Archive for July, 2017

Why Would Amazon Get Into Messaging? – Madison.com

There's a tendency to give Amazon.com (NASDAQ: AMZN) the benefit of the doubt whenever it looks to enter any new market, because the company's track record of disruption across industries speaks for itself. For example, freshly public Blue Apron has already fallen victim to this perception, with the stock now down about 35% from its IPO price. Today, shares of the meal-kit deliverer are getting crushed on reportsthat Amazon has filed for a meal kit trademark.

But what about messaging?

Image source: Getty Images.

AFTVnews is reporting that Amazon is developing a messaging app called Anytime. The e-commerce giant has reportedly started sending out surveys to customers to gauge interest in specific features. In terms of those features, Amazon ambitiously wants to offer just about everything that existing messaging services offer, all in one place. Anytime might even be comparable to full-blown social networks.

We're talking about a potential service that includes voice and video calls, group messaging, @ mentions, photo and video filters, location sharing, interacting with businesses for customer service, cross-platform support, gaming, expressive GIFs and emojis, and even peer-to-peer (P2P) payments. The new Echo Show also offers video calling and messaging, underscoring Amazon's ambitions.

On one hand, you could argue that messaging is a core area that all the other major tech giants have jumped into, so Amazon is just keeping pace with its peers. On the other hand, messaging is already an overcrowded market, with an abundance of apps and services offered by established companies as well as smaller start-ups.

It's worth acknowledging where other companies have failed -- perhaps Amazon can learn from these missteps.

Apple (NASDAQ: AAPL) has tried to break into social networking a couple of times, and has failed spectacularly each time. The Mac maker has seemingly accepted this fate, and now leaves social networking to the pros, now integrating various third-party services instead of building its own. However, Apple is making progress with turning iMessage into a platform, adding a dedicated iMessage App Store last year, with P2P payments coming later this year. The company's biggest advantage is that iMessage is the default messaging service in iOS, and as such enjoys deep integrations.

Alphabet (NASDAQ: GOOG) (NASDAQ: GOOGL) subsidiary Google has never had a clear messaging strategy, offering no less than fivedifferent apps currently (Allo, Duo, Hangouts, Android Messages, and Voice). There was a sixth, Spaces, that was shutdown a couple months ago. Google's internal incubator Area120 released yet anothermessaging app, Supersonic, earlier this year that turned text into emojis, which has also been shut down. There's no compelling reason to have so many disparate apps. Each has a different purpose, but some feature overlap is inevitable. The consequence is consumer confusion, diluting each app's branding.

Getting into messaging on the enterprise side is much more promising. Amazon was reportedly considering acquiring Slack, and the company introduced Chime earlier this year, a video conferencing service. Given the sheer dominance of Amazon Web Services (AWS), expanding further into enterprise productivity software makes an awful lot of sense for cross-selling opportunities.

On the consumer side, it's hard to imagine Amazon making a dent in such a crowded space, particularly since it's so late to the game. Besides, no one is asking for yet another mobile messaging app.

10 stocks we like better than Amazon

When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*

David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Amazon wasn't one of them! That's right -- they think these 10 stocks are even better buys.

*Stock Advisor returns as of July 6, 2017

Suzanne Frey, an executive at Alphabet, is a member of The Motley Fool's board of directors. Evan Niu, CFA owns shares of Apple. The Motley Fool owns shares of and recommends Alphabet (A shares), Alphabet (C shares), Amazon, and Apple. The Motley Fool has a disclosure policy.

Link:
Why Would Amazon Get Into Messaging? - Madison.com

FISA reform is needed, and conservatives should lead the way – Washington Examiner

Congress is getting ready to debate reauthorization of Section 702 of the Foreign Intelligence Surveillance Act, set to expire at the end of the year. Liberty-minded voters and lawmakers should support reform of this provision, to insure that the federal government's power is kept in check.

Both the Republican and Democratic parties have abused warrantless surveillance authorities when in power, to sweep up communications of American citizens in a way that violates the Fourth Amendment to the U.S. Constitution.

Section 702 passed in 2008, when Democrats controlled both the House and the Senate. The original bill was supported strongly by former Speaker Nancy Pelosi. With Republicans in control of Congress and the White House, they now have the power to reform the same surveillance overreach they have previously criticized.

The fight has become an internal struggle between the old establishment guard of the Republican Party and newer, more liberty-minded members who are concerned about privacy and government overreach. The future of the Republican Party includes support for privacy and Fourth Amendment rights. Therefore, the leadership in the House, where this bill is expected to start, should be responsive to the members who are leaders of the privacy movement. Rep. Bob Goodlatte, R-Va., has voiced support for Section 702 reform, and hopefully will lead the charge to bring together divergent elements of the Republican Party, to support a common sense compromise on the bill.

The Bush administration engaged in widespread warrantless wiretapping without any congressional authorization. Likewise, the Obama adminisration used Section 702 to engage in similarly unconstitutional practices.

The provision has been used in a way that violates the Constitution and does not enhance national security. A Washington Post analyzed documents released by Edward Snowden and reported on July 5, 2014 that, "Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency" under Section 702. The Washington Post reviewed 160,000 intercepted email and instant messaging conversations and reported on widespread monitoring of Americans' data that should have required a warrant based on probable cause for the government to collect. This massive data collection is a problem unto itself because the government amasses a giant database of information that they keep.

These abuses are evidence enough that Section 702 needs to be reformed or allowed to expire.

Congress must insist on closing the so-called backdoor search loophole. This loophole allows the government to target Americans under Section 702, under the pretense that they are really targeting foreign nationals. The FBI routinely performs these types of searches, even in cases where they lack the evidence necessary even to open a formal investigation.

There are currently no prohibitions on the use of this information in prosecutions against Americans for alleged offenses unrelated to terrorism. That Section 702 can be used to wiretap Americans without a warrant, and in investigations that have nothing to do with terrorism, demonstrates the amount of mission creep that this anti-terrorism provision has permitted.

Another critical reform that should be imposed on the program would be to limit the scope of Section 702 to only allow targets to be foreign powers or agents, and exclude individuals who are not associated with terrorism and may merely be businessmen or journalists. Furthermore, the upstream surveillance program that has been used to search emails and text messaging on a massive scale should be ended.

Real transparency and oversight of FISA programs needs to be part of any compromise, and any retained data needs to be purged on a regular basis. Finally, private citizens need to have a way to challenge unconstitutional surveillance in court if they believe their rights have been violated.

The law has been implemented in a way that violates the Bill of Rights. This should lead constitutional conservatives in the Senate to filibuster any reauthorization that does not include substantial reform.

Brian Darling is former Senior Communications Director and Counsel for Sen. Rand Paul (R-Ky.). He can be followed on Twitter: @BrianHDarling.

Thinking of submitting an op-ed to the Washington Examiner? Be sure to read our guidelines on submissions.

Go here to read the rest:
FISA reform is needed, and conservatives should lead the way - Washington Examiner

Longmont says release of report on warrantless police searches would be ‘contrary to the public interest’ – Longmont Times-Call

The Suites apartments in Longmont on June 9, 2017. (Cliff Grassmick / Staff Photographer)

Longmont officials on Monday said it would not be in the public's interest to release a 40-page document detailing the independent investigation into warrantless police searches in May at a subsidized housing apartment complex.

The city's denial of the Times-Call's request for the report under the Colorado Open Records Act is the second within a week, following officials' refusal to release documents related to a harassment investigation among City Council members.

Results of a Weld County sheriff's investigation conducted at the request of Longmont officials released Friday revealed that the use of police dogs in warrantless drug searches of units at the Longmont Housing Authority's The Suites complex wa not consistent with the police department's standards.

Officials including Public Safety Chief Mike Butler, rather than releasing the findings, summarized the report in a news release and video saying that police "have already taken corrective actions to ensure that this never happens again."

The news release also said that the police's "policies, procedures, training and practices are all in place and appropriate" and they are looking for opportunities to improve.

The Times-Call also requested the full report from the Weld County Sheriff's Office about its investigation into the searches at the The Suites and any related materials, including any communications from the city to City Council members.

Assistant City Attorney Teresa Tate responded Monday afternoon in an email saying that the city would not release the report connected with The Suites, where residents alleged units were searched in May and were going to be searched again in June.

"The request is denied at this time pursuant to section 24-72-305(5), C.R.S., because the custodian has determined that disclosure would be contrary to the public interest and the records are that of a criminal justice investigatory file involving an ongoing investigation," Tate said.

She later said, in response to why it's considered an ongoing investigation, that Longmont's Public Safety Department has initiated its own internal administrative review.

"This internal administrative review will be examined by a panel of Longmont residents on Longmont's citizens' review panel, among others," she said. "After we have completed our process, we will take any additional corrective actions, if necessary, in whatever form most appropriate."

Additionally, the Longmont Housing Authority is working with attorney David Herrera to conduct its own internal investigation for the board to present, possibly on Tuesday.

Ray Appling, a resident at The Suites who first shed light on the issue, said she is pleased with the conclusion of the investigation.

She came forward to media concerned about a notice posted to her door that police dogs would be accompanying property managers in unit searches, and that she was not told that she could opt out.

"While I have the greatest respect for the difficult job that the Longmont Police Department does, sometimes poor choices are made even with the best of intentions," she said in an email. "I am sure they felt like they were doing a public good by going along with Longmont Housing Authority's idea to search apartments for drugs."

She said the police were wrong in their approach and should have known better than to violate the Fourth Amendment.

"Going forward," she continued, "I hope that the outcome of this investigation not only enforces a need for police education about citizens' rights, but fosters more empathy for the men and women they encounter while on duty. Those who live at The Suites are no different than the police officers who protect and serve us. We are all Americans."

Amelia Arvesen: 303-684-5212, arvesena@times-call.com or twitter.com/ameliaarvesen

Continued here:
Longmont says release of report on warrantless police searches would be 'contrary to the public interest' - Longmont Times-Call

US to create the independent US Cyber Command, split off from NSA – PBS NewsHour

An undated aerial handout photo shows the National Security Agency headquarters building in Fort Meade, Maryland. Photo by NSA via Reuters

WASHINGTON After months of delay, the Trump administration is finalizing plans to revamp the nations military command for defensive and offensive cyber operations in hopes of intensifying Americas ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

Under the plans, U.S. Cyber Command would eventually be split off from the intelligence-focused National Security Agency.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials werent authorized to speak publicly on the matter so requested anonymity.

The goal, they said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world a responsibility that can sometimes clash with military operations against enemy forces.

Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space. The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces ever-widening fears about Russian hacking following Moscows efforts to meddle in the 2016 American election.

The U.S. has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions. But as other nations and foes expand their use of cyberspying and attacks, the U.S. is determined to improve its ability to incorporate cyber operations into its everyday warfighting.

Experts said the command will need time to find its footing.

Right now I think its inevitable, but its on a very slow glide path, said Jim Lewis, a cybersecurity expert with the Center for Strategic and International Studies. But, he added, A new entity is not going to be able to duplicate NSAs capabilities.

The NSA, for examples, has 300 of the countrys leading mathematicians and a gigantic super computer, Lewis said. Things like this are hard to duplicate.

He added, however, that over time, the U.S. has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.

The two highly secretive organizations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Commands creation in 2009.

But the Defense Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyberwarfare, particularly after the Islamic States transformation in recent years from an obscure insurgent force into an organization holding significant territory across Iraq and Syria and with a worldwide recruiting network.

While the military wanted to attack IS networks, intelligence objectives prioritized gathering information from them, according to U.S. officials familiar with the debate. They werent authorized to discuss internal deliberations publicly and requested anonymity.

Then-Defense Secretary Ash Carter sent a plan to President Barack Obama last year to make Cyber Command an independent military headquarters and break it away from the NSA, believing that the agencys desire to collect intelligence was at times preventing the military from eliminating IS ability to raise money, inspire attacks and command its widely dispersed network of fighters.

Carter, at the time, also pushed for the ouster of Adm. Mike Rogers, who still heads both bodies. The Pentagon, he warned, was losing the war in the cyber domain, focusing on cyberthreats from nations such as Iran, Russia and China, rather than on countering the communications and propaganda campaigns of internet-savvy insurgents.

Officials also grew alarmed by the growing number of cyberattacks against the U.S. government, including several serious, high-level Defense Department breaches that occurred under Rogers watch.

NSA is truly an intelligence-collection organization, said Lauren Fish, a research associate with the Center for a New American Security. It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect.

After President Donald Trumps inauguration, officials said Defense Secretary Jim Mattis endorsed much of the plan. But debate over details has dragged on for months.

Its unclear how fast the Cyber Command will break off on its own. Some officials believe the new command isnt battle-ready, given its current reliance on the NSAs expertise, staff and equipment. That effort will require the department to continue to attract and retain cyber experts.

Cyber Command was created in 2009 by the Obama administration to address threats of cyber espionage and other attacks. It was set up as a sub-unit under U.S. Strategic Command to coordinate the Pentagons ability to conduct cyberwarfare and to defend its own networks, including those that are used by combat forces in battle.

Officials originally said the new cyber effort would likely involve hundreds, rather than thousands, of new employees.

Since then, the command has grown to more than 700 military and civilian employees. The military services also have their own cyber units, with a goal of having 133 fully operational teams with as many as 6,200 personnel.

Its proposed budget for next year is $647 million. Rogers told Congress in May that represents a 16 percent increase over this years budget to cover costs associated with building the cyber force, fighting IS and becoming an independent command.

Under the new plan being forwarded by the Pentagon to the White House, officials said Army Lt. Gen. William Mayville would be nominated to lead Cyber Command. Leadership of the NSA could be turned over to a civilian.

Mayville is currently the director of the militarys joint staff and has extensive experience as a combat-hardened commander. He deployed to both Iraq and Afghanistan, leading the 173rd Airborne Brigade when it made its assault into Iraq in March 2003 and later heading coalition operations in eastern Afghanistan.

See more here:
US to create the independent US Cyber Command, split off from NSA - PBS NewsHour

Colorado Selects Free & Fair to Develop Software Tools for First … – Business Wire (press release)

PORTLAND, Ore.--(BUSINESS WIRE)--Free & Fair, a startup developing transparent, cyber secure and verifiable elections systems, today announced it has been selected by the State of Colorado to develop a high-assurance, open source software system to help state and local officials implement risk-limiting post-election audits.

A risk-limiting audit (RLA) is an evidence-based method that checks the integrity of election outcomes by comparing a random sampling of paper ballots to their corresponding digital versions. Colorado is the first U.S. state to require RLAs on a regular basis, starting with the November 2017 off-year election.

RLAs are better and more efficient than the random post-election audits they will replace in Colorado, because they generally require a smaller number of ballots to be audited but still provide a much higher statistical probability that the outcome is correct. At the same time, election experts also consider RLAs an essential component of a secure election process that can protect against both inadvertent tabulation errors and malicious cyberattacks.

Supporting Quotes: Colorado Secretary of State Wayne Williams Over the past decade, in academic journals and elsewhere, a large number of accomplished political scientists, statisticians and election integrity activists have advocated the theory and benefits of risk-limiting tabulation audits. In simple terms, and with a high level of statistical probability that has never existed before, RLAs will limit the risk that Colorado or any of its counties will certify official election results if the outcome is not correct.

Neal McBurnett, nationally recognized expert on implementation of election audits and a member of the Free & Fair implementation team Colorado has been a pioneer in moving election audits forward since 2004, and risk-limiting audits represent the most innovative work on the planet on efficient tabulation audits.

Dr. Joseph Kiniry, Free & Fair CEO and internationally recognized security expert Colorados leadership in elections auditing should be a beacon for the rest of America, and we look forward to seeing risk-limiting audits deployed in the other 49 states. And because the new RLA software system will be open source, other jurisdictions around the country will be able to use it at low cost to audit their own election results.

Ron Rivest, world-renowned cryptographer and Turing Prize winner "Using paper ballots, ensuring effective chain of custody of those paper ballots, and confirming the correctness of election outcomes with statistical post-election audits are among the very best tools we have for securing our elections."

About Free & Fair

Free & Fairs mission is to bring open source, high-assurance elections to the world. Based in Portland, Oregon, Free & Fair provides elections services and systems meeting higher reliability and security standards than the US federal government demands for national security.

Visit link:
Colorado Selects Free & Fair to Develop Software Tools for First ... - Business Wire (press release)