Categories
Writing

Why I’m quitting Facebook

I left Facebook a long time ago, before many of the current realities of that ecosystem. Rushkoff didn’t leave for the same reasons I did (which stemmed from philosophical conceptions of temporality, time, and privacy) but his reasons echo those I keep hearing from undergrads. It isn’t just that Facebook isn’t ‘cool’; they’re spending less time on the site because the company is increasingly seen as manipulative, secretive, and portrays users in ways antithetical to how the users perceive themselves.

What is perhaps most concerning is what will happen to all the data the company has amassed if/when it implodes like MySpace did. What if, in five or seven years, Facebook effectively closes shop: who will get the mass of data that the company has collected, and how will they subsequently disseminate or manipulate it? It’s this broader concern about long-term use of incredibly intimate data that leaves me most leery of corporate-hosted social media platforms, and it’s an issue that I really don’t think people appreciate. But, then, I guess not a lot of people really remember the dot com crash…

Categories
Links

TarenSK: DOJ admits Aaron’s prosecution was political

tarensk:

Even if Aaron’s intention was in fact to distribute the journal articles (to poor people! for zero profit!), that in no way condones his treatment.

But the terrifying fact I’m trying to highlight in this particular blog post is this: According to the DOJ’s testimony, if you express political views that the government doesn’t like, at any point in your life, that political speech act can and will be used to justify making “an example” out of you once the government thinks it can pin you with a crime.

Talk about a chilling effect on freedom of speech.

Chilling of speech is very, very real. And the things we’re learning in the aftermath of Aaron’s death only amplify concerns.

Categories
Quotations

2013.2.26

I have posted before about the Tibetan attacks, because they offer good insights into this issue in general. But it’s not just the Tibetan activists and other outspoken critics of the Chinese regime that are targeted by this “GhostNet”. I work on Taiwan/China issues in Washington, D.C. Pretty much everyone in that community – be it academics, think tankers, NGO employees, and government officials – are consistently targeted by the kind of “social malware” attacks that are detailed in the two reports. These attacks are very sophisticated, making them really hard to spot, and they show intimate knowledge of what’s going on in the community. Let me give you two recent examples:

On March 26, the Pentagon released their annual report on the Chinese military. On March 27, I received an email ostensibly from one of the people responsible for Taiwan issues at the Pentagon. The email basically said “Hey, here is the expanded version of the report from yesterday, with some additional commentary on Taiwan. I thought you would find it useful”. Attached was a PDF named “China_Military_Power_Report_2009.pdf”, exactly like the official document released by the Pentagon. I work on Taiwan defense issues, so this would be very interesting to me were it real. However, I correspond with this person on a regular basis, and he usually signs his emails to me with his nickname. This email didn’t, which made me suspicious. A Virustotal scan confirmed that the attachment contained malicious software (only detected by 4/38 products, though) and a quick phone call confirmed that the person hadn’t sent an email like that.

In another recent attack, it was the name of the head of my organization that was used to try to trick recipients into opening malicious attachments. He had just returned from a visit to Taiwan, a trip that had been reported on in the Taiwan press. About a week after returning, he received an inquiry from a prominent researcher at a D.C. think tank, asking if he had sent the researcher an email with a trip report from his visit. He had not in fact sent such an email, although it wouldn’t have been unusual for him to do so. I spoke to the IT manager at the think tank, who confirmed that the researcher was indeed tricked into opening the attachment, and that it did contain malware.

And this was just in the last three weeks. I could go on for pages describing various things we have seen over the past two/three years (two more here), but you get the gist. For small NGOs like mine, protecting against infiltration, monitoring our systems for intrusions, and educating our staff to recognize potential hazards has become a huge drain on our already limited resources. The frustrating thing is that there is pretty much nothing we can do about it, except to remain diligent. But at least I’m glad that the issue is continuing to get coverage in the mainstream press.

Gemmy, from a 2009 comment on GhostNet
Categories
Quotations

There’s A Yawning Need for Boring Professors

While such research is done in a number of countries, Canada seems to be a hotbed of boredom studies. James Danckert, an associate professor of psychology at the University of Waterloo, in Canada, recently conducted a study to compare the physiological effects of boredom and sadness.

To induce sadness in the lab, he used video clips from the 1979 tear-jerker, “The Champ,” a widely accepted practice among psychologists.

But finding a clip to induce boredom was a trickier task. Dr. Danckert first tried a YouTube video of a man mowing a lawn, but subjects found it funny, not boring. A clip of parliamentary proceedings was too risky. “There’s always the off chance you get someone who is interested in that,” he says.

Rachel Emma Silverman, “Interesting Fact: There’s a Yawning Need for Boring Professors

I found the third paragraph particularly amusing as someone who often finds watching parliament interesting. I guess I’d be one of the ‘problem’ participants!

Categories
Quotations

2013.2.25

… success will be found once expectations are suitably managed. The grads do make a difference, just a slightly smaller one than they anticipated. Value-adding really is as simple as putting a semi-colon in the right spot in a ministerial brief. Being thanked for inserting that semi-colon provides such joy that it’s almost enough motivation to proofread the next brief. Producing talking points that might theoretically be uttered by a represented official in response to an unlikely question suddenly feels like penning the opening of the Gettysburg Address.

Once broken and socialised, the culture really changes. The formerly idealistic young cohort rapidly joins Canberra’s favourite pastime: fighting for status. Grads are thrown, Hunger Games-style, into a battle for rotations, seeking career-building weapons such as high-profile taskforces or personal access to department heads and senior executives. The universal scoring system in this game is your opportunity for work travel (Paris being 250 points and Queanbeyan being 1).

The Cubicle Brothers, “Confessions of an ex-grad
Categories
Quotations

2013.2.24

How a policy is understood and discussed is its policy image. Policy images play a critical role in the expansion of issues to the previously apathetic. Because all people cannot be equally interested or knowledgeable about all issues facing society, specialists in any area have an advantage over all others. Since they know the issue better, they are sometimes able to portray most of their time communicating with each other, of course, but from time to time they must explain their policies to the larger public or to elites with only a passing interest in the area. This type of communications requires some simplified ways of explaining the issue and justifying public policy approaches to them. As a result, every public policy program is usually understood, even by the politically sophisticated, in simplified and symbolic terms.

Frank R. Baumgartner and Bryan D. Jones, Agendas and Instability in American Politics (Second Edition)
Categories
Videos

Omer Fast’s “5,000 Feet is the Best”

Categories
Aside Humour

Droney

Droney, by Tom Tomorrow

Categories
Quotations

2013.2.21

The 27 regulators, led by France’s CNIL, gave Google three to four months to make changes to its privacy policy — or face “more contentious” action. In a statement on its website today, the CNIL said that four months on from that report Google has failed “to come into compliance” so will now face additional action.

“On 18 February, the European authorities find that Google does not give a precise answer and operational recommendations. Under these circumstances, they are determined to act and pursue their investigations,” the CNIL said in its statement (translated from French with Google Translate).

According to the statement, the European regulators intend to set up a working group, led by CNIL, to “coordinate their enforcement action” against Google — with the working group due to be established before the summer. An action plan for tackling the issue was drawn up at a meeting of the regulators late last month, and will be “submitted for validation” later this month, they added.

Natasha Lomas, “Google’s Consolidated Privacy Policy Draws Fresh Fire In Europe
Categories
Links Writing

Attacks on the Press: A Moving Target – Committee to Protect Journalists:

While not every journalist is an international war correspondent, every journalist’s cellphone is untrustworthy. Mobile phones, and in particular Internet-enabled smartphones, are used by reporters around the world to gather and transmit news. But mobile phones also make journalists easier to locate and intimidate, and confidential sources easier to uncover. Cellular systems can pinpoint individual users within a few meters, and cellphone providers record months, even years, of individual movements and calls. Western cellphone companies like TeliaSonera and France Telecom have been accused by investigative journalists in their home countries of complicity in tracking reporters, while mobile spying tools built for law enforcement in Western countries have, according to computer security researchers working with human rights activists, been exported for use against journalists working under repressive regimes in Ethiopia, Bahrain, and elsewhere.

 

“Reporters need to understand that mobile communications are inherently insecure and expose you to risks that are not easy to detect or overcome,” says Katrin Verclas of the National Democratic Institute. Activists such as Verclas have been working on sites like SaferMobile, which give basic advice for journalists to protect themselves. CPJ recently published a security guide that addresses the use of satellite phones and digital mobile technologies. But repressive governments don’t need to keep up with all the tricks of mobile computing; they can merely set aside budget and strip away privacy laws to get all the power they need. Unless regulators, technology companies, and media personnel step up their own defenses of press freedom, the cellphone will become journalists’ most treacherous tool.

Network surveillance is a very real problem that journalists and, by extension, their sources have to account for. The problem is that many of the security tools that are used to protect confidential communications are awkward to use, provide to sources, and use correctly without network censors detecting the communication. Worst is when journalists simply externalize risk, putting sources at risk in the service of ‘getting the story’ in order to ‘spread the word.’ Such externalization is unfortunately common and generates fear and distrust in journalists.