I need to begin this post, in an unambiguous fashion: I absolutely do not support the terrorist attacks in Mumbai that claimed the lives of hundreds, and injured many more.
Now that that disclaimer is out of the way….
How stupid is the media to have swallowed the nonsense concerning Blackberries that Indian and American security groups are spewing!?! I’m speaking about the apparent shock of Indian security forces that the individuals who launched the attacks in Mumbai used Blackberries to keep up-to-date about the effects of their actions. The Australian Sunday Mail, as an archetypical example, writes,
I don’t have a lot of time (term is coming crashing to an end, and I don’t want to get crushed!), but I thought I should probably post how to get a Blackberry to actually work with OS X once Pocket Mac stops working (and it will…trust me). But first, I want to have a bit of a preamble…
I love my Blackberry. It goes where I go – it’s rarely more than a few meters away from me. It has truly reacquainted me with email, and that’s great. I also love my MacBook. I’m rarely away from it for more than 12 hours at a time, and it’s a delight to use. I like the OS, the craftsmanship, and so forth.
I really hate how poorly RIM has decided to treat Blackberry owners who use Macs. RIM’s syncing ‘solution’ is Pocket Mac, which is a load of junk. In Windows, I could upgrade my OS, could configure my BB, could install applications, and so forth using the BB sync client. I can’t do that on a Mac – it’s been almost 2 years since they released Pocket Mac, and I still can’t do these basic operations, which means that I need to have a Windows virtual machine. On top of that, Pocket Mac will, fairly regularly, just stop syncing my contacts and calendar (it can’t actually sync anything else with any reliability). For a few months I’ve been trying to get this resolved, and progressively getting more and more annoyed. Annoyed to the point that I’m tempted to just move to an iPhone (I won’t because of security issues, and I can’t just get an email plan without a data plan, but it’s tempting).
Today I figured out how to resolve my issues with Pocket Mac not syncing properly anymore.
So, there is a great new technology that all the newest TVs and computers have: it’s called HDCP. This technology is great – it offers incredible resolutions for you movies, bringing a level of clarity to them that hasn’t ever been seen before.
The problem is, you might not be able to watch movies from iTunes on your TV at home if you’re using one of Apple’s new Macbooks.
While I can appreciate that Apple has a real need to ‘secure’ the content in the iTunes library if they’re to keep ‘Big Media’ happy, it seems unreasonable that customers may be prevented from watching their videos on non-HDCP enabled screens if they want to. No wonder Jobs was pushing the new Apple monitors so hard when he revealed the new macbooks…
Ecommerce times has recently put out a good piece, titled Online Ad Targeting: From ‘Maximize’ to ‘Optimize’. In it, Troiano effective notes that online advertisers aren’t making much money by bombarding their customers with irrelevant ads, and the attempts to use deep packet inspection technologies as NebuAd and Phorm strike potential customers as ‘creepy’. He suggests that advertisers adopt three principles:
User control: Users should own and control their personal information. Period. It sounds like a novel idea, but when people have control over their own personal information and can choose to share it or not share it with whomever they want, that will make them feel all warm and fuzzy inside.
Transparency: Offering an opt-out option is not enough. Any online entity that tracks or collects user data of any kind should be straightforward and alert users to its practices. It’s not wrong to target ads, but it is wrong to collect users’ personally identifiable information without their permission. If companies adhere to this level of transparency, the need for potentially stifling congressional control is significantly lessened.
Trust: Offering users a high level of control over their information and requiring a high level of transparency from online publishers and retailers will result in mutual trust. Users will share certain information about themselves in return for something they want and companies will promise not to use their information in inappropriate ways. Building this kind of trust is not easy, but when achieved it will create a mutually beneficial relationship.
The Canadian SIGINT Summaries includes downloadable copies, along with summary, publication, and original source information, of leaked CSE documents.
Parsons, Christopher; and Molnar, Adam. (2021). “Horizontal Accountability and Signals Intelligence: Lesson Drawing from Annual Electronic Surveillance Reports,” David Murakami Wood and David Lyon (Eds.), Big Data Surveillance and Security Intelligence: The Canadian Case.
Parsons, Christopher. (2015). “Stuck on the Agenda: Drawing lessons from the stagnation of ‘lawful access’ legislation in Canada,” Michael Geist (ed.), Law, Privacy and Surveillance in Canada in the Post-Snowden Era (Ottawa University Press).
Parsons, Christopher. (2015). “The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians,” Telecom Transparency Project.
Parsons, Christopher. (2015). “Beyond the ATIP: New methods for interrogating state surveillance,” in Jamie Brownlee and Kevin Walby (Eds.), Access to Information and Social Justice (Arbeiter Ring Publishing).
Bennett, Colin; Parsons, Christopher; Molnar, Adam. (2014). “Forgetting and the right to be forgotten” in Serge Gutwirth et al. (Eds.), Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges.
Bennett, Colin, and Parsons, Christopher. (2013). “Privacy and Surveillance: The Multi-Disciplinary Literature on the Capture, Use, and Disclosure of Personal information in Cyberspace” in W. Dutton (Ed.), Oxford Handbook of Internet Studies.
McPhail, Brenda; Parsons, Christopher; Ferenbok, Joseph; Smith, Karen; and Clement, Andrew. (2013). “Identifying Canadians at the Border: ePassports and the 9/11 legacy,” in Canadian Journal of Law and Society 27(3).
Parsons, Christopher; Savirimuthu, Joseph; Wipond, Rob; McArthur, Kevin. (2012). “ANPR: Code and Rhetorics of Compliance,” in European Journal of Law and Technology 3(3).