Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    (Surveillance)
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Surveillance

The Web's New Gold Mine: Your Secrets
Topic: Surveillance 7:38 am EDT, Aug  5, 2010

Acidus:

Think of cookie storage like having to remember an errand to do after work by shouting it at the end of every sentence you say.

Matt Knox:

It's hard to get people to do something bad all in one big jump, but if you can cut it up into small enough pieces, you can get people to do almost anything.

Julia Angwin:

One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.

Beacons can track what a user is doing on the page, including what is being typed or where the mouse is moving.

Eric Porres:

We can segment it all the way down to one person.

Decius:

Money for me, databases for you.

David Moore:

When an ad is targeted properly, it ceases to be an ad.

Sean Cheyney:

We're driving people down different lanes of the highway.

The Web's New Gold Mine: Your Secrets


Maybe You And Your Innocence Shouldn't Be Doing It In The First Place
Topic: Surveillance 6:41 am EDT, Apr 22, 2010

Caterina Fake:

It's an incredible amount of data.

Bruce Schneier:

More is coming.

Thomas Powers:

Is more what we really need?

Decius:

We need to balance privacy interests with the state's interest in monitoring suspected criminals.

Cory Doctorow:

I am enough of a techno-pessimist to believe that baking surveillance, control and censorship into the very fabric of our networks, devices and laws is the absolute road to dictatorial hell.

Sheriff Ed Tom Bell:

The crime you see now, it's hard to even take its measure.

Ryan Singel:

Google unveiled a Government Requests Tool that shows the public how often individual governments around the world have asked for user information, and how often they've asked Google to remove content from their sites or search index, for reasons other than copyright violation.

The numbers reflect only criminal investigations, and do not include national security investigation powers such as National Security Lettters or FISA warrants, which companies are often not legally allowed to disclose.

Matt Higgins:

The nice thing is, it's not a free for all. We're taking care of the problem responsibly. We're targeting the troublemakers, and we're hoping the troublemakers will be gone someday.

Decius:

What you tell Google you've told the government.

Eric Schmidt:

If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.

David Lynch:

So many things these days are made to look at later. Why not just have the experience and remember it?

Ellis:

All the time you spend tryin to get back what's been took from you there's more goin out the door. After a while you just try and get a tourniquet on it.

Libby Purves:

There is a thrill in switching off the mobile, taking the bus to somewhere without CCTV and paying cash for your tea. You and your innocence can spend an afternoon alone together, unseen by officialdom.

Maybe You And Your Innocence Shouldn't Be Doing It In The First Place


Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era
Topic: Surveillance 8:10 am EST, Dec  7, 2009

Christopher Soghoian:

Over the last few years, consumers, corporations and governments have rushed to move their data to "the cloud," adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo.

Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers. Cloud based services also leave end users vulnerable to significant invasions of privacy by the government, resulting in the evisceration of traditional Fourth Amendment protections of a person's private files and documents. These very real risks associated with the cloud computing model are not communicated to consumers, who are thus unable to make an informed decision when evaluating cloud based services.

This paper will argue that the increased risk that users face from hackers is primarily a result of cost-motivated design decisions on the part of the cloud providers, who have repeatedly opted to forgo strong security solutions already used in other Internet based industries.

With regard to the intrusion upon user privacy performed by government agencies, fault for this privacy harm does not lie with the service providers; but the inherently coercive powers the government can flex at will. The third party doctrine, which permits government agents to obtain users' private files from service providers with a mere subpoena, is frequently criticized by privacy scholars. However, this paper will argue that this doctrine becomes moot once encryption is in use and companies no longer have access to their customers' private data. The real threat to privacy lies with the fact that corporations can and have repeatedly been forced to modify their own products in ways that harm end user privacy, such as by circumventing encryption.

Noam Cohen's friend:

Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.

Steve Bellovin et al:

Architecture matters a lot, and in subtle ways.

Decius:

What you tell Google you've told the government.

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era


Entangled Giant
Topic: Surveillance 7:34 am EDT, Sep 16, 2009

Garry Wills:

The momentum of accumulating powers in the executive is not easily reversed, checked, or even slowed.

Some were dismayed to see how quickly the Obama people grabbed at the powers, the secrecy, the unaccountability that had led Bush into such opprobrium.

Perhaps it should come as no surprise that turning around the huge secret empire built by the National Security State is a hard, perhaps impossible, task. A new president quickly becomes aware of the vast empire that is largely invisible to the citizenry.

Keeping up morale in this vast, shady enterprise is something impressed on him by all manner of commitments. He becomes the prisoner of his own power. As President Truman could not not use the bomb, a modern president cannot not use the huge powers at his disposal. It has all been given him as the legacy of Bomb Power, the thing that makes him not only Commander in Chief but Leader of the Free World. He is a self-entangling giant.

Rebecca Solnit:

Some of the worst crimes in the American landscape are hiding in plain sight.

Jules Winnfield:

The truth is you're the weak. And I'm the tyranny of evil men. But I'm tryin', Ringo. I'm tryin' real hard to be a shepherd.

Thomas Powers, in May 2005:

Is more what we really need?

In my opinion not.

But running spies is not the NSA's job. Listening is, and more listening is what the NSA knows how to organize, more is what Congress is ready to support and fund, more is what the President wants, and more is what we are going to get.

Entangled Giant


Gotcha! Why Online Anonymity May Be Fading
Topic: Surveillance 7:34 am EDT, Sep 16, 2009

Kevin Whitelaw:

Users have been flocking to social networking sites like Facebook and Twitter, where they voluntarily share all kinds of details about their lives.

Jonathan Franzen:

Privacy, to me, is not about keeping my personal life hidden from other people. It's about sparing me from the intrusion of other people's personal lives.

Matt Zimmerman:

Everyone, if they are posting information online, unless they are taking very specific technological measures to prevent disclosures, should assume that that information is going to be able to be obtained through the legal process.

Decius:

What you tell Google you've told the government.

Andrew Keen:

In the future, I think there will be pockets of outrageously irresponsible, anonymous people ... but for the most part, we will have cleansed ourselves of the anonymous.

Siva Vaidhyanathan:

It's the collapse of inconvenience. It turns out inconvenience was a really important part of our lives, and we didn't realize it.

Gotcha! Why Online Anonymity May Be Fading


Communications Surveillance: Privacy and Security at Risk
Topic: Surveillance 7:34 am EDT, Sep 16, 2009

Whit Diffie and Susan Landau:

It is a long way from putting clips on wires to having government standards for electronic eavesdropping. How did this come about? Does wiretapping actually make us more secure?

In 2007, Congress legalized warrantless wiretapping; in 2008, it went a long step further, not only legalizing new wiretapping practices but also giving retroactive immunity to telephone companies that had colluded with the government in performing warrantless electronic eavesdropping.

We are moving from a world with a billion people connected to the Internet to one in which 10 or 100 times that many devices will be connected as well. Particularly in aggregation, the information reported by these devices will blanket the world with a network whose gaze is difficult to evade.

The end of the rainbow would be the ability to store all traffic, then decide later which messages were worthy of further study.

Bellovin, Blaze, Diffie, Landau, Neumann, and Rexford:

Architecture matters a lot, and in subtle ways.

Libby Purves:

There is a thrill in switching off the mobile, taking the bus to somewhere without CCTV and paying cash for your tea. You and your innocence can spend an afternoon alone together, unseen by officialdom.

A.O. Scott:

"The Lives of Others" illuminates ... the moral no man's land where base impulses and high principles converge.

Anthony Lane:

You might think that "The Lives of Others" is aimed solely at modern Germans. A movie this strong, however, is never parochial, nor is it period drama. Es ist fuer uns. It's for us.

Louis Menand:

People are prurient, and they like to lap up the gossip. People also enjoy judging other people's lives. They enjoy it excessively. It's not one of the species' more attractive addictions ...

Communications Surveillance: Privacy and Security at Risk


White House Seeks Renewal of Surveillance Laws, Perhaps With Tweaks
Topic: Surveillance 7:34 am EDT, Sep 16, 2009

Tom Malone, in November 2008:

Privacy may turn out to have become an anomaly.

Decius, in February 2009:

The ship has already sailed on the question of whether or not it's reasonable for the government to collect evidence about everyone all the time so that it can be used against them in court if someone accuses them of a crime or civil tort. This is just another brick in the wall.

Now, Carrie Johnson and Ellen Nakashima:

In a letter, the Obama administration recommended that Congress move swiftly with legislation that would protect the government's ability to collect a variety of business and credit card records and to monitor terrorism suspects with roving wiretaps.

But Assistant Attorney General Ronald Weich also told Democrats that the administration is "willing to consider" additional privacy safeguards advocated by lawmakers, so long as the provisions do not "undermine the effectiveness of these important authorities."

Several civil liberties groups are exhorting Congress to use the expiration to begin debate on an array of domestic surveillance issues. One priority is national security letters: no judge signs off on these, and recipients are usually barred from talking about the letters.

Durbin and Feingold want to tighten standards for obtaining national security letters so that the government must show some "nexus to terrorism," heightening the current standard of showing "relevance" to a counterterrorism investigation. The senators also want a judge to be able to review the appropriateness of the gag order on the letters' recipients.

Their new bill, expected to be out this week, will also seek to repeal the legal immunity granted to telecommunications companies included in last year's domestic surveillance legislation. The bill would also ensure that new powers granted under last year's law would not be used as a pretext to target the communications of Americans in the United States without a warrant.

Tune in:

The Senate Committee on the Judiciary will hold a hearing entitled "Reauthorizing the USA PATRIOT Act: Ensuring Liberty and Security" on Wednesday, September 23, 2009 at 10:00 a.m. in Room 226 of the Senate Dirksen Office Building.

Jello:

Not finding the exciting, entrepreneurial nexus of our dreams, we figured we'd start one of our own.

Thomas Powers, in May 2005:

Is more what we really need?

In my opinion not.

But running spies is not the NSA's job. Listening is, and more listening is what the NSA knows how to organize, more is what Congress is ready to support and fund, more is what the President wants, and more is what we are going to get.

From the archive:

The phone is ringing! Answer it!

White House Seeks Renewal of Surveillance Laws, Perhaps With Tweaks


Four Billion Little Brothers?
Topic: Surveillance 5:15 pm EDT, Aug 30, 2009

Katie Shilton:

Participatory sensing opens the door to entirely new forms of granular and pervasive data collection. The risks of this sort of data collection are not always self-evident. Even if we give people options for managing their data, they may not understand the benefits of doing so. Data literacy must be acquired over time through many avenues. Public discussion and debate about participatory sensing will be critical to educating participants about the risks and possibilities of sensing data.

Because time is such a critical factor, application interfaces should encourage participants to engage with the data from the point of collection through analysis, long-term retention, or deletion. Systems should enable continued engagement to allow participants to change their data practices as their context changes. The crux of engaging individuals with decisions about their data is refusing to put that data in a black box. Instead, analyzing, learning from the data, and making ongoing choices about the data become the goals of sensing.

Two from 1999:

Deployment of ubiquitous computing technology will increase rapidly over the next decade, reaching epic proportions and raising challenges in dealing with a deluge of sensor data and real-time context/metadata.

Thad Starner has suggested that a possible solution to these privacy problems is to make information collection systems wearable. If the user carries all of his computer and context tools on his person, he alone has the ability to decide who gets access to this information and who does not.

And where are we now?

The number one privacy risk associated with suspicionless Customs searches of laptops is the fact that Customs officers will view innocent people's personal information.

Bruce Sterling:

Poor folk love their cellphones!

Samantha Power:

There are great benefits to connectedness, but we haven't wrapped our minds around the costs.

Decius, in August 2008:

Don't worry about privacy ... privacy is dead ... there's no privacy ... just more databases ... No consequences, no whammies, money. Money for me ... Money for me, databases for you.

Noam Cohen's friend, in February 2009:

Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.

Steve Bellovin et al:

Architecture matters a lot, and in subtle ways.

Decius, in March 2009:

What you tell Google you've told the government.

Nouriel Roubini:

Things are going to be awful for everyday people.

Four Billion Little Brothers?


Bringing Down the Dogmen
Topic: Surveillance 8:17 pm EDT, Aug 16, 2009

Skip Hollandsworth reports on how a pair of undercover cops infiltrated the secret world of Houston dogfighting.

"We just figured it was piddly shit, something for the local animal-control officers."

Then they started Googling.

"Nothing is slowing these guys down, absolutely nothing," the informant said. "They make Michael Vick look like a pussy."

Manning and Davis had seen their share of homicide victims and had been in a few bloody fights themselves, but they had never witnessed anything like this. They left as quickly as they could and drove to the nearest bar, dog blood still on their boots. "What the fuck have we gotten ourselves into?" asked Manning.

"My dogs were great dogs. They were beautiful, strong dogs. Oh, man, they were beautiful."

(For the full article in four parts, see 1, 2, 3, 4.)

Robert McNamara:

In order to do good, you may have to engage in evil.

Michael Tomasello:

Human beings do not like to think of themselves as animals.

Bringing Down the Dogmen


Extent of E-Mail Surveillance Renews Concerns in Congress
Topic: Surveillance 11:31 pm EDT, Jun 16, 2009

James Risen:

The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said.

Thomas Powers, in May 2005:

Is more what we really need?

In my opinion not.

But running spies is not the NSA's job. Listening is, and more listening is what the NSA knows how to organize, more is what Congress is ready to support and fund, more is what the President wants, and more is what we are going to get.

George Bush, in February 2008:

First of all, we have said that whatever we do ... will be legal.

We're having a debate in America on whether or not we ought to be listening to terrorists making phone calls in the United States. And the answer is darn right we ought to be.

Decius, in February 2007:

It is our failure to avoid embracing fear and sensationalism that will be our undoing. We're still our own greatest threat.

Decius, in February 2009:

The ship has already sailed on the question of whether or not it's reasonable for the government to collect evidence about everyone all the time so that it can be used against them in court if someone accuses them of a crime or civil tort.

Noam Cohen's friend, in February 2009:

Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.

Decius, in March 2009:

We are very close to the point where the 4th amendment will be an anachronism - a technicality that has very little impact on everyday life - and a radical reconsideration will be necessary in order to re-establish it.

Decius, in August 2008:

Don't worry about privacy ... privacy is dead ... there's no privacy ... just more databases ... No consequences, no whammies, money. Money for me ... Money for me, databases for you.

Jello, in June 2009:

The cloud and big data analytics. That is where the boom will come from.

Decius, in March 2009:

What you tell Google you've told the government.

Rivest, Schneier, Bellovin, Applebaum, Cranor, Cheswick, Soghoian, Spafford, Lynn (!), Moss, Neumann, et al:

Dear Dr. Schmidt,

The signatories of this letter are researchers and academics in the fields of computer science, information security and privacy law. We write to you today to express our concern that many users of Google's cloud-based services are needlessly exposed to an array of privacy and security risks. We ask you to increase users' security and privacy protection by enabling by default transport-level encryption (HTTPS) for Google Mail, Docs and Calendar, a technology already enabled by default for Google Voice, Health, AdWords and AdSense.

As a market leader in providing cloud services, Google has an opportunity to engage in genuine privacy and security leadership, and to set a standard for the industry.

Extent of E-Mail Surveillance Renews Concerns in Congress


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0