مجمع الأخبار

خوارزميات بناء الهوية البصرية

حمود ستوديو - جمعة, 2017-11-24 12:16
لمن يعمل في مجال بناء الهويات البصرية/ العلامات التجارية بالتأكيد يعلم أن التسلسل الطبيعي لمراحل العمل – في العادة – مع أي هوية جديدة يتم من خلال الاجتماع بالعميل للملخص Brief، ومن ثم ورشة أو ورشات عمل أخرى منها ورشة تفصيلية وأخرى لمجموعة بؤرية أو ما يصطلح عليه بالـ Focus Group ثم عملية البحث البصري […]

MENA Internet Freedom Roundup: October 2017

Social Media Exchange - خميس, 2017-11-16 19:14

On November 6, 2017, Donald Trump tweeted his support for the Saudi King. Pro-Saudi bots amplified it across the Twittersphere.

 

From the Kingdom of Saudi Arabia’s attempt to criminalize online speech to its development of advanced facial recognition technology, we ask, are critical views able to be expressed in the kingdom during its current internal power struggle?

In this month’s roundup of the latest digital rights-related news from the region, we follow up on the disturbing continued use of predictive policing algorithms to constantly monitor and surveil Palestinians living under Israeli occupation. We also look at ongoing restrictions and limitations to information published online in Egypt and Algeria and the serious threat to journalism in Yemen. However, awareness-raising campaigns such as the Egyptian #WeNeedToTalk on Twitter display how internet users are pushing back against human rights violations, online and offline.

In our progress report, we highlight Kuwait’s recent defense of the right to privacy, a major decision that guarantees the right to personal liberty.  

Is Free Speech Online Possible During Saudi Arabia’s Shakeup?

Given the current political situation in Saudi Arabia and Crown Prince Mohammad bin Salman’s attempts to consolidate power, we are concerned that new and existing laws and technologies could be used to silence dissent expressed in the kingdom. The recent arrests of high profile princes and the detention of Lebanese Prime Minister Saad Hariri follow a crackdown on free speech online, the announcement of a new and potentially dangerous algorithm, and the re-emergence of pro-Saudi bots on Twitter.

Though the recent arrests gained major international headlines, the authorities had already been stifling dissent within the Kingdom. In October, Saudi State Security arrested 22 people, including one Qatari national, for “circulating video clips on social media.” The authorities claimed these videos obstructed public order and violated the Information Crimes Law. Earlier in the month, the Interior Ministry arrested 24 people in Hail, a northwestern province, for “exploiting social networking sites to promote lies and exaggerations.” The Saudi Shura Council also revealed a plan to amend the Information Crimes Law to criminalize online content considered offensive to state or religious officials. Anyone who violates this law could face up to five years in prison and a fine of up to three million Saudi riyals.

The development of a new algorithm could also be used to persecute those who criticize the policies of the king and crown prince. Last month, the Interior Ministry announced that it was developing an “advanced facial recognition technology” to identify criminals, which the authorities could use to identify people who are protesting against any of the recent policies.

Beyond just preventing dissent, pro-Saudi bots on Twitter try to obscure the magnitude of the dissent as well. Marc Jones, a researcher at the Institute of Arabic and Islamic Studies at the University of Exeter, recently found that pro-Saudi bots boosted the number of retweets of Donald Trump’s recent tweet praising the efforts of the Crown Prince and King Salman. This is not the first time bots have supported Saudi interests on Twitter; previously, Jones scrutinized the Twitter discourse regarding Saudi Arabia’s blockade of Qatar and concluded that 20 percent of the accounts using #AlJazeeraInsultsKingSalman, which became popular after al-Jazeera posted a cartoon mocking King Salman’s role in the Qatar crisis, were also bots. With Saad Hariri’s resignation announcement and detention inside Saudi Arabia, pro-Saudi bots could hijack nascent hashtags such as #LebaneseAgainstHizballah (#لبنانيون_ضد_حزبالله) and #TheDeportationOfTheLebaneseisANationalDemand (#ترحيل_اللبنانيين_مطلب_وطني), to make it seem like the Saudi narrative is dominating the Twittersphere.

Israel’s Predictive Policing: A Real Threat to Palestinians

Last month, the Israeli police arrested a Palestinian man for posting a picture of himself on Facebook with a caption that read “good morning,” after Facebook translated it into Hebrew as “attack them.” Although Facebook apologized for its incorrect translation, this incident raises serious questions around the use of translation systems powered solely by artificial intelligence.

How the man’s post was brought to the attention of the authorities, however, is part of an even more disturbing trend, as Al-Shabaka’s Nadim Nashif explains in a brief on Israel’s use of predictive policing algorithm, which monitors words like shaheed (martyr), Zionist state, Al-Quds (Jerusalem), and Al Aqsa. By constantly surveilling Palestinians’ online activity and arresting individuals matching profiles built to resemble those of alleged Palestinian attackers, Israel has widely expanded a dangerous surveillance environment that infringes on the digital rights of Palestinians.

The Palestinian Authority has also used similar surveillance tactics. Mohamad Alhaj, a photojournalist living in Jordan, details ways in which the PA tried to recruit him as an informant. After he rejected the PA’s offer, PA intelligence detained him because of a post he shared in a Facebook group he runs. In September, the intelligence officers demanded his passwords, which he refused to give up, and threatened to use the recently adopted Electronic Crimes Law against him. The law has been widely rejected by Palestinian civil society, as reported by SMEX contributor Mona Shtayya earlier this month.

Lebanon Grants Security Agencies Access to Personal Data … Again

The Lebanese government recently renewed its decision to grant all security agencies, including the General Security, the Internal Security Forces (ISF), and State Security, access to telecommunications data for a period of four months. This agreement, between the government and the security agencies, has been in effect since 2012, after an attempt on the life of the former head of the information branch of the ISF. The government has been granting the security services access to the data for six months to a year, but ministers from the Free Patriotic Movement and Hezbollah argued against such unhindered access to all security agencies. Ultimately, the agencies were given access for only four months.

Algerian Media Outlets Request the Lift of the Blockage of Tout sur l’Algerie

Editors of 16 Algerian digital media outlets issued a call to unblock the website Tout sur l’Algérie (TSA), which has been inaccessible on Algérie Télécom and its subsidiary, Mobilis, since October 5, 2017. The director of TSA suspects that the government ordered the block, but the prime minister denied the allegation, saying the website administrators should address the telecommunications operators, despite the fact that the state owns Algérie Télécom.

The Effects of Website Blocking in Egypt

On October 3, Egypt blocked OpenVPN, an open-source tool that Egyptians had used to circumvent government blocking of an estimated 432 websites, including Al Jazeera, the Qatari-funded news network, and Mada Masr, an independent Egyptian publication, between May and September. In response to the censorship of these websites, internet users in Egypt shared Facebook posts and Google Drive links “critical of human rights practices in Egypt” because it is more difficult for the government to censor these URLs. Germany took note of Egypt’s actions; on October 19, German police cancelled a cyber training intended to teach Egyptian security officials how to monitor “websites that encourage extremist thought,” because they feared Egypt would use these methods to persecute innocent people.

Houthis Introduce “Emergency Law”

The Houthis, who have controlled the Yemeni capital of Sanaa since 2014, issued a law that restricts free expression online in Yemen on August 23. The law, enacted by the Houthi-controlled Ministry of Information, requires everyone who wants to practice digital journalism to obtain permission from the ministry beforehand. “Digital journalism” encompasses any content published online, which means the Houthis could censor social media posts as well. The Houthis have also detained 15 journalists, according to a report published by the Association of Yemeni Journalists in October.

Editor’s Pick: We’re Building a Dystopia Just to Make People Click on Ads – Zeynep Tufekci

In this TED Talk, Zeynep Tufekci, a sociology professor at the University of North Carolina School of Information and Library Science and the author of Twitter and Teargas: The Power and Fragility of Networked Protests, speaks about the dangers that algorithms pose to society. While many people still expect dangerous surveillance tactics to resemble “big brother” from George Orwell’s 1984, Zeynep clarifies that these tactics exist and they are far more subtle. She explains that companies like Facebook and Google have already created persuasion architectures, or algorithms that encourage certain behaviors based on data about our vulnerabilities, to influence our social and political decisions. She warns that these algorithms, created to get people to click on advertisements, have led to the emergence a “surveillance authoritarianism” and argues that we need to create a digital economy “constrained by our human values.”

Egyptians Use #WeNeedtoTalk to Raise Awareness About Human Rights Abuses on Twitter

The Egyptian government attempted to spread the #WeNeedToTalk hashtag in an effort to boost the profile of the November World Youth Forum in Sharm el-Sheikh, Egypt, but online activists quickly took over the hashtag to highlight the human rights violations of the Egyptian regime. Activists used the hashtag to raise awareness about unjust imprisonments, torture, forced disappearances, and other issues plaguing Egypt.

Banque du Liban Announces Plan to Launch Cryptocurrency

Banque du Liban, the central bank of Lebanon, which bans the use of Bitcoin and other international cryptocurrencies, is now considering the launch of its own digital currency.  According to Riad Salameh, the governor of BDL, existing cryptocurrencies “are not currencies but rather a commodity whose prices rise and fall without any justification.” He added that BDL, “[understands] that electronic currency will play a prominent role in the future,” but it first has to “develop [a] protection system from cybercrime.”

Progress Report: Kuwait Ruling Defends Right to Privacy

The Constitutional Court of Kuwait overturned the country’s 2015 counterterror DNA law, under which the authorities collected DNA samples from citizens, residents and visitors. The decision to strike down the law came after the court found that it violated articles 30 and 31 of the Kuwaiti constitution, which guarantee the right to “personal liberty” and the protection against unlawful searches, respectively.

Have we missed important news in your country that you would like us to highlight next month? Is there a developing story that’s under-reported where you live? To share story ideas, newsworthy happenings, or critical legislative changes, drop us a line at news@smex.org.

Feminist Editathon Rewrites Women’s Role in History on Wikipedia

Social Media Exchange - أربعاء, 2017-11-15 16:20

Women’s innumerable contributions to society have long been sidelined. In a move to document and make these achievements accessible to all, SMEX partnered with the Knowledge Workshop, Radical, and independent feminists to host an editathon, a collective editing workshop of Wikipedia. The event provided a safe space for women to create new pages in Arabic, expand and enrich existing pages, and translate pages into Arabic.

The workshop, titled “Women Edit Wikipedia: Training and Editathon,” was held in “Masaha: A Space for Digital Freedoms and Open Culture” at SMEX’s office in Badaro on Saturday, November 4, 2017. It was the first women-only event of its kind to be held in Lebanon independently of Wikipedia.

Women Edit Wikipedia: Training and Group Workshop (Editathon) at Masaha, Beirut, Lebanon. Saturday, November 4, 2017.

The event had two focuses: a technical approach to integrate women into the technological world and a content-oriented approach to enhance their ability to use Wikipedia to preserve women’s legacies and record their achievements for present and future generations.

Above all, the primary motivation behind the editathon was the unequal representation of knowledge produced by women. In the English version of Wikipedia, women account for only 17 percent of all available biographies and  account for only 13 percent of Wikipedia editors. In the Arabic version of Wikipedia, which has significantly less content than the English version relative to the size of the Arabic-speaking population, women are even less present. Even when they are represented on Wikipedia, women’s biographies are defined by their relationships to their spouses or other male family members, as opposed to their own contributions, according to Lara Bitar, SMEX’s editorial director.

Following Bitar’s opening remarks about the workshop’s goals, Emna Mizouni, a Wikimedia Tunisia activist and co-organizer of the first WikiArabia Conference in 2015, explained the work of the Wikimedia movement. Mizouni discussed the huge gap in the number of men and women in the movement, urging women to engage more in these initiatives, given the importance of safeguarding women’s achievements and knowledge for future generations.

Activist Nadine Moawad then explained the five pillars of Wikipedia: Wikipedia is an encyclopedia, Wikipedia is written from a neutral point of view, Wikipedia is free content, Wikipedia editors should treat each other with respect and civility, and Wikipedia has no firm rules. For her part, Deema Keadbey, co-founder of the Knowledge Workshop, overviewed the types of preferred sources, how to find and use them in the written texts, and the types of sources that can be cited. Writing in Wikipedia, despite its ease, requires a lot of precision in finding information and exploring sources that are credible and objective, explained Keadbey.

At the training session focusing on the creation of new pages, the names of several prominent Arab women who are not on Wikipedia were proposed. The figures included the former president of the Lebanese Women Democratic Gathering, the late activist Haddad Shakhtoura, journalist Nazih Sa’id, the late politician Zulfa Shamoun, researcher Azza Baydoun, and others. Participants in the session then, using their newly created accounts on Wikipedia, researched information on the women they selected.

This experience generated positive feedback from participants who quickly learned how to write articles on Wikipedia and had the opportunity to learn about women who share their interest in feminism and women’s issues. Together, they hope to be able to counteract the male-dominated content on Wikipedia. During the event, 14 new pages were created, including pages for Jean Said Makdisi, and the Gathering of Lebanese Woman Researchers, and the translation of the biography of Kimberlé Williams Crenshaw, American civil rights advocate and leading scholar in critical race theory. By the end of the event, 20 new editors were trained to edit properly Wikipedia pages and 3,700 words were added to the encyclopedia.

This workshop will not be the last, as collective editing workshops will be held on a variety of topics in the coming months, in an effort to promote open knowledge.

Enhancing women’s presence on Wikipedia is an extremely important issue. “I believe it is absolutely essential that we do our homework, and work hard on the history of Arab women … To know our past better is to understand ourselves better, and to plan for the future better. I hope young feminist scholars and writers will take our movements in this direction,” Jean Said Makdisi told the Knowledge Workshop during a talk earlier this year.

Reported by Sara Obaid and Samaya Jaber from the editorial team of CheckCon, a group of students from the Lebanese University – Faculty of Information working to form a mobile editing room covering conferences and events on various humanitarian, social, media and digital issues in Lebanon and the Arab region.

This article was translated from Arabic by Karim Traboulsi.

Hacklab 5: Freedom of Expression Online

Social Media Exchange - اثنين, 2017-11-06 15:19

In our fifth hacklab of “Abtal el-fada’ el-raqmi” (أبطال الفضاء الرقمي), we hosted a discussion on freedom of expression online, the threats it faces, and ways to protect it. We then interviewed our digital heroes to produce a video tackling local laws and practices regulating expression online.

الهوية البصرية، دليل المصممين

حمود ستوديو - أحد, 2017-10-15 08:32
هناك الكثير من الكتب التي تتناول موضوع العلامة التجارية والهوية البصرية من زوايا مختلفة جدا، كتناولها من زاوية الإعلانات أو الأعمال أو التسويق، والأخير بالتحديد له حصة الأسد، لكن الكتب التي تتناول الموضوع من وجهة نظر المصممين ورؤيتهم قليلة جداً، والموجود يعرض الأمر بشكل معقد لمراحل العمل الإبداعية. وهو ما جاء هذا الكتاب ليحققه، بل […]

Cash festivals

Veretekk V2.0 Platinum Control Marketing - سبت, 2017-10-14 09:00

A poker cash festival  is a cash game that lasts, as a rule, at least a few days in a certain casino or World Of Poker . The festival differs from ordinary cash games, primarily by a larger number of participants and limits.

The festivals are attended by players from different countries, who usually do not meet in a particular casino or room. Moreover, the cash festival usually implies various leisure activities (parties, sports, etc.).

The main task of the cash festival is to create your own mini-community, your culture, your small state. Cash game is not only and not so much money, but rather a pleasant pastime, new acquaintances, new impressions.

Needless to say, there are no tournaments in cash festivals  – or they are significantly “infringed” in rights. Cash players like their format (and there are many such people). They almost do not play tournaments, they like to control their time. In series, cash games are almost always played in parallel. But this is quite another matter. Cash-player has to switch from one to another, he can not follow free graphics, and eternal juggling is tournament, then cache-strategies are also not fun.

Another interesting feature of the festivals  is new or rare varieties of poker. For example, at some festivals they played in the Sviten special, a kind of poker that was little known outside of Norway.

The modern cash-tournament as a poker format is in the development stage and does not dare to compete with large poker series. But this does not mean that this format is not in demand. Still as uses! Cash festivals have their own audience, which is growing year by year.

Cash games are more business than sports .

In tournaments, the blinds are constantly growing, and with the growth of the blinds the factor of luck is increasing. In the cache, you decide: what to play, when to play. You set yourself a time frame. You decide when to get out of the table.

In the cash game it is not necessary to be the first. This is not the format. The main thing is for the player to be comfortable, so that he has the necessary bankroll, and the money will come by himself.

Yes, so far, cash festivals are not as well known as poker tournaments or series. But it’s a matter of time. This format can become massive. This is bound to happen. Although this in general is not so important. If participants and so enjoy the game, from new people, from communication – what else is needed?

 

Earn on the Internet on the blog

Veretekk V2.0 Platinum Control Marketing - سبت, 2017-10-14 07:34

The best way to make money:

When blogs first appeared, it became a kind of hobby for most people, and at best, only marketing tactics.

Now there is a new industry, which arose from the growth of the network – professional blogging. Many people make a living by blogging alone, or by receiving money for what they write for other blogs (which basically can be considered as freelancing ), either by running their own blog or using both of these methods. Learn how to make money online free

Blogging is much harder to establish, but it certainly is possible. It requires much more time, work and dedication, and can be considered an almost full-time job! Nevertheless, many people nowadays have created a good, stable, and extensive income for themselves through blogging alone, with the help of such things as advertising sales, affiliate marketing, sales of related products, and many others.

While fully professional bloggers who earn 100% of their earnings from blogging are becoming a rarity for those already working in the web industry (for example, a freelance web designer , such as many of those reading this article) it is quite common to have a partially successful blog and a small spin-off from it.

Three Ways To Cope With Luck In Poker

Veretekk V2.0 Platinum Control Marketing - جمعة, 2017-10-13 15:17

Let’s talk a little about the beginner’s chances in the game of poker against, for example, the regular or professional of this game.

When novice players come to online poker , more experienced people in this matter recommend them to increase their playing skills, rather than hoping at random. Because in the long run, success is inferior to skill. That’s why there are players who earn poker, thanks only to their skill, not to the fart. Based on this, you need to be able to cope with your luck. But this does not mean to play tight for opponents. Know how to play online poker is important for players

Below are three effective ways that can help your luck go to your side.

  1. Watch your position in the game. To play in positions is to have additional information about the cards of your rivals, while they do not know the power of your cards. Therefore, in the late position, the spectrum of cards being played is much broader, compared with the early position, where it is recommended to play only the nut combination before the flop. Force players out of position to take risks, and therefore make mistakes. At that time, minimize your risk and success will surely smile at you more often.
  2. Know how to read the flop. Any flop should give you an answer about what might be the strongest combinations at the moment or what potential combinations might be in this hand as a whole. And do it then even when you fold your cards. If you learn to do this, you will understand the actions of opponents, why they make such bets. Also, you can limit this to your loss if you flop a pair of queens on a flop when the king and the ace fall on the flop, rather than stupidly believing in their ladies.
  3. Try to read rivals. This tip is more suitable for live poker, but if you want to become a poker professional , then you should notice some nuances of playing your opponents and direct them against them. Of course, there are other points that help to cope with luck, but to begin with, follow these three basic tips.

 

10 GOLDEN RULES OF DAILY SKIN CARE

Veretekk V2.0 Platinum Control Marketing - جمعة, 2017-10-13 14:06

RULE 1:  Choose care products for your skin type

In skin care, the first and most important rule is the use of cosmetics specially designed for your Best Skin Care . Needs for dry and oily skin vary significantly.

RULE 2:  Pay special attention to sensitive areas of the skin

The skin in certain places on the face is more delicate and vulnerable. It requires special care, especially the skin around the eyes and lips. These areas are the most sensitive and require special attention.

RULE 3:  Gentle Cleansing

Care for sensitive skin begins with the removal of makeup. In order not to expose it to additional stress and maintain a natural balance, use neutral neutral makeup remover, which is specially designed for gentle cleansing of the skin.

RULE 4:  Eyes: Risk Area

The skin around the eyes is ten times thinner than the skin of the face in other places. Use special tools to remove make-up from the eyes.

RULE 5:  Exfoliation is the necessary procedure for skin care

Use a kind of peeling suitable for your skin once or twice a week. Peeling should be effective, but soft and not injure the skin. Choose products with a neutral pH that cleans and softens the skin well, maintaining its natural balance.

RULE 6:  Moistening is essential

The dermis consists of water by 70%, and the epidermis by 15%. To ensure that the skin is always well-hydrated, choose moisturizers that maintain a constant level of moisture in the skin. You can also regularly use a moisturizing mask, removing excess surplus thermal water.

RULE 7:  Give preference to hypoallergenic cosmetics

To avoid the risk of allergies associated with the use of cosmetics that are not suitable for your skin type, choose hypoallergenic makeup, especially designed for all skin types and skin around the eyes, including sensitive skin.

RULE 8:  Protection from the sun

Regardless of the time of the year, use cosmetics with sunscreen filters. They can reduce the harmful effects of sunlight, which accelerates the aging process.

RULE 9:  Avoid external adverse factors

Pollution of the environment, smoking, stress … All this has a negative effect on the skin. Use cosmetics that protect your skin from unfavorable factors before leaving home, and thoroughly clean the skin upon returning home in the evening.

RULE 10:  Do not forget about the lips

As soon as you feel that it is necessary, use a regenerating cream for the lips. You can apply the cream repeatedly as often as you wish.

HCG Diet Or Diet For The Lazy.

Veretekk V2.0 Platinum Control Marketing - خميس, 2017-10-12 14:43

HCG diet has thundered like a thunder among people who have struggled with excess weight for many years. Drops HCG – the basis of a new fashionable American diet that really works

So, let’s look at the basic concepts that the hcg diet foods carries in itself.

First, this fast and effective diet is built on the human hormone Gonadotropin Chorionic (HCG) is a natural protein hormone, it forms in the placenta of a pregnant woman. The function of this hormone is to provide fetal nutrition by burning fat in the mother’s body and turning it into energy.

This hormone activates the work of the hypothalamus of the brain, which is responsible for the correct and healthy metabolism. But as we overload our body with harmful products, most of which consist of fats and carbons, the hypothalamus is unable to perform its natural functions.

The hypothalamus has neurons that perceive and fix all changes (temperature, composition of hormones) that occur in the blood of a person and cerebrospinal fluid. The hypothalamus is the center that is responsible for feeling thirst, hunger, sleep and wakefulness. Overweight people often overload their body with a large number of foods and consume a lot of fatty foods, sugar, salt – and this is part of the problem of poor performance of the hypothalamus. As a result, the appetite increases, so-called “food addiction” appears, metabolism slows down, fat is stored in reserve on the abdomen, at hand, in the pelvis and on the legs.

The pattern between the increase in the level of the hormone HCG and the reduction in body fat was noted back in 1950 by a British researcher Dr. Albert Simeons. After experimenting and confirming successful results, this method of losing weight was used by celebrities. At that time HCG hormone was only in the form of injections and was considered an expensive drug, as it was extracted from the urine of a pregnant woman. Now we can find slimming products with HCG hormone in drops, plaster, powder. The HCG drops are the most convenient way, you drip them under the tongue, and they are immediately absorbed into the blood. On how to correctly apply drops, how to conduct three phases of the program, as well as the allowable diet with the HCG diet, you can read in the next article.

 

Free lottery as an alternative to online casinos

Veretekk V2.0 Platinum Control Marketing - خميس, 2017-10-12 13:45

Many of us have met on the Internet numerous articles on how you can make money playing online casinos or cheating them. Looking ahead, let’s say that this is the most outright lie, not only because Best Online Casino games have a negative mathematical expectation of payments, but also because the promised deception of the casino is promoted by the casinos themselves and their owners, because some people believe and carry their own money.

How can this be avoided? To avoid being deceived? Correctly! Do not invest in gambling a penny. After all, how can you take away what is not? That’s why we developed a fundamentally new gambling game –  an absolutely free online lottery with real money prizes. In which, in all seriousness, you can win 10,000 rubles daily. Another thing is that this requires a fairly developed intuition, but this is the second question.

What is the problem when playing our free-Internet lottery? In guessing the number from 0 to 999 999. That’s so simple, extremely simple. But is it easy to guess such a number? It depends on what you compare it to.

It is easy to calculate that the probability of winning the main prize of 10,000 rubles is 1 to 1 million, which is a very high indicator compared to other gambling, especially given the ABSOLUTE free of each attempt.

Each attempt to guess the number costs the Player one Chance. The daily number of Chances of each Player is limited and depends on how actively he helps the “Social Chance” project in social networks. Every day the number of Chances of each Player is renewed – and again everyone has the Chance to win!

Why is it more profitable to play in our free Internet lottery than in an online casino? The answer is simple – an online casino in the long term leads to a loss. This is known to everyone who professionally dealt with the issue of casino gambling, in particular, an online casino. When playing the free Internet lottery “Social Chance” the chances of winning significant amounts only increase, and the deposit inevitably grows.

Remember this word: INEVITABLE. The deposit when playing the free Internet lottery “Social Chance” grows truly unavoidable, which is achieved thanks to the innovative business model of our online lottery, which we wrote about in a separate article.

A particularly inquisitive mind can even draw a parallel with the services of earning on viewing ads. But according to the developers of the free online lottery “Social Chance”, the services of earnings on advertising do not have enough such indicator as profitability, because at an average cost of 20 rubles per 1000 banner impressions, the cost of one advertising display is 0.02 rubles. Thus it is necessary to look through each banner about 5 seconds, plus there is a system commission. In the free Internet lottery “Social Chance” there is  an element of randomness , through which the money collected from advertising is redistributed among players, allowing a certain percentage of players to win substantial amounts.

Here we should also remember the exponential distribution of probabilities and its sacred meaning in the context of the free Internet lottery “Social Chance”. The exponential probability distribution says that over time the probability of occurrence of an event is increasing. If we consider the winnings of substantial sums in the free Internet lottery “Social Chance” events quite rare, then their offensive as long as the game in the “Social Chance” is inevitable. Equally, as well as the deposit is unavoidable when playing in an online casino (recall that online casino games have a negative mathematical expectation of winning.

[Report] Building Trust: Toward a Legal Framework that Protects Personal Data in Lebanon

Social Media Exchange - خميس, 2017-10-05 17:06

للقراءة باللغة العربية

To read or download the report, find it at the bottom of the page. We also held a panel discussion with the authors on August 11, 2017, you can watch a video summary of the session on our YouTube channel. 

The lack of a comprehensive legal framework for privacy rights and data protection in Lebanon has led to the adoption of illegal mass surveillance programs and to the violation of individual and collective privacy without repercussions. In order to understand the mechanisms under which surveillance is conducted in the country, to identify areas in need of reform, and to devise strategic advocacy for privacy protections, SMEX issued its inaugural report on digital surveillance titled “Mapping the Landscape of Digital Surveillance in Lebanon” on December 14, 2016.

Having developed a foundational knowledge base on issues related to privacy, surveillance, and data protection, SMEX designed a program — the SMEX Fellowship for Reporting on Digital Freedoms — to promote, facilitate, and disseminate research on digital rights in Lebanon, with the aim of providing evidence to enhance public discussions surrounding these issues. The fellowship provides an opportunity to develop skills, expertise, and knowledge on digital freedoms-related issues in the Middle East and North Africa (MENA).

The report, “Building Trust: Toward a Legal Framework that Protects Personal Data in Lebanon” is the product of our call to journalists, human rights activists, and researchers to conduct further investigations and research into the state of digital rights in Lebanon. This report was produced by Elham Barjas, a journalist at the Legal Agenda, and Hussein Mehdy, a journalist who has exposed corruption at several Lebanese universities.

Executive Summary

The Lebanese state is increasingly relying on digital technologies in its collection and storage of personal data. It has already started to issue biometric passports and smart biometric residence permits, and to convert driver’s licenses to biometric ones. The Communications Minister has proposed linking individuals’ phone numbers to their IDs through a specialized private company. It is clear that the government is trying to grow its use of new technologies to collect personal data through private companies.

However, the Lebanese state is embracing these new technologies and adopting these new policies without clear guidelines to protect the data it is amassing and without privacy guarantees. This is particularly troubling in light of several cases of data leaks, some of which are known to the Lebanese public while others remain unreported.

This rapid adoption of new technologies without any safeguards led SMEX to conduct a study on the regulatory framework for data protection, especially its legislative and technical aspects, which deal with personal data belonging to Lebanese citizens and people residing on Lebanese soil — to assess its strength and weaknesses. This assessment requires shedding light on both the legislative framework for personal data in Lebanon and the technological mechanisms employed by the relevant authorities to provide data protection. It also requires highlighting cases that justify the mounting questions and skepticism regarding the efficacy of the existing systems, both legal and technological, given that violations of the privacy of different groups of individuals have repeatedly taken place.

In its first section, the study examines the legal framework regarding personal data in Lebanon. Even though Lebanon participated in developing the directives on data protection legislation issued by the United Nations Economic and Social Commission for Western Asia (ESCWA) in 2012, the country still lacks specific legislation on personal data. At the time of publishing this report, the Lebanese legislature has not issued any legislation in this regard, but has held general discussions on the legal definition of personal data and suggested a theoretical framework to process it.

In its second section, the study defines biometric data, explains the technology employed in collecting it, and summarizes the most important methods used to encrypt and protect it from breaches. The study highlights the use of biometrics given recent technological advances and discusses the importance of using sophisticated protections to ensure that data is protected from leaks and breaches. The report summarizes and evaluates the recent adoption of biometric passports and residence permits by the General Directorate of General Security. Additionally, it highlights the types of data the authorities are storing relating to both Lebanese citizens and foreign residents, especially since the Directorate has unhindered access to this data.

In the third section, the study reviews data leaks originating from different sectors, underscoring the extent to which Lebanese citizens and residents’ personal data is being misused. The study reveals that personal data collected in the country is susceptible to infiltration and to leaks due to weak protection systems and the absence of specialized legislation.

In the fourth section, the study reviews the “Electronic Transactions and Personal Data Protection” draft law, which a subcommittee formed by the joint parliamentary committees is currently discussing. This draft law includes a complete section on the protection of personal data. However, since the bill is yet to become law, this study examines articles that protect personal data scattered among different Lebanese laws. It also scrutinizes and evaluates the draft law in light of foreign legislation, especially French law, which has informed the Lebanese draft law and the ESCWA directives with which the Lebanese law should be compatible. In addition, the study highlights the role of the Information and Communication Technology Center at the Beirut Bar Association in improving the bill through its participation in the ongoing discussions held by the subcommittee.

Download (PDF, 737KB)

دانكيرك

حمود ستوديو - جمعة, 2017-09-29 11:44
في الإعلان التشويقي لفيلم دنكيرك بدا فيلمًا مختلفًا تماماً عما سبق وعهدناه من كريستوفر نولان صاحب ثلاثية Dark Knight الأشهر على الإطلاق؛ التي حولت شخصية البطل الخارق باتمان من سلاسل DC Comics الهزلية إلى واحد من أفضل الأفلام على مر التاريخ، بالإضافة إلى أفلام أيقونية أخرى كـ Inception و Interstellar وحتى Momento، والحقيقة أني انتظرت […]

Iraq’s Increased Use of Internet Shutdowns a Worrying Trend

Social Media Exchange - خميس, 2017-09-28 16:09

Despite criticism from free expression and digital rights groups, such as IFEX and AccessNow, the Iraqi government appears increasingly reliant on blocking access to the internet as a tactic to deal with social, political, and security concerns. There have been 25 shutdowns since the beginning of 2017, including 15 in the first half of the year to prevent cheating on exams. The continuation of this practice is disturbing, especially because the government has started to shut down the internet without warning and without reducing the length of its shutdowns. The Iraqi government’s repeated adoption of this tactic demonstrates that its attitude towards internet freedoms is moving in the wrong direction.

The Iraqi government has usually provided a warning before shutting down the internet, but on July 15, 2016, during protests in Baghdad, the government shut down the internet for three and a half hours with no announcement. Then, on July 20th of this year, the Ministry of Communications shut down the internet in the middle of the night without any notification. Though the government gave no reason, this shutdown occurred as the remaining ISIS militants in Mosul intensified suicide attacks.

This graph displays a power outage on the night of July 20th.

 

Even when the Iraqi government shut down internet service for the first time in 2014—in response to “the exceptional security situation Iraq is having,” a reference to ISIS’ capture of Samarra, Mosul, and part of Kirkuk in June of that year—it issued a notice about the shutdown. Though that blockage was limited to five provinces, it was more comprehensive in scale than subsequent shutdowns as the government ordered the total shutdown of the internet and partial blockage of Virtual Private Networks (VPN), and restricted access to various social media sites. While an equally comprehensive warning was issued then, the Iraqi government’s more recent shutdowns are occurring without warning and for relatively benign reasons, marking a troubling regression of digital rights in Iraq.

Moreover, the government reversed course on shortening the length of internet shutdowns. The most recent instance of an internet shutdown occurred during an examination period at the end of August 2017, at the request of the Ministry of Education. The Ministry of Communications stated that “an outage of internet services will occur during the period of the 26th of August until the 10th of September 2017 starting from 6:30 AM-9:30 AM.” The Ministry stressed that for nine days in this window “total service blackout will occur.”

The Iraqi government officially announces the most recent internet shutdown.

Starting in July 2015, the Iraqi Ministry of Telecommunications shut down the internet during the high school bachelor exams in order to prevent cheating, ordering all service providers, including mobile 3G providers, to shut down their services for three hours every day for the duration of the three-week exams. In May 2016, service shutdown was expanded to include high school and secondary schools’ final examination periods. The government recognized the negative impact of these three-hour shutdowns and, earlier in 2017, decreased the period to one hour. Yet, in August, it elected to return to three-hour shutdown periods, proving that the government is choosing to overlook the cost of periodic shutdowns of the internet.

“Partial or complete shutdowns of the internet have taken place in 51 countries in just the first 10 months of 2016,” SMEX reported last year, warning that “in times of political unrest, an internet shutdown could lead to an increase in violence and acts of repression while making it nearly impossible to reach essential services and connect with loved ones.” The internet ecosystem also has a transformational impact on both developed and developing economies, lowering the barriers for business activity, facilitating access to new markets, and helping businesses drive efficiency.

Restricting connectivity has the potential to reverse the positive impact that the internet has on the wider economy. Even partial disruptions can have material economic effects. For example, it can weaken email services, prevent access to dynamic information on weather conditions, and hinder retailers and other businesses from reaching customers in other parts of the country and across borders. It is clear that the Iraqi government’s decision to shut down the internet, even for three-hour periods, negatively impacts Iraqi citizens.

The economic losses due to the 22 shutdowns that occurred between July 2015 and June 2016 are estimated at over $209 million. But beyond the economy, Iraq’s reliance on internet shutdowns is a threat to social and political institutions within the country. The government has created an environment where it is acceptable to block the internet and continued use of this tactic could have drastic effects if the government elects to employ it habitually to face new social and political challenges.

Restricting access to the internet – even for a short period of time – endangers lives, separates people from each other, undermines economic growth, and erodes confidence in a government that takes such drastic and ill-advised steps. The Iraqi government should recognize the widespread consequences of this decision and opt to manage its political and security challenges without threatening the digital rights of its citizens and without disrupting their lives.

Online Vigilantism: A Threat to Justice in Lebanon

Social Media Exchange - ثلاثاء, 2017-09-26 17:51

The Facebook page “Where is the state? (وينية الدولة؟),” which has over 250,000 likes, regularly posts high-quality videos or pictures documenting alleged crimes in Lebanon, garnering hundreds of thousands of views. While Facebook suspended the page on Tuesday, September 26, because it posted personally identifiable information about two individuals, its backup page, which has almost 70,000 followers, remains active.

The mission of the page is to crowdsource detective work in order to catch the perpetrators of these alleged crimes, a practice known as online sleuthing. People view the videos or photos and attempt to identify the suspects, sending information to the page through its inbox or via WhatsApp. This information often consists of names, addresses, and other personally identifiable information. Sometimes, this information is shared publicly via the page, presumably to let the followers of the page know the results of their work. Sharing this information breaches these alleged criminals’ right to privacy and endangers their access to justice in the process. Beyond breaching the right to privacy, this page helps foster an unhealthy vigilante culture in Lebanon and raises questions about its relationship to the state.

A recent video displaying an encounter between a man and a woman clearly illustrates this issue. On Sunday, September 24, the page published a video of a woman leading a man around the Jounieh area, north of Beirut, on a leash, which gained over 500,000 views. Along with the video, the page stated “it remains to be taken on our shoulders to seek to spread the complete identity of all who appear in this video, perhaps thereby compelling the security forces to move and arrest them.” Just a few hours later, the page published a second post claiming that the Internal Security Forces (ISF) had arrested the man in the video, and named him publicly. The page also named the woman in the post and revealed that she identifies as transgender, potentially subjecting her to harassment and violence. Then, on Monday, the page announced that the Internal Security Forces had arrested the woman as well; it posted detailed information about both individuals, including their ages, places of work, and brief descriptions of their life.

Releasing this information violates the right to privacy under Article 14 of the Lebanese constitution and under Article 12 of the United Nations Declaration of Human Rights, which Lebanon has adopted. Ali Mourad, an assistant professor of public law at Beirut Arab University, wrote in a Facebook post, that publishing pictures and information about these people “eliminates the basic principle of presumption of innocence” and promotes the “defamation” of these two individuals. Thus, they are less likely to receive a fair trial and they could be detained without being formally charged. Moreover, the decision to publish information about these individuals places them in danger.

Mr. Mourad emphasizes that this page is particularly dangerous because it not only violates the right to privacy, but it also aims to transform “every citizen…into detective, judge, and informant.” The administrators of the page encourage Lebanese citizens to provide information about innocent individuals and publish it indiscriminately. In this case, the page shared extremely detailed information about the arrests of both people, claiming it had received it from its followers. Even the post about the arrest contained more personally identifiable information about the individuals than ISF’s Facebook post regarding the incident.

Some people are asking whether the authorities, instead of intervening to protect people and their personally identifiable information, are actually helping and supporting this page. In his Facebook post, Mr. Mourad mentioned that “public administrations interact often and positively with this page.” One activist, who wished to remain anonymous, posited that both the quality and quantity of the videos on this page suggest that the ISF run the page, or at the very least are in contact with the person who does. Vigilante culture is dangerous on its own, but it becomes even more dangerous if it is possibly receiving tacit support from the authorities.

As a digital rights organization, we ask the Facebook page administrators to seek the support of proper channels to investigate crimes. Posting individuals’ personally identifiable information threatens the safety and well-being of presumably innocent individuals. More importantly, we urge the Lebanese state to protect the privacy rights of its citizens and those residing on Lebanese soil; this entails creating stronger data protection laws to ensure third party actors cannot release personally identifiable information about people without any repercussion.

Hacklab 1: How the Internet Works

Social Media Exchange - اثنين, 2017-09-11 15:42

In April 2017, SMEX launched a program to empower youth with the knowledge and tools needed to safely navigate the internet. “Abtal el-fada’ el-raqmi” (أبطال الفضاء الرقمي) aims to create a community of tech-savvy youth committed to using the internet for social change.

In its first phase, the program consists of six hacklabs designed to equip the participants with the knowledge necessary to understand the digital sphere and the tools needed to help make it a safer space.

Our first hacklab focused on explaining to the youth how the internet works. Together with our digital heroes, we produced a video that illustrates the trajectory of a text message from its sender to its recipient and provides a helpful tip on how to keep one’s messages private.

How to Get TV without Cable: Free and Cheapest Alternatives

Mr - اثنين, 2017-08-28 18:17
Discover Best Way to Watch Television and Get Many of Your Favorite Channels and Shows Without Cable/Satellite, Contract, or High Cost Many people that cancelled their paid television subscriptions had to figure out how to get TV without cable or satellite. Whether it was the high cost or lousy service that motivated their decisions to make a change, the setup had to be simple and cost-worthy. This brings us to two basic ways how to get TV channels without cable: 1) Internet TV; and 2) OTA (Over-the-Air) TV. Both setups can be as simple and cost-effective as you want it

How to Watch Football Without Cable or Satellite

Mr - سبت, 2017-08-19 17:44
Three Great Ways to Watch NFL and NCAA Football Without Cable or Satellite TV and Save Money If you are in a hurry to learn how to watch football without cable TV, then follow the instructions below. You can get access to all local, national and international games within your fingertips. This also includes watching preseason and regular season games as well as playoff and championship/Super bowl games. Three Great Ways to Watch Football without Cable Plus Other Sports: 1. LiveTvWeb (eDigitalplace) – 247TvStream delivers live premium sports TV channels from all popular sports networks from the Internet. Watch live

Best Satellite TV for PC Technology and Methods

Mr - جمعة, 2017-08-11 21:22
PC Satellite TV Software and Non-Software Services – How to Find and Use Them Satellite TV for PC technology is nothing new and there are many related terms used today. That said, don’t get confused when coming across different names as you will soon discover here. This method has been around for some years but never has there been a better time to use it. Setting this up can be as easy as using an Internet-connected computer with access to any free or pay-to-watch web TV service. You may be searching for a cheaper TV solution and way to cut

LiveTvWeb, eDigitalplace – 247TvStream Membership Sports and Entertainment TV

Mr - خميس, 2017-08-10 17:13
See All Subscription Pakcages and Fees Below… ————————– Special Event on eDigitalplace – 247TvStream: Coming Soon   *************************************************** Best of Live Streaming Sports TV Entertainment With Movies, TV Shows, News, Music Videos Very Important Notes: eDigitalPlace and LiveTvWeb memberships are owned by the same service. There is nothing different about them, with exception to number of membership packages offered and prices. Both membership websites redirect to the same sister website (247TvStream). This is where you watch live premium TV channels online with or without movies, TV shows, news broadcasts, and music videos. You get to choose sports only or sports with
لَقِّم المحتوى