Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    (Surveillance)
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Surveillance

WikipediaVision (beta)
Topic: Surveillance 9:32 pm EST, Nov  9, 2007

Anonymous edits to Wikipedia (almost) in real-time.

In case WikiScanner felt too much like work, now you have an option that's more like TV.

Enjoy!

WikipediaVision (beta)


Risking Communications Security: Potential Hazards of the “Protect America Act”
Topic: Surveillance 10:50 pm EDT, Oct 28, 2007

Following up on an August op-ed by Susan Landau, Bellovin, Blaze, Diffie, Landau, Neumann, and Rexford have come together on an important paper:

The Protect America Act passed in August 2007 changes US law to allow warrantless foreign intelligence wiretapping from within the US of any communications believed to include one party located outside the United States. US systems for foreign intelligence surveillance located outside the United States minimize access to the traffic of US persons by virtue of their location. The new law does not—and could lead to surveillance on a unprecedented scale that will unavoidably pick up some purely domestic communications. The civil-liberties concern is whether the new law puts Americans at risk of spurious — and invasive — surveillance by their own government. The security concern is whether the new law puts Americans at risk of illegitimate surveillance by others.

We focus on security.

If the system is to work, it is important that the surveillance architecture not decrease the security of the US communications networks. The choice of architecture matters; minor changes can have significant effects, particularly with regard to limiting the scope of inadvertent interception. In attempting to collect communications with one end outside the United States, the new law allows the development of a system that will probably pick up many purely domestic communications.

How will the collection system determine that communications have one end outside the United States?

How will the surveillance be secured?

Risking Communications Security: Potential Hazards of the “Protect America Act”


Surveillance & Society Homepage
Topic: Surveillance 10:27 pm EDT, Aug 20, 2007

Surveillance & Society: the fully peer-reviewed transdisciplinary online surveillance studies journal.

This seems like an interesting publication, but: five years on ... why have I never heard of it? (Perhaps because it's mostly a UK publication, with one US-based editor, Torin Monahan, at Arizona State, where they have a School of Justice & Social Inquiry.) Although the description for his course opens with "How are surveillance technologies altering social life in post-9/11 worlds?", the syllabus spends a lot of time on Foucault, Baudrillard, etc. It also spends time on Paul Virilio, Steve Mann, RTMark, "Minority Report" and "Gattaca", but little of this is "post-9/11".

I am curious about how this journal fits into the literature. The editorial board is all academic; this sets it apart from, say, Studies in Intelligence, where authors tend to be practitioners/professionals (though not just of "surveillance").

I only recognize a few authors published here, like Steve Wright (2) and Steve Mann (2, 3).

To see whether this publication is getting cited elsewhere, I asked Google Scholar. Things are being cited (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, ... [ Read More (0.5k in body) ]

Surveillance & Society Homepage


A Gateway for Hackers | Susan Landau | Washington Post
Topic: Surveillance 10:45 pm EDT, Aug 14, 2007

Susan Landau plants a flag now, so she can say "I told you so" in the years to come.

This change looks reasonable at first, but it could create huge long-term security risks for the United States.

Grant the NSA what it wants, and within 10 years the United States will be vulnerable to attacks from hackers across the globe, as well as the militaries of China, Russia and other nations.

Such threats are not theoretical.

... In simplifying wiretapping for US intelligence, we provide a target for foreign intelligence agencies and possibly rogue hackers.

In its effort to provide policymakers with immediate intelligence, the NSA forgot the critical information security aspect of its mission.

You might consider this a follow-up to the article from Sunday.

A Gateway for Hackers | Susan Landau | Washington Post


Privacy and the Clandestine Evolution of E-commerce
Topic: Surveillance 12:59 pm EDT, Aug  4, 2007

The real issue is not privacy as such. It is how information about a person is used.

This new paper by Andrew Odlyzko goes well with Greg Conti's recent article, The Cost of Free Web Tools, from the May/June issue of IEEE Security & Privacy.

Abstract:

This note discusses briefly some questions on economics of privacy, especially the relation of privacy to price discrimination, as well as relevant developments in e-commerce and ordinary commerce. Various open questions that call for further research are discussed. In particular, while much interesting theoretical research has been done, and a small number of informative laboratory experiments have been carried out, much more work would be desirable, especially in some areas of behavioral economics, and there is a great unmet need for active monitoring of the marketplace.

Privacy and the Clandestine Evolution of E-commerce


Surveillance in the Information Age
Topic: Surveillance 9:52 am EDT, Jun 15, 2007

Doubtlessly, modern technology has radically altered the surveillance process. What it has not done, however, is render physical pre-operational surveillance obsolete. Despite innovative Internet tools, a person sitting in an Internet cafe in Quetta, Pakistan, cannot get everything he or she needs to plan and execute a terrorist attack in New York. There are still many things that can only be seen in person, making eyes-on surveillance vital to pre-operational planning. And, as long as actual physical surveillance is required, countersurveillance will remain a key tool for proactively preventing terrorist attacks.

Surveillance in the Information Age


Mexico to boost tapping of phones and e-mail with US aid
Topic: Surveillance 3:52 pm EDT, Jun  9, 2007

As you read this, remember:

American officials hope that Afghanistan’s drug problem will someday be only as bad as that of Colombia.

Now, about Mexico:

Mexican authorities for years have been able to wiretap most telephone conversations and tap into e-mail, but the new $3-million Communications Intercept System being installed by Mexico's Federal Investigative Agency will expand their reach.

The system will allow authorities to track cellphone users as they travel, according to contract specifications. It includes extensive storage capacity and will allow authorities to identify callers by voice. The system, scheduled to begin operation this month, was paid for by the US State Department and sold by Verint Systems Inc., a politically well-connected firm based in Melville, NY, that specializes in electronic surveillance.

Verint helps organizations make sense of the vast video, voice, and data they capture.

Witness Systems, a "call center" operator based in Roswell, has been bought by software maker Verint Systems.

"The purpose is to create swift investigative measures against organized crime," Calderon wrote.

"Although the proposal stems from the president's noble intention of efficiently fighting organized crime," said the president of the justice and human rights commission in the lower house of Congress, "the remedy seems worse than the problem."

The scare quotes above are my own, but I believe them.

Mexico to boost tapping of phones and e-mail with US aid


RE: Enter Search Term Here, Forever
Topic: Surveillance 7:23 pm EDT, Aug 21, 2006

Decius wrote:

Don't you agree with them? I don't think search engines should store usage data indefinately.

As the recent Taylor ruling on the NSA case made clear, one can agree with a decision but not its line of reasoning.

Decius wrote:

I'm not sure I folllow how your distinction between a common carrier and an enhanced service provider is relevent to this discussion. I would say that the phone numbers you dial have approximately the same privacy implications as search terms. Search terms are a bit worse, but it's the same ball park.

My chief complaint was that NYT was making an apples-oranges comparison; there are legal precedents regarding the caller's expectation of privacy with regard to a common carrier, but those precedents do not apply to enhanced services.

The call detail records are a much better analogy, although the phone company has a (more) legitimate business need to retain the records (for a period of time) for billing purposes. Additionally, aggregated call records (perhaps at the level of digital-edge-to-digital-edge) play a role in long-term planning for network capacity. Since Internet search customers are not billed for service, these records do not serve that purpose.

The AOL case complicates the fundamental issue, due to the fact that a time-series history was released. For legal purposes, one would prefer to have a separate ruling on the privacy expectations associated with a single search query (and any associated record of user click-throughs). On this basis, then, the court could proceed to evaluate the implications of long-term accumulation.

Decius wrote:

As time goes on from the search, the risks associated with holding on to that information far exceed the value of storing it.

Is that really true? Or is it the time-series compilation of queries that increases the risk?

As an exercise, compare the damages associated with two cases in which 10 million search records are inadvertantly released. In the first case, the database consists of the last one thousand queries from each of 10,000 users. In the second case, the database consists of the last single query from each of 10 million users.

Decius wrote:

Unfortunately, all of the risk is borne by the searcher and all of the value is borne by the holder. This sort of imbalance is an area where it makes sense for the government to intervene.

The imbalance is real enough, but I'd be concerned that too much government intervention could stifle innovation. It is not enough to simply "empower" the customer with the authority to dictate a binary (yes or no) policy about data retention. Most customers are not in a position to make an informed judgment about this, and service providers are motivated to convince the customer of its necessity. Unless specifically prohibited, you are likely to see practices bordering on coercion ... where a web service is free if you accept the data retention policy, or $10/month if you do not. But such a development would not necessarily be bad, because it puts a valuation on the data. (One would be reliant on market pressure to make this reflect its true value.) Then legislation could set the minimum penalty for disclosure at N times accumulated value, for some N.

RE: Enter Search Term Here, Forever


Enter Search Term Here, Forever
Topic: Surveillance 7:21 am EDT, Aug 21, 2006

NYT says Google et al are wrong to store usage data.

The storing and sharing of [search] data is a violation of users’ privacy rights.

OK, so what's their reasoning?

When people talk on the phone, they assume that the words they utter will disappear when the call is over. They certainly do not expect that their phone company is recording and storing the words, to mine for commercial purposes or to sell to other companies. People have the same expectation about the Internet searches they do: when the search is over, the words they used will disappear.

They confuse the telecom provider's role as a common carrier and basic service provider with Google's role as an information service and enhanced service provider.

Edward Markey, Democrat of Massachusetts, has introduced a bill to prohibit Internet companies from warehousing personal data, including search queries. It is a good start, but it still gives companies too much leeway to keep data. The bill should be strengthened and passed.

This seems rather heavy handed and ill-conceived. Obviously you'd need a user-consent exception to such a rule. Then search providers would force you to log in and accept a terms of service agreement. And then your semi-anonymous cookie is replaced with a login ID; is that better?

Enter Search Term Here, Forever


RE: AOL Search Database
Topic: Surveillance 5:06 pm EDT, Aug 10, 2006

Rattle wrote:

A online search database for the AOL search database that runs at a decent speed is now online.

This is all too sublimely meta. Soon you will learn that this search history has been logged and then leaked, only to be mirrored widely and posted online in searchable form. The cycle continues ad infinitum. It's really quite beautiful.

RE: AOL Search Database


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0