accept his premise that you really have only one identity, the next decision you’ll have to make is how to manage that one identity to ensure that your multi-faceted personality is both appropriately presented but not inappropriately exposed? Whose going to be in control of our digital identity, if not us?

Even if we are limited to one identity online, we have ways to manage that identity so that we can provide some separation between personal and professional roles. We all manage our presentation of self in “real life” based on contextual cues. For example, manners are simply the managing of our behavior and speech to reflect socially accepted norms for treating others with respect and dignity. Our language changes when we move from a close circle of friends to family to professional contacts. We’re constantly adjusting how we present ourselves depending on the social situation, and people who are unable or unwilling to do this are seen as rude, ill-mannered or socially inept. In a similar way, your profile on Facebook may have a very different tone from the one that you keep on LinkedIn. However, the problem here is that public access to both profiles may be possible depending on your privacy settings. An acquaintance may make the transition from friend to professional colleague, or in the other direction, and thus have ready access to both profiles. This may or may not present a problem…my point is simply that managing distinct identities becomes cumbersome or impossible.

Add to that new services or updates that constantly change the ground rules. Facebook has had a string of problems with privacy protection. The launch of News Feed in 2006, Beacon in 2007 and privacy setting changes in 2009 are just some of the examples of Facebook policies that led to user rebellion. Facebook’s own privacy policy makes it clear that personal data “may become publicly available” and may be “viewed by unauthorized persons.” According to David Kirkpatrick, writing in The Facebook Effect, a poll of US companies found that 35% of them had rejected applicants because of information found on social networks. This was not information hacked from the sites, but rather personal information that the applicant had posted without consideration of who might be in the online audience. Facebook itself admits that only about 25% of users actively use the privacy controls.

Walking the fine line that is personal privacy, many make the mistake that they can control their digital footprint. As your digital footprint grows, and as computers “scrape” your online behavior and link it to other databases, managing your exposure becomes increasingly complex. Simply remembering all of the intricacies and complexities of your multiple profiles becomes unmanageable. And if you employ deception, the task is even more difficult. You’ve heard it said lies beget lies. In other words, we often have to tell a lie to cover up another lie, and the web of deception becomes increasingly complex and difficult to maintain. In the words of Abraham Lincoln, “No man has a good enough memory to make a successful liar.”

So it is with your digital footprint. The more data you surrender willingly, and unwillingly, to marketers and social media, the more more vulnerable you become to their schemes. Do you trust Google, Facebook and Yahoo! to protect your interests? And if not, what steps are you taking to ensure that your identity is safe?

For more information about online privacy visit the EPIC: Electronic Privacy Information Center website.

Social Media Revolution: The Whole World is Watching

It would be an overstatement to say that recent anti-government protests in Muslim countries have been caused by social media. It would NOT be an overstatement to say that social media has played a very important role in both coordinating protest activities and giving new meaning to the slogan, “the whole world is watching.” The largely peaceful transfer of power in Tunisia that began just weeks ago has been a remarkable event and the current protests in Egypt opposing long-term president Hosni Mubarak are nothing short of miraculous. The Green Revolution in Iran, aka the Twitter Revolution, is another example of the critical role that social media has played in enabling a largely youthful underclass as they’ve challenged autocratic rulers and oppressive regimes.

I’m not a political scientist, but this is what I’ve been able to learn about the current uprising in Egypt from several news accounts that I’ve read. The political unrest is rooted in sluggish economic conditions that have resulted in high unemployment for a growing demographic of young, often well-trained, citizens. Evidence of political corruption has added fuel to the fire as protesters, emboldened by what they observed in Tunisia, have called for the end of the 30-year rule by Mubarak. Protesters have been clashing with police who have been deploying water cannons, tear gas and rubber bullets in response. Just yesterday Mubarak called out the army, but may have been surprise by the results. According to reports, members of the army have been joining with protesters calling for the president to resign. But Egypt is a strong ally of the US, and that makes it complicated for our diplomatic corps. While the US supports peaceful democratic transition, it is also gravely concerned about the potential of loosing one of its strongest allies in the region.

Egypt’s response to the protests has been surprisingly heavy-handed. The government shut down internet and cell phone services on Friday in an attempt to disrupt the protesters’ activities, effectively disconnecting 80 million people from the outside world. According to some reports cell phone service was restored a day later, and dial-up internet numbers are being circulated. “The Net interprets censorship as damage, and routes around it”, a quote from 1993 attributed to John Gilmore, captures the challenge of trying to restrict a system that was built to be bomb-proof. Iranians, Tunisians and Egyptians have found, or are finding, ways around information blockades, with proxy servers and other less technical means for maintaining connection to the outside world.

The role of Twitter, Facebook, YouTube and other social media is being debated, and will continue to be debated long after these revolutions have passed. But one thing is certain; social media is a game-changer, and powerful institutions, be they governments, businesses or social movements, can either learn how to use social media to their benefit or they will have to learn to live with the consequences.

Resources:

  • NPR has published a guide to using Twitter to follow the on-going events in Egypt…you can find it here.
  • Al Jazeera, a Muslim news organization, maintains a blog of on-going events here.

Your Mom’s Gonna Hate This

Electronic Arts has taken an edgy and controversial approach to marketing Dead Space 2, a videogame described as a, “third-person horror survival game in which players must battle an alien infestation” by “strategically dismembering” necromorphs. In a viral marketing campaign, [see clip below], 200 “moms” were invited to participate in “market research” that turned out to be a way to collect their on-camera reactions to some of the most horrific scenes from Dead Space 2.  Here’s the clip:

[youtube=http://www.youtube.com/watch?v=jri8LFci4xQ]

In case you missed it, the VO said, “A mom’s disapproval has always been an accurate barometer of what is cool.” But wait, this video game is rated M the by the ESRB (Entertainment Software Rating Board), meaning it is to be sold only to buyers age 17 or older. Last time I checked that crowd wasn’t overly concerned about what their moms liked or didn’t like. Is it possible that EA is actually marketing a game rated “M” to kids younger than those allowed to buy it? This marketing campaign is going to give more ammunition to critics of video game violence: people like Jon Leibowitz, chairman of the FTC, who, according to Wired magazine, was quoted as saying that “the videogame industry’s self-regulatory efforts around the marketing of violent video games to minors are still ‘far from perfect.’”

There’s another issue here that centers on ethics of research. According to the video, “over 200 moms were recruited to participate in market research, only this wasn’t market research.” Obviously the moms were asked to sign a release form that gives EA’s market researchers permission to use the video from the hidden cameras, but the breach of standard research ethics is obvious and appalling. Beyond that, the moms may have legal recourse based on the emotional and psychological distress that they may have experienced in the process. I’m sure EA has a large legal team, but they may be well advised to “lawyer up” in order to defend this controversial example of ambush marketing.

css.php