Could you see any stalwart of the mainstream media in America using the medium of an online comic to address the tensions that so-called Big Data present? Upstart Al Jazeera America commissioned cartoonist Josh Neufeld and reporter Michael Keller to create a graphic novella that you can read here online and you’ll also find download links for iBooks, ePub and PDF versions. This is the first page:
Tag Archives | Privacy
Micah Lee was staff technologist for the Electronic Frontier Foundation and chief technology officer of the Freedom of the Press Foundation when he was first contacted by Edward Snowden. He tells us what he learned about smuggling secrets at The Intercept:
… Read the rest
Late on the evening of January 11, 2013, someone sent me an interesting email. It was encrypted, and sent from the sort of anonymous email service that smart people use when they want to hide their identity. Sitting at the kitchen table in the small cottage where I lived in Berkeley with my wife and two cats, I decrypted it.
The anonymous emailer wanted to know if I could help him communicate securely with Laura Poitras, the documentary filmmaker who had repeatedly cast a critical eye on American foreign policy.
To: Micah Lee
Date: Fri, 11 Jan 2013
I’m a friend. I need to get information securely to Laura Poitras and her alone, but I can’t find an email/gpg key for her.
Your computer, phone, and other digital devices hold vast amounts of personal information about you and your family. This sensitive data is worth protecting from prying eyes, including those of the government.
EFF has designed this guide to help you understand your rights if officers try to search the data stored on your computer or portable electronic device, or seize it for further examination somewhere else. Keep in mind that the Fourth Amendment is the minimum standard, and your specific state may have stronger protections.
via Ars Technica:
… Read the rest
Adobe’s Digital Editions e-book and PDF reader—an application used by thousands of libraries to give patrons access to electronic lending libraries—actively logs and reports every document readers add to their local “library” along with what users do with those files. Even worse, the logs are transmitted over the Internet in the clear, allowing anyone who can monitor network traffic (such as the National Security Agency, Internet service providers and cable companies, or others sharing a public Wi-Fi network) to follow along over readers’ shoulders.
Ars has independently verified the logging of e-reader activity with the use of a packet capture tool. The exposure of data was first discovered by Nate Hoffelder of The Digital Reader, who reported the issue to Adobe but received no reply.
Digital Editions (DE) has been used by many public libraries as a recommended application for patrons wanting to borrow electronic books (particularly with the Overdrive e-book lending system), because it can enforce digital rights management rules on how long a book may be read for.
… Read the rest
It’s standard advice that parents should monitor what their young children do online. For many parents, that means having the computer in a public area so they can see what’s on the screen as their kids surf the web. But some police departments are pushing a far more intrusive option: installing spyware on your computer to monitor every single keystroke your children make.
An investigation by the Electronic Frontier Foundation has found that dozens of police departments around the country are distributing software called ComputerCOP. The software has two features. One is a search engine that lets parents search a computer’s hard drive for pornographic images as well as files relating to sensitive subjects such as drugs and violence. But the other is a keylogger, a program that records every key typed and sends it to a third-party server.
Police departments pay a few dollars per copy to ComputerCOP, and in return they get the software in customized packaging that prominently features the department that paid for the software.
via The New York Times:
… Read the rest
WASHINGTON — Devoted customers of Apple products these days worry about whether the new iPhone 6 will bend in their jean pockets. The National Security Agency and the nation’s law enforcement agencies have a different concern: that the smartphone is the first of a post-Snowden generation of equipment that will disrupt their investigative abilities.
The phone encrypts emails, photos and contacts based on a complex mathematical algorithm that uses a code created by, and unique to, the phone’s user — and that Apple says it will not possess.
The result, the company is essentially saying, is that if Apple is sent a court order demanding that the contents of an iPhone 6 be provided to intelligence agencies or law enforcement, it will turn over gibberish, along with a note saying that to decode the phone’s emails, contacts and photos, investigators will have to break the code or get the code from the phone’s owner.
By Tom Foulsham, University of Essex
Are you being recorded? Thanks to the ubiquity of CCTV and camera phones, the answer is more than ever before likely to be “Yes”. Add to this the growth of wearable technology such as Google Glass and people are increasingly exposed to devices that can monitor and record them, whether they realise it or not.
The privacy implications are obvious, but also interesting to psychologists such as myself, are how such invasions of privacy – real or perceived – change the way people behave in everyday life.
My colleagues and I have been examining the ways people change their behaviour when they are being recorded. In a typical psychology experiment, participants are aware that they are being watched, and a range of equipment monitors their responses, from computers and cameras to eye-trackers and electrodes.… Read the rest
[disinfo ed.'s note: the following is a chapter excerpt from Technocreep: The Surrender of Privacy and the Capitalization of Intimacy by Thomas P. Keenan]
Things were both brutal and creepy in the Paleolithic era as our ancestors struggled to survive. Homo erectus, Homo habilis, and Homo neanderthalensis all had the technologies appropriate to their time: stone tools, clothing, and most especially fire. Recent plant ash and charred bone evidence from the Wonderwerk Cave in South Africa show that, even a million years ago, early hominids harnessed the power of fire on a routine basis.
We can only imagine how bizarre the astounding transformation of matter by fire would have appeared to these people. They would have been as unsettled by this mystery as we are when we walk by a billboard and it displays something we just mentioned in a tweet. They figured it out, and so will we, but not without some burned fingers.… Read the rest
Ian Bogost’s essay at Medium analyzes the unabashed tracking of customers at Disney World, where “Dataland suggests that once data surveillance becomes transactional, it rapidly becomes exhibitionist.” He and his family have just arrived in the Magic Kingdom and been issued with their MagicBand bracelets:
… Read the rest
…Later, after deploying my MagicBand to allow entry into our hotel room, I read the My Disney Experience FAQ, which explains the operation of the MagicBand. It’s an uncharacteristic offering for a company so devoted to “magic” as a black-boxed secret sauce. I learn that in addition to the expected RFID allowing short-range communication at touch-points—room entry, park admission, and points of purchase—the MagicBand also includes a long-range radio transceiver, which communicates with receivers located throughout the Disney properties. The FAQ clarifies, in the vaguest possible way, that these long-range readers are used “to deliver personalized experiences…as well as provide information that helps us improve the overall experience in our parks.”
Disney assures guests that the MagicBands do not store any personal information, just a code used to reference your account in Disney databases.
Tor users, beware. Yasha Levine casts doubt on the privacy of the dark net’s favorite anonymity tool, at Pando:
… Read the rest
“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”
—Roger Dingledine, co-founder of the Tor Network, 2004
In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity.
Internet privacy activists and organizations reacted to the news with shock. For the past decade, they had been promoting Tor as a scrappy but extremely effective grassroots technology that can protect journalists, dissidents and whistleblowers from powerful government forces that want to track their every move online.