Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
(Miscellaneous)
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Miscellaneous

APOD: 2013 July 23 - Two Views of Earth
Topic: Miscellaneous 10:25 am EDT, Jul 23, 2013

In a cross-Solar System interplanetary first, our Earth was photographed during the same day from both Mercury and Saturn. Pictured on the left, Earth is the pale blue dot just below the rings of Saturn, as captured by the robotic Cassini spacecraft now the gas giant. Pictured on the right, the Earth-Moon system is seen against a dark background, as captured by the robotic MESSENGER spacecraft now orbiting Mercury. In the MESSENGER image, the Earth (left) and Moon (right) shine brightly with reflected sunlight. MESSENGER took the overexposed image last Friday as part of a search for small natural satellites of the innermost planet, moons that would be expected to be quite dim. During this same day, humans across planet Earth snapped many of their own pictures of Saturn.

APOD: 2013 July 23 - Two Views of Earth


Twitter / _decius_: Service Provider Meta-Data Retention
Topic: Miscellaneous 8:48 pm EDT, Jul 20, 2013

Service Provider Meta-Data Retention - US: http://www.aclu.org/cell-phone-location-tracking-request-response-cell-phone-company-data-retention-chart … (years) EU: http://blogs.wsj.com/brussels/2010/08/02/exclusivedata-retention-limits-per-eu-country/ … (months)

Twitter / _decius_: Service Provider Meta-Data Retention


Mood shifting, Congress may move to limit NSA spying | McClatchy
Topic: Miscellaneous 8:44 pm EDT, Jul 20, 2013

Congress is growing increasingly wary of controversial National Security Agency domestic surveillance programs, a concern likely to erupt during legislative debate _ and perhaps prod legislative action _ as early as next week.

Mood shifting, Congress may move to limit NSA spying | McClatchy


The Volokh Conspiracy » Intelligence Under Law — Judiciary Testimony
Topic: Miscellaneous 5:42 pm EDT, Jul 17, 2013

My reply to Stewart Baker's Congressional Testimony:

Suffice it to say that I think that a model that says "collect everything, and let agents analyze it without individualized suspicion, but try to flag questionable searches" is a radical departure from our current approach, which requires justification before collection, and it is also a radical departure from a model that says "collect everything, but require individualized suspicion before analysis."

I don't agree with your assertion that "the risk of rule-breaking is pretty much the same whether the collection comes first or second." If the collection comes first, the data is there to be abused and the risk that it might be abused exists as long as it is there. For example, if the data is stored for 5 years, than at any point in that 5 year period of time an agent decides to make an abusive query, the data will be there waiting for him.

However, if collection comes second, then the data isn't there. It disappears the minute the phone company decides that it is no longer needed for their purposes, and at that point, the risk that it will be abused is over. Any new data created after the point that the agent decides to do something abusive will be available, but the old data will not be. Therefore, the risk to an individual person is significantly lower, and individual people can make real time risk assessments regarding the situation going forward.

For example, lets say you phone Martin Luther King because you support his views on civil rights. Two years later, King makes a public statement opposing a war in Vietnam. At that time, it occurs to you that the military might target King and his associates because King is an influential person who opposes a war that the military wants to get into and they want to shut him up and they want to shut up anyone he might have influenced.

In the collect first scenario, you have to wait for five years after that phone call before you no longer have to worry that the military will find out that you associated with King and target you personally for having done so. In the collect second scenario, you only have to wait six months, or a year at most, until the phone company destroys the data.

The total risk to you in associating with King is significantly reduced the second scenario. Therefore, your likelihood of feeling free to associate with King is significantly greater. Furthermore, if at some point King does something that might make him the target of an illegal government crackdown, you can choose at that point to stop associating with him if thats what you want to do, without having to worry about all of your past associations being exposed.

In other words, the collect first model places a significant chill upon your exercise of your right to freedom of association, because if you ever associate with anyone who later does something that makes him a target of a illegal government crackdown, you could be targeted as well. In the collect first society, you're best off avoiding contact with anyone that might, in the future, be considered an enemy of the state. In the collect second society we don't have to go around worrying about that kind of thing, because, you know, we live in a free society.

The Volokh Conspiracy » Intelligence Under Law — Judiciary Testimony


Keep chipping away at NSA secrecy
Topic: Miscellaneous 4:23 pm EDT, Jul 17, 2013

None of these has gotten much ink, and what continues to remain striking is that, for all the intense media attention to the NSA story, almost no attention has been given to efforts such as these that would actually do something about the problem, or at least one important dimension of the problem. There is not nearly enough media coverage of the various policy fixes that would begin to correct an aspect of this that everyone should agree is problematic, no matter what people think of the NSA programs themselves — the secrecy that shrouds their legal rationales.

Keep chipping away at NSA secrecy


EXCLUSIVE: "Guidebook to False Confessions": Key Document John Yoo Used to Draft Torture Memo Released
Topic: Miscellaneous 1:46 pm EDT, Jul 10, 2013

Air Force Col. Steven Kleinman, a career military intelligence officer recognized as one of the DOD's most effective interrogators as well a former SERE instructor and director of intelligence for JPRA's teaching academy, said he immediately knew the true value of the PREAL manual if employed as part of an interrogation program.

"This is the guidebook to getting false confessions, a system drawn specifically from the communist interrogation model that was used to generate propaganda rather than intelligence," Kleinman said in an interview. "If your goal is to obtain useful and reliable information this is not the source book you should be using."

EXCLUSIVE: "Guidebook to False Confessions": Key Document John Yoo Used to Draft Torture Memo Released


The Torture That Underlies FISA Court’s “Special Needs” Decisions | emptywheel
Topic: Miscellaneous 1:34 pm EDT, Jul 10, 2013

Brennan admits that in affirmations to the FISC relating to the continuation of “certain programs” — that is, the “scary memos” — he relied on information from the CIA’s torture program.

The one that was designed to elicit false confessions from the start.

John Brennan’s admission sure seems to indicate that that original dragnet opinion, the one the others have built on, relies on the unreliable information elicited by CIA torture.

The Torture That Underlies FISA Court’s “Special Needs” Decisions | emptywheel


Could the Supreme Court stop the NSA?
Topic: Miscellaneous 12:31 pm EDT, Jul 10, 2013

The Supreme Court has the power to issue an order called a “writ of mandamus” to deal with lower courts that overstep their legal authority. This type of order is only supposed to be used in “exceptional circumstances.” But EPIC argues that the NSA’s phone records program is exactly the kind of situation that merits the Supreme Court’s intervention.

Could the Supreme Court stop the NSA?


Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance by Katherine J. Strandburg :: SSRN
Topic: Miscellaneous 5:58 pm EDT, Jul  5, 2013

This law review article is from 2008. In it, the author explains why a call records retention program of the sort that has now been disclosed would be an unconstitutional violation of the First Amendment Right to Freedom of Association.

Recent controversies about the National Security Agency's warrantless wiretapping of international calls have overshadowed equally disturbing allegations that the government has acquired access to a huge database of domestic call traffic data, revealing information about times, dates, and numbers called. Although communication content traditionally has been the primary focus of concern about overreaching government surveillance, law enforcement officials are increasingly interested in using sophisticated computer analysis of noncontent traffic data to map networks of associations. Despite the rising importance of digitally mediated association, current Fourth Amendment and statutory schemes provide only weak checks on government. The potential to chill association through overreaching relational surveillance is great. This Article argues that the First Amendment's freedom of association guarantees can and do provide a proper framework for regulating relational surveillance and suggests how these guarantees might apply to particular forms of analysis of traffic data.

Quoting from the article:

The First Amendment’s freedom of association guarantees require that any program of relational surveillance meet a strict scrutiny standard. The surveillance must serve a legitimate and compelling government interest and its methodology must be sufficiently accurate and narrowly tailored to that interest in light of the extent to which it is likely to expose protected expressive and intimate associations.

The collection of all meta-data for everyone all of the time is not "narrowly tailored" and hence it would fail strict scrutiny. The Government's program is unconstitutional.

Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance by Katherine J. Strandburg :: SSRN


Four Americas: The Ideological Fault Lines of the Edward Snowden Affair
Topic: Miscellaneous 1:11 pm EDT, Jul  5, 2013

The public disclosure of classified documents by Edward Snowden has been a polarizing issue, particularly among my friends and colleagues in the infosec world, who pay close attention to matters involving civil liberties, national security, and the Internet. The thing that I have found most disappointing about this whole affair is the need that people have to rationalize their feelings about it by ignoring its reality. I've seen a number of very smart people, for whom I have tremendous professional respect, twist the facts of this situation inside out in order to create simple, morally clear narratives that are utterly wrong.

It is this aspect of human nature that makes political discussions so difficult. We approach challenging controversies with the desire to affirm our own sense of identity and our self interests. Often, the best way to accomplish that, is a selective reading of the facts.

Partisan pundits are professionals who specialize in weaving these narratives for us. They take a set of facts, emphasize and exaggerate some of them, and ignore or minimize others, in order to reach a conclusion that is emotionally satisfying. Having established that the facts clearly lead to a particular conclusion, they then proceed to attack anyone who reaches a different conclusion for not having their "facts straight."

Part of the problem is that we just aren't very good at putting ourselves into other people's shoes, particularly other people that we are angry with.

Its easy to discard facts that don't have any personal relevance for you. In order to understand the relevance to someone else, you've got to go to a lot of effort to understand their circumstances and their point of view. Then you've got to incorporate their legitimate interests into the narrative, leading to a conclusion that is less clearly about you.

It is much easier to just disregard the other side or ridicule them than to respect them and take their interests seriously in this way and risk having to make compromises with them. We want to feel a certain way about a given situation and we're just not interested in points of view that make us uncomfortable. So we construct echo chambers where other people who are just like us tell us how insightful they find our narrow views. People seem to do this regardless of how smart they are, how informed they are, or what part of the political spectrum they are on.

Many of the facts that we ignore and dismiss through this process have more relevance for us upon careful examination than they did at first glance, but we rarely get far enough to figure that out.

Four Americas

In light of these observations, the way that peo... [ Read More (3.8k in body) ]


(Last) Newer << 11 ++ 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 ++ 39 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0