Showing posts with label electronic surveillance. Show all posts
Showing posts with label electronic surveillance. Show all posts

Tuesday, August 19, 2014

Web pioneer: Can the 'Net's 'original sin' be undone?

As the Internet as we know it turns 20, one of the Internet's pioneers (and inventor of hated pop-up ads) hopes it's not too late to build a different kind of Web, one not built on ad revenue:

I have come to believe that advertising is the original sin of the web. The fallen state of our Internet is a direct, if unintentional, consequence of choosing advertising as the default model to support online content and services. Through successive rounds of innovation and investor storytime, we’ve trained Internet users to expect that everything they say and do online will be aggregated into profiles (which they cannot review, challenge, or change) that shape both what ads and what content they see. 

Building the Web on ads leads directly to the thing we like the least about it: lack of data privacy:

Once we’ve assumed that advertising is the default model to support the Internet, the next step is obvious: We need more data so we can make our targeted ads appear to be more effective. CegÅ‚owski explains, “We’re addicted to ‘big data’ not because it’s effective now, but because we need it to tell better stories.” So we build businesses that promise investors that advertising will be more invasive, ubiquitous, and targeted and that we will collect more data about our users and their behavior.

Even so, Zuckerman admits that our ad-supported Web has made it "flat" and accessible:

The great benefit of an ad supported web is that it’s a web open to everyone. It supports free riders well, which has been key in opening the web to young people and those in the developing world. Ad support makes it very easy for users to “try before they buy,” eliminating the hard parts of the sales cycle, and allowing services like Twitter, Facebook, and Weibo to scale to hundreds of millions of users at an unprecedented rate.

Zuckerman argues that there are four main downsides to an ad-supported Web:

  • First, [...] it’s hard to imagine online advertising without surveillance. 
  • Second, [...] it creates incentives to produce and share content that generates pageviews and mouse clicks, but little thoughtful engagement.
  • Third, the advertising model tends to centralize the web. [...] Companies like Facebook want get as much of that money as possible, which means chasing users and reach. Using cash from investors and ad sales, they can acquire smaller companies that are starting to build rival networks. 
  • Finally, [...] personalization [of the Web] means that two readers of The New York Times may seen a very different picture of the world, and that two users of Facebook certainly do, shaped both by our choice of friends and by Facebook’s algorithms. [T]hese personalized sites may lead us into echo chambers, filter bubbles, or other forms of ideological isolation that divide us into rival camps that cannot agree on anything, including a set of common facts on which we could build a debate.
So on what business model would a different Internet run? Perhaps pay-forward schemes such Pinboard.in, and two-tiered, pay-for-Premium services, says Zuckerman. Meanwhile, online payment systems must be revamped to lower transaction costs, perhaps by switching to digital currencies. 

It doesn't sound too likely -- and Zuckerman sounds more apologetic about his role in creating this mess than hopeful it can be changed -- yet it's important to stop and realize that our young Internet didn't really have to turn out this way.


By Ethan Zuckerman
August 14, 2014 | The Atlantic

Tuesday, December 31, 2013

Attack on California's grid shows lack of 'homeland security'

I've been saying for years that terrorism in the U.S. is too easy, hence all these screenings at airports, cyber security, NSA spying and fighting the terrorists "over there" are big distractions.

You don't buy a fancy home security system and then leave your front door unlocked and the windows open.    

Partly, the lack of focus on physical security of our key infrastructure such as electrical grid, ports and bridges is that the problem is very big and yet not at all sexy; and partly because simply physical security like sheet metal screens doesn't lend itself to outsourcing to the big military-industrial contractors that charge $ billions for expensive technological solutions.  


BY Shane Harris
December 27, 2013 | Foreign Policy 

Saturday, June 15, 2013

Greenwald: Dems are hypocrites on NSA spying

Glenn Greenwald, the journalist who broke the Snowden-NSA story, is right: many Democrats and liberals are being hypocritical in defending Obama's vast program of spying on innocent Americans without probable cause, totally trashing the 4th Amendment and any semblance of privacy we had left.

For stark evidence of how a majority of Democrats have flip-flopped on whether they like the NSA spying on them, Greenwald offers us two Pew polls, one during Dubya's reign and one this month:



P.S. -- Respect to Yahoo, who, according to the New York Times, went to court to fight the PRISM program directive to turn over its users' info to the NSA.  Yahoo lost.


By Glenn Greenwald
June 14, 2013 | Guardian

Monday, June 3, 2013

Assange: 'Don't be evil' is banal cover for Google's sucking up to Power

You might recall that I was also critical and skeptical of Google CEO Eric Schmidt's vision for a brave, new world of digital technology all up in our junk. Unlike myself, Julian Assange bothered to read Schmidt's entire book.  Assange argues that Google has actively volunteered to become an important part of the U.S. Government's power apparatus.

I have to say I like this Assange guy, despite his somewhat sneering, sissy looks and such conflicting accounts about him.  He certainly has a singular and iconoclastic view on the world that is lacking.  Nowadays those who distrust government become conspiracy nuts.  And they get lumped in with real thinkers and critics like Assange.  But there is a difference between Government and Power.  Power certainly has a home in government but it also has residences in business, academia, the media and NGOs.  It's too easy to blame Big Government for the overreaching influence of Power.  

Also, anti-government conspiracy nuts don't bother to do their homework and make the real connections that are there to be seen in the public domain because these relationships are so well-respected and indeed banal (to borrow a word from Assange). That is what WikiLeaks did, essentially: it confirmed what we had already suspected, what we already knew but chose to ignore. Instead nuts invent unreal connections and draw false conclusions from them.  

What is known and real is bad enough, there are no fake conspiracies required!  

I also questioned Google's practice of cooperating so easily with the FBI's so-called National Security Letters that request, without a warrant, the electronic information of Google's users.  Google wasn't allowed to say how many NSLs there have been, but they said they've tripled in the past four years.  Why?  And since when do we let the government use private business to spy on us, legally?  Thank the Electronic Communications Privacy Act and the Patriot Act; but thank our apathy and ignorance most of all.  

Finally, a word about terrorism. Unlike most problems, I think the solution here is to ignore it.  Just pretend it doesn't exist. OK, I'm exaggerating a bit: our law enforcement bodies should try catch and foil terrorists; but it's not something our politicians or citizens should give much thought to, much less debate.  It's such a statistically insignificant problem, it merits as much attention in our public discourse and private worries as, say, West Nile virus, which, incidentally, killed 286 Americans in 2012, as opposed to Islamist terrorism which killed... zero.  That's right, none on American soil.  And yet the fight against Islamist terror costs $ trillions a year and terrible intrusions into our privacy!  Consider the absurdity of it!


By Julian Assange
June 1, 2013 | New York Times

“The New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book.

In the book the authors happily take up the white geek’s burden. A liberal sprinkling of convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen, graphic designers in Botswana, anticorruption activists in San Salvador and illiterate Masai cattle herders in the Serengeti are all obediently summoned to demonstrate the progressive properties of Google phones jacked into the informational supply chain of the Western empire.

The authors offer an expertly banalized version of tomorrow’s world: the gadgetry of decades hence is predicted to be much like what we have right now — only cooler. “Progress” is driven by the inexorable spread of American consumer technology over the surface of the earth.  Already, every day, another million or so Google-run mobile devices are activated. Google will interpose itself, and hence the United States government, between the communications of every human being not in China (naughty China). Commodities just become more marvelous; young, urban professionals sleep, work and shop with greater ease and comfort; democracy is insidiously subverted by technologies of surveillance, and control is enthusiastically rebranded as “participation”; and our present world order of systematized domination, intimidation and oppression continues, unmentioned, unafflicted or only faintly perturbed.

The authors are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth witheringly, claiming that “the mix of activism and arrogance in young people is universal.” Digitally inspired mobs mean revolutions will be “easier to start” but “harder to finish.” Because of the absence of strong leaders, the result, or so Mr. Kissinger tells the authors, will be coalition governments that descend into autocracies. They say there will be “no more springs” (but China is on the ropes).

The authors fantasize about the future of “well resourced” revolutionary groups. A new “crop of consultants” will “use data to build and fine-tune a political figure.”

“His” speeches (the future isn’t all that different) and writing will be fed “through complex feature-extraction and trend-analysis software suites” while “mapping his brain function,” and other “sophisticated diagnostics” will be used to “assess the weak parts of his political repertoire.”

The book mirrors State Department institutional taboos and obsessions. It avoids meaningful criticism of Israel and Saudi Arabia. It pretends, quite extraordinarily, that the Latin American sovereignty movement, which has liberated so many from United States-backed plutocracies and dictatorships over the last 30 years, never happened. Referring instead to the region’s “aging leaders,” the book can’t see Latin America for Cuba. And, of course, the book frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.

Google, which started out as an expression of independent Californian graduate student culture — a decent, humane and playful culture — has, as it encountered the big, bad world, thrown its lot in with traditional Washington power elements, from the State Department to the National Security Agency.

Despite accounting for an infinitesimal fraction of violent deaths globally, terrorism is a favorite brand in United States policy circles. This is a fetish that must also be catered to, and so “The Future of Terrorism” gets a whole chapter. The future of terrorism, we learn, is cyberterrorism. A session of indulgent scaremongering follows, including a breathless disaster-movie scenario, wherein cyberterrorists take control of American air-traffic control systems and send planes crashing into buildings, shutting down power grids and launching nuclear weapons. The authors then tar activists who engage in digital sit-ins with the same brush.

I have a very different perspective. The advance of information technology epitomized by Google heralds the death of privacy for most people and shifts the world toward authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid governments in “repressive autocracies” in “targeting their citizens,” they also say governments in “open” democracies will see it as “a gift” enabling them to “better respond to citizen and customer concerns.” In reality, the erosion of individual privacy in the West and the attendant centralization of power make abuses inevitable, moving the “good” societies closer to the “bad” ones.

The section on “repressive autocracies” describes, disapprovingly, various repressive surveillance measures: legislation to insert back doors into software to enable spying on citizens, monitoring of social networks and the collection of intelligence on entire populations. All of these are already in widespread use in the United States. In fact, some of those measures — like the push to require every social-network profile to be linked to a real name — were spearheaded by Google itself.

The writing is on the wall, but the authors cannot see it. They borrow from William Dobson the idea that the media, in an autocracy, “allows for an opposition press as long as regime opponents understand where the unspoken limits are.” But these trends are beginning to emerge in the United States. No one doubts the chilling effects of the investigations into The Associated Press and Fox’s James Rosen. But there has been little analysis of Google’s role in complying with the Rosen subpoena. I have personal experience of these trends.

The Department of Justice admitted in March that it was in its third year of a continuing criminal investigation of WikiLeaks. Court testimony states that its targets include “the founders, owners, or managers of WikiLeaks.” One alleged source, Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution witnesses expected to testify in secret.

This book is a balefully seminal work in which neither author has the language to see, much less to express, the titanic centralizing evil they are constructing. “What Lockheed Martin was to the 20th century,” they tell us, “technology and cybersecurity companies will be to the 21st.” Without even understanding how, they have updated and seamlessly implemented George Orwell’s prophecy. If you want a vision of the future, imagine Washington-backed Google Glasses strapped onto vacant human faces — forever. Zealots of the cult of consumer technology will find little to inspire them here, not that they ever seem to need it. But this is essential reading for anyone caught up in the struggle for the future, in view of one simple imperative: Know your enemy.

Monday, September 17, 2012

Vet/Republican/NSA whistleblower speaks out

This is the kind of stuff that should be driving conservatives and militia types nuts, not Obama's non-existent restrictions on gun owners.

But so far, according to the mainstream, anything done in the name of fighting Islamic terrorism is permissible.  

[The NSA's 'Stellar Wind' program, based in Utah] is being designed to store huge amounts of accessible web information – such as social media updates – but also information in the "deep web" behind passwords and other firewalls that keep it away from the public.

As an example of Stellar Wind's power, Binney believes it is hoovering up virtually every email sent by every American and perhaps a good deal of the people of the rest of the world, too.


Former National Security Agency official Bill Binney says US is illegally collecting huge amounts of data on his fellow citizens
By Paul Harris
September 15, 2012 | Guardian

Saturday, February 25, 2012

Fun with words: DOHS

Have you ever felt "sick" to "watch" so much "pork" in Washington?

Do you feel like "Mexico" is the proper "target" of "immigration" legislation?

Do you ever worry that an "attack" may take the form of an "epidemic" promulgated by "Al Qaeda" as an "exercise" or "drill" to encourage a "wave" of panic that would cause an extreme "initiative" by the USG to seek "relief"?

What if there was an "organization" such as "Hamas," "Hezbollah," or the "Palestinian Liberation Organization" behind it?

(This preceding has been a trivial word game to distract the Department of Homeland Security from whatever it is it's supposed to do. And since I sent this to you, maybe you're now under electronic observation, too!)


By Andrea Stone
February 24, 2012 | Huffington Post