Review: Access Denied

The OpenNet Initiative’s (ONI) mission is to “identify and document Internet filtering and surveillance, and to promote and inform wider public dialogs about such practices.” Access Denied: The Practice and Policy of Global Internet Filtering is one of their texts that effectively draws together years of their research, and presents it in an accessible and useful manner for researchers, activists, and individuals who are simply interested in how the Internet is shaped by state governments.

The text is separated into two broad parts – the first is a series of essays that situate the data that has been collected into a quickly accessible framework. The authors of each essay manage to retain a reasonable level of technical acumen, even when presenting their findings and the techniques of filtering to a presumably non-technical audience. It should be noted that the data collected includes up to 2007 – if you’re reading the text in the hopes that the authors are going to directly address filtering technologies that have recently been in the new, such as Deep Packet Inspection, you’re going to be a disappointed (though they do allude to Deep Packet technologies, without explicitly focusing on it, in a few areas). Throughout the text there are references to human rights and, while I’m personally a proponent of them, I wish that the authors had endeavored to lay out some more of the complexities of human rights discourse – while they don’t present these rights as unproblematic, I felt that more depth would have been rewarding both for their analysis, and for the benefit of the reader. This having been said, I can’t begrudge the authors of the essays for drawing on human rights at various points in their respective pieces – doing so fits perfectly within ONI’s mandate, and their arguments surrounding the use of human rights are sound.

Continue reading

Transparency and *My* Click-Stream

I get strange looks from some of my friends and colleagues sometimes. On the one hand, I strongly advance the idea that people’s privacy should be protected, by default, and at the same time I blog, use social networking sites (though somewhat uncomfortably), own a cell phone, use credit cards, etc. This week I’ve ‘stepped things up’ by syndicating my del.icio.us bookmarks with my blog – you’ll now be treated (or spammed, I guess, depending on how you see things) with the articles that I’ve tagged in the past 24 hours that I think are interesting.

SPAM Ahoy!

I’ll start by stating this: I don’t think that the links you’ll be seeing are Spam. I think that I’m tagging good, solid, helpful links for people that might be interested in surveillance, privacy, and (typically) how either of those topics intersects with technology in some fashion. You’ll note that, for the next little while at least, you’ll see links to articles on Deep Packet Inspection (DPI) and behavioral advertising. I expect some WiMAX stuff as well. There are a couple reasons why I’m syndicating this kind of content:

Continue reading

Common-law = Snooplaw

Rather than talk about the FBI’s desire to patrol the Internet backbone, have your laptop searched without warrant or any particular reason when facing US Customs officers, or Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), I want to quickly talk about the Australian government’s desire to give law enforcement and corporate IT the power to monitor and inspect any and all electronic employee communications. What is most concerning is that it continues an Australian trend to insert American attitudes into common-law.

Terrorism Down Under

I don’t want to come off seeming as though I think terrorism is a small or unimportant issue. It’s not – terrorism is a very real issue, and it has incredible financial and human costs. That said, whenever someone mentions either children or terrorism as a justification for a new piece of legislation that would dramatically extend the surveillance powers of public and private actors, I immediately want to know just how invasive those new powers might be. Whereas Australian law presently only allows security companies and those dealing with the government to survey communications without permission, after a four year fight to revise the Telecommunications Interceptions Act the government may be successful in extending those surveillance powers. If the amendments are passed, all corporate IT groups will be able to survey employees’ digital communciations. The government’s reason for extending the surveillance powers is that, by monitoring workers’ emails, it will be possible to stop/deploy coercion towards those who would;

attack to disable computer networks that sustained the financial system, stock exchange, electricity grid and transport system “[and would consequently] reap far greater economic damage than would be the case of a physical [terrorist] attack”. (Source)

Continue reading

Lollipop Ladies and Ubiquitous Surveillance

Just a quick note, but in Britain lollipop ladies may soon be outfitted with cameras to monitor traffic at dangerous intersections. It’s the children, of course, who are motivating this new deployment of cameras – cameras will presumably cut down on dangerous drivers. Whether attaching cameras to little old ladies will be effective, it has been shown that traffic cameras have been incredibly effective in some areas of the US in reducing dangerous driving. These cameras have been so successful, in fact, that cities are removing their cameras because drivers are committing fewer crimes; the cameras are simply not profitable.

I wonder if Britain will treat cameras attached to old ladies the same way?

Honda GPS Warns Drivers of High Crime Zones

Honda has released a new GPS system for their vehicles where it will warn drivers when they’re about to leave their car in areas where there is a high chance of theft, vandalizm, or other criminal activity. I have two, relatively short, things to note about this:

A Comical Note

I can just imagine programming this thing for Rio – all the device would say was ‘If you’re stupid enough to think that this will help you here, you’re almost certainly a tourist’.

A Less Comical Note

This continues the pervasive surveillance of what you’re doing AND associates it with databases that you can’t be certain are terribly secure. I imagine that if a particularly enterprising individual surreptitiously made a few changes, and the the GPS was followed to the letter, that badness would ensure. Beyond fear-mongering, however, this technology associates perpetual vehicular monitoring with safety, and mistakenly presents the notion that police equally monitor and respond to reports in all areas of GPS coverage. This is a legitimate badness – it further complicates the problems surrounding self-awareness and unquestioned reliance on external data sources, sources that can become significant factors in one’s daily life.

Of course, it won’t be sold that way: Live in safety! Let us watch you! Surveillance stops all crime! Just look at CCTV in Britain.

Gizmodo link

Shield the Sources, Shield the Telecoms

The past couple of days have been interesting, to say the least, when looking at recent shifts and decisions in American legislatures. Specifically, the House is looking to shield bloggers from federal investigations by providing them with the same protections as reporters, and that after the telecommunication companies that ‘theoretically’ (read: actually) cooperated with NSA spying activities have refused to cooperate with Congressional investigations that they have been let off the hook. Let’s get into it.

Federal Journalists and Professional Bloggers Shielded

The US has had a long history of journalistic freedoms, but in the face of recent technological advances they have refused to extend those freedoms to users of new journalistic mediums. Bloggers, in particular, are becoming a more and more important source of information in the US – some dedicate their lives to blogging and use it for professional gain. Until recently they have (typically) been refused the same status as traditional journalists, which has made it risky for bloggers to refuse to disclose their sources if hauled into courts of law.

Continue reading