27 October 2013

Facebook Will Build Its Kingdom

The social network is considering building its own town so its employees never have to leave work. The campus in Menlo Park will include a $120 million, 394-unit housing community within walking distance of its offices. Dubbed Anton Menlo, the 630,000 square-foot rental property is supposed to include a sports bar and a day care for pet dogs.
facebook-privacy-3005.png

Media reports admit that the move towards a 24-hour work lifestyle is new, even for Silicon Valley. The social network insists that employee retention is not a major factor in the plan. Instead, it is a great idea to have more housing options closer to campus. Facebook believes that people will want to live there because they believe in the company’s mission.

The sources revealed that there will be many amenities on the site, including cafes, a store, a sports pub, bike repair shop with onsite storage, pool, spas, and gyms. This move may fix some of the company’s accommodation problems for workers. Indeed, a housing shortage is reported in Menlo Park and some employees couldn’t find places to stay near the corporate campus.

In the meantime, the industry experts point out that in many ways the move is turning the clock back. America had its “company towns” at the turn of the 20th century – the US factory workers were living in communities owned by their employer and provided housing, health care, law enforcement, church and just about every other service necessary. But the drawback is that your life becomes the company, and this is why the 20th century company towns died out.

This move means that employees will always be working. Only 10% of Facebook’s employees will be housed on-site. Apparently, there will not be too many families. The housing will go for market rates, with some being set aside for low-income staff.

Web Freedom Doomed

A recent report, carried out by the advocacy group Freedom House, has taken a look at Internet trends in 60 countries. The results were that despite a pushback from activists which successfully blocked some repressive laws, web freedom still plummeted in 2012.
internet_freedom-150x150.jpg

In 35 of those 60 countries, governments had grown their legal and technical spying powers through the web. A global decline in web freedom in 2012 was determined by broad surveillance, new legislation controlling Internet content and growing arrests of social media users. For instance, Iceland has the most web freedom. On the contrary, China, Cuba and Iran had the least.

In the meantime, declines in Internet freedom were led by 3 democracies - Brazil, India and the US. Apparently, revelations by Edward Snowden demonstrated that changes in online freedom of the United States were eroding extremely fast. Anyway, the United States still made it to 4th in Freedom House’s list.

A number of the governments have acted against the worldwide web because social media was exploited to arrange national protests. Since 2012, two dozen countries have adopted some kind of legislation restricting web freedom. For instance, Bangladesh imposed a 14-year prison sentence on a group of bloggers who wrote posts critical of Islam. Bahrain has also arrested ten people for “insulting the king on Twitter”, while Morocco jailed a teenager for 18 months for “attacking the nation’s sacred values” via a Facebook post which also ridiculed the king. Finally, a woman in India was arrested for just “liking” a friend’s Facebook status.

According to Sanja Kelly, project director for Freedom on the Net at Freedom House, banning and filtering are still the favorite methods of censorship in lots of countries, though the governments are increasingly looking at who is saying what on the Internet and finding ways to punish them. According to the report, law restricting Internet freedom are still sometimes blocked with a combination of pressure from advocates, lawyers, businesses, politicians and the international community. However, this is the 3rd consecutive year web freedom has declined.

Security Agencies Target Tor Network

The NSA has repeatedly tried to attack people using Tor, a popular tool protecting their Internet anonymity. This is despite the fact the software is primarily funded and promoted by the government of the United States itself.

NSA-laptop-010.jpg

According to secret NSA files, disclosed by Edward Snowden, the agency successfully identified Tor users and then attacked vulnerable software on their machines. One NSA technique targeted the Firefox Internet browser used with Tor and gave the agency full control over targets’ computers, including access to files, all keystrokes and all Internet activity. However, the files suggest that the fundamental security of the anonymity service remains intact.

Tor (The Onion Router) is an open-source public project which redirects its users’ traffic via other PCs, called “relays” or “nodes”, in order to keep it anonymous and avoid filtering tools. Journalists, activists and campaigners in America, Europe, China, Iran and Syria rely on Tor network to maintain the privacy of their communications and avoid reprisals from the authorities. The network currently receives around 60% of its funding from the American government, primarily the State Department and the Department of Defense.

Despite the importance of the network to dissidents and human rights groups, the National Security Agency and its British counterpart GCHQ have devoted their efforts to attacking Tor. They claim that the service is also used by people engaged in terrorism, trade of child abuse images, and virtual drug dealing.

While it seems that the agency hasn’t compromised the core security of the Tor software or network, the leaked files detail proof-of-concept attacks, including some relying on the large-scale Internet surveillance systems used by the NSA and GCHQ via Internet cable taps.

Foremost among the concerns is whether the agency has acted against users in the United States when attacking the network. The matter is that one of the functions of the anonymity service is to hide the country of all of its users, which means that any attack could be hitting members of Tor’s American user base.

A less complex attack against the network was also disclosed in July 2013, with its details leading to speculation that it had been built by the FBI or another American agency. While at the time the FBI refused to admit it was behind the attack, it subsequently claimed in a hearing in an Irish court that the agency did operate malware to target an alleged host of pictures of child abuse, with the attack also hitting Tor network.