Common-law = Snooplaw

Rather than talk about the FBI’s desire to patrol the Internet backbone, have your laptop searched without warrant or any particular reason when facing US Customs officers, or Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), I want to quickly talk about the Australian government’s desire to give law enforcement and corporate IT the power to monitor and inspect any and all electronic employee communications. What is most concerning is that it continues an Australian trend to insert American attitudes into common-law.

Terrorism Down Under

I don’t want to come off seeming as though I think terrorism is a small or unimportant issue. It’s not – terrorism is a very real issue, and it has incredible financial and human costs. That said, whenever someone mentions either children or terrorism as a justification for a new piece of legislation that would dramatically extend the surveillance powers of public and private actors, I immediately want to know just how invasive those new powers might be. Whereas Australian law presently only allows security companies and those dealing with the government to survey communications without permission, after a four year fight to revise the Telecommunications Interceptions Act the government may be successful in extending those surveillance powers. If the amendments are passed, all corporate IT groups will be able to survey employees’ digital communciations. The government’s reason for extending the surveillance powers is that, by monitoring workers’ emails, it will be possible to stop/deploy coercion towards those who would;

attack to disable computer networks that sustained the financial system, stock exchange, electricity grid and transport system “[and would consequently] reap far greater economic damage than would be the case of a physical [terrorist] attack”. (Source)

Continue reading

Lollipop Ladies and Ubiquitous Surveillance

Just a quick note, but in Britain lollipop ladies may soon be outfitted with cameras to monitor traffic at dangerous intersections. It’s the children, of course, who are motivating this new deployment of cameras – cameras will presumably cut down on dangerous drivers. Whether attaching cameras to little old ladies will be effective, it has been shown that traffic cameras have been incredibly effective in some areas of the US in reducing dangerous driving. These cameras have been so successful, in fact, that cities are removing their cameras because drivers are committing fewer crimes; the cameras are simply not profitable.

I wonder if Britain will treat cameras attached to old ladies the same way?

Boost Up Your Net With ISP Injections

I’ve written about Deep Packet Inspection (DPI) technologies before, and their various potential privacy issues. Generally, I’ve talked about how the possibility of having your ISP persistently monitor your online actions could stifle the substantive abilities exercising of autonomy, liberty, and freedom of conscious. I won’t revisit those issues here, though I’d recommend checking out my earlier post on DPI. What follows examines how ISPs are injecting information into the webpages that you visit, which prevents you from viewing webpages as they were designed.

Web Tripwires

When you visit a webpage, your computer downloads a little bit of code and renders it on your screen – the web is an environment where visual stimulation necessitates copying data. Recently, researchers from the University of Washington and the International Computer Science Institute have discovered that about 1.3% of the time what is displayed on your computer’s screen has been altered. This having been said,

Continue reading

Honda GPS Warns Drivers of High Crime Zones

Honda has released a new GPS system for their vehicles where it will warn drivers when they’re about to leave their car in areas where there is a high chance of theft, vandalizm, or other criminal activity. I have two, relatively short, things to note about this:

A Comical Note

I can just imagine programming this thing for Rio – all the device would say was ‘If you’re stupid enough to think that this will help you here, you’re almost certainly a tourist’.

A Less Comical Note

This continues the pervasive surveillance of what you’re doing AND associates it with databases that you can’t be certain are terribly secure. I imagine that if a particularly enterprising individual surreptitiously made a few changes, and the the GPS was followed to the letter, that badness would ensure. Beyond fear-mongering, however, this technology associates perpetual vehicular monitoring with safety, and mistakenly presents the notion that police equally monitor and respond to reports in all areas of GPS coverage. This is a legitimate badness – it further complicates the problems surrounding self-awareness and unquestioned reliance on external data sources, sources that can become significant factors in one’s daily life.

Of course, it won’t be sold that way: Live in safety! Let us watch you! Surveillance stops all crime! Just look at CCTV in Britain.

Gizmodo link

Identification, Identity Systems, and the REAL ID Act

In a recent presentation to the Summer 2007 Privacy Symposium, Jim Harper lays out a series of concerns about a national identification system. I’m just going to run through them quickly – watch the video that I link to at the end of the post to view his presentation yourself.

Authentication versus Identification

  • Authentication is where you are challenged to provide a set of items/data in order to gain access to something. An example would be the requirement to have both a banking card and a PIN to access your bank account – this authenticates your access to the resource, but it isn’t a wholesale validation that it is actually Christopher Parsons who is accessing my bank account. Instead, what this does it is gives enough information to the bank that it is comfortable providing access to my bank account, without actually knowing for sure that it is me accessing the account.
  • Identification draws on unique characteristics that make up who you are, and validates that person attempting to gain access to X or do Y against the recorded characteristics that identify that person. This involves validating a person against facets of their constitutive being, with a popular identifier coming from biometric information. This passes beyond authentication systems because the person is certifiably identified. Whereas I can give you my bank card and PIN, I would have a far harder (and more painful) time giving you my right eye and left thumb.

Continue reading

Privacy: A Quick Lit Review

This isn’t a ‘full’ post, in the sense that I’m not actually going to get into any issues. Instead I’m going to put up a list of texts that are particularly helpful in getting into debates surrounding privacy, as well as some texts that deal with privacy as it relates to the process of digitization. I want to do this for two reasons: First, because I am curious to see how I would change this list in a year or two’s time, and second because when I was getting into my Master’s project I couldn’t find anything like the list I’ve prepared.

For the usual purposes of full disclosure/covering my ass, I’ll note that this list should be read as something ‘ongoing’/’in development’. It’s not comprehensive of everything that I’ve ever read and only reflects what I’ve been exposed to up until this point.

Core Books

Philosophical Dimensions of Privacy: An Anthology by Ferdinand D. Schoeman.
Somewhat amusingly, I finally got this book just a month or so after receiving my MA. Why is this the first book on the list? Because it would have saved me a metric buttload of time in going to primary sources to ‘catch up’ on the genealogy of privacy debates. Schoeman has done an exceptional job in collecting major issues and debates in privacy, drawing from prominent philosophical and legal theorists. The downside: it was published in 1984, so it misses the more contemporary discussions in the ongoing debates surrounding privacy. That said, its indispensable if you’re looking for a solid first academic discussion of privacy.

Continue reading