I tried. I tried so hard. I’ve spent literally years drooling over her. I’ve seen her cousins at some of my friends’ offices, and I was blown away. My choice of either a tall, slim image or one with a little more meat on the sides. My choice, and I could switch things around whenever I want.
I wanted to be with her so bad. After the time we’ve been together, I’ve touched her. I’ve caressed her. I’ve spent tens of hours reading about how to make us work together a bit more. I’ve really tried – I mean that. I realize that all relationships have a honeymoon phase, and that I might have been a little too optimistic that everything would work out between us, but I’ve never had a relationship like this be so challenging.
In this case, there is no compromise with her; she’s definitely a prima donna. In the past I’ve been able to put my ladies to either side of my primary display. This time, however, my Dell 1907 has to be in the front of me or else the colours are washed out. It’s amazingly annoying – to have spent a ton of money on a nice new 19′ monitor that I have the ability to rotate 90 degrees is pretty awesome. I had hoped that I could just wait it out, that I could adjust where it was and things would be better. Of course, this meant that I waited beyond the time that I could return the monitor. It’s not that it’s bad per se, but simply that it’s not good. Continue reading
There’s a good chance that you’ve heard of the recent speech that Obama gave about racial issues in the US, but there is (unfortunately) a good change that you haven’t read it. I wouldn’t blame you if you haven’t – a lot of speeches that are talked about really aren’t worth reading. That said, if you haven’t read a speech in decades, read this one. It’s powerful, it’s poignant, and it’s deep. It’s also written by the candidate himself.
This isn’t a ‘full’ post, in the sense that I’m not actually going to get into any issues. Instead I’m going to put up a list of texts that are particularly helpful in getting into debates surrounding privacy, as well as some texts that deal with privacy as it relates to the process of digitization. I want to do this for two reasons: First, because I am curious to see how I would change this list in a year or two’s time, and second because when I was getting into my Master’s project I couldn’t find anything like the list I’ve prepared.
For the usual purposes of full disclosure/covering my ass, I’ll note that this list should be read as something ‘ongoing’/’in development’. It’s not comprehensive of everything that I’ve ever read and only reflects what I’ve been exposed to up until this point.
Philosophical Dimensions of Privacy: An Anthology by Ferdinand D. Schoeman.
Somewhat amusingly, I finally got this book just a month or so after receiving my MA. Why is this the first book on the list? Because it would have saved me a metric buttload of time in going to primary sources to ‘catch up’ on the genealogy of privacy debates. Schoeman has done an exceptional job in collecting major issues and debates in privacy, drawing from prominent philosophical and legal theorists. The downside: it was published in 1984, so it misses the more contemporary discussions in the ongoing debates surrounding privacy. That said, its indispensable if you’re looking for a solid first academic discussion of privacy.
Today I want to just briefly talk about the competition between Apple’s iPhone and Research in Motion’s Blackberry. I’m not going to bother with things like the aesthetics or the ease of using one over the other. Instead what I want to talk about is how these devices are, and will (in the iPhone’s case) be used. I’ll, as usual, provide a bit of background and then get to what is the real issue with these devices: unless secured, these devices, and other like them, can reveal a substantial amount about yourself and others, enough that it would be a relatively simple task to assume your identity and potentially negatively affect others’ identities/reputations.
Packing Some Confidential Property
I’ll admit it: whenever I go anywhere, my Blackberry comes with me. I use it to track all facets of my life: my contacts (i.e. who I know, what I know about them, notes that I see as important about them), my calendar (i.e. what I do at almost all points of my day, who I’m meeting with, why I’m meeting with them), my email (i.e the communication that I have and think should be recorded for a later date), and my instant messaging (i.e my personal discussions that let me be me with friends). This is super-convenient for me. It also means that I’m carrying a device that would give someone who found/stole it a significant insight into my life and some insight into the lives of people that I know.
The Canadian SIGINT Summaries includes downloadable copies, along with summary, publication, and original source information, of leaked CSE documents.
Parsons, Christopher; and Molnar, Adam. (2021). “Horizontal Accountability and Signals Intelligence: Lesson Drawing from Annual Electronic Surveillance Reports,” David Murakami Wood and David Lyon (Eds.), Big Data Surveillance and Security Intelligence: The Canadian Case.
Parsons, Christopher. (2015). “Stuck on the Agenda: Drawing lessons from the stagnation of ‘lawful access’ legislation in Canada,” Michael Geist (ed.), Law, Privacy and Surveillance in Canada in the Post-Snowden Era (Ottawa University Press).
Parsons, Christopher. (2015). “The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians,” Telecom Transparency Project.
Parsons, Christopher. (2015). “Beyond the ATIP: New methods for interrogating state surveillance,” in Jamie Brownlee and Kevin Walby (Eds.), Access to Information and Social Justice (Arbeiter Ring Publishing).
Bennett, Colin; Parsons, Christopher; Molnar, Adam. (2014). “Forgetting and the right to be forgotten” in Serge Gutwirth et al. (Eds.), Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges.
Bennett, Colin, and Parsons, Christopher. (2013). “Privacy and Surveillance: The Multi-Disciplinary Literature on the Capture, Use, and Disclosure of Personal information in Cyberspace” in W. Dutton (Ed.), Oxford Handbook of Internet Studies.
McPhail, Brenda; Parsons, Christopher; Ferenbok, Joseph; Smith, Karen; and Clement, Andrew. (2013). “Identifying Canadians at the Border: ePassports and the 9/11 legacy,” in Canadian Journal of Law and Society 27(3).
Parsons, Christopher; Savirimuthu, Joseph; Wipond, Rob; McArthur, Kevin. (2012). “ANPR: Code and Rhetorics of Compliance,” in European Journal of Law and Technology 3(3).