Categories
Links

Researchers Are Chipping and Surveilling NYC’s Rats

Researchers Are Chipping and Surveilling NYC’s Rats:

Parson’s and his team use traps baited with pheromones—not food—to capture the rats. They know where to place the traps because rats frequently navigate the dark tunnels where they live not with their eyes, but with their fur. Rubbing themselves against walls creates a trail that’s visible with an ultraviolet dark light. According to the study the trail glows blue–white if it’s fresh, yellow–white if old. The trap has a sensor attached to it that alerts the researcher by cell phone when a rat has been caught.

Once a rat has been caught, a mobile lab is deployed. Inside researchers wearing thick gloves render the rat unconscious by dipping the rat trap in a plastic induction container filled with isoflurane, a kind of ether. An unconscious rat is an easy rat to draw specimens from. Before it wakes up, the rat blood is drawn and an RFID chip is implanted.

An interesting bit of news in addition to previous writing on rats.

Categories
Links Writing

Rape Culture Is Surveillance Culture

Scaachi Koul has written a piece that draws on her own experiences of men attempting to prey on her because she is a woman and while she engages in socially normal behaviour. Men who sought to prey on her were explicit in attempting to determine how they could take advantage, drug, or otherwise use her body without attempting to secure her genuine consent.

Koul’s writing makes clear the very normal, human, experiences of being targeted by men and how the intent of those attackers and potential attacker is normalized in contemporary society. The result is that Koul — and other women just like her — must treat social scenarios as a possible environments for attack or abuse. Her lived reality thus turns even seemingly benign situations into ones filled with risk. Koul’s ability to write as clearly and powerfully as she does should make clear to anyone who absolves sexual abuse on grounds of drinking that alcohol is not the problem: men who have internalized their own privilege and power and treat women as objects around them to be used are the problem.

Categories
Aside Links

How a file-sharing lawsuit against Rogers threatens your Internet privacy: Geist | Toronto Star

In the next stage of the copyright wars in Canada, Voltage is moving forward with its efforts to use a reverse class-action lawsuit to reveal the identities of thousands of people the company alleges have infringed on Voltage’s copyright. If the company is successful it will open up a new way for companies to access information about subscribers while simultaneously indicating the relative weakness of the privacy protections baked into Canada’s recent copyright legislation.

Categories
Links

Cybercrime Overtakes Traditional Crime in UK

Cybercrime Overtakes Traditional Crime in UK:

The NCA’s Cyber Crime Assessment 2016, released July 7, 2016, highlights the need for stronger law enforcement and business partnership to fight cybercrime. According to the NCA, cybercrime emerged as the largest proportion of total crime in the U.K., with “cyber enabled fraud” making up 36 percent of all crime reported, and “computer misuse” accounting for 17 percent.

“The ONS estimated that there were 2.46 million cyber incidents and 2.11 million victims of cyber crime in the U.K. in 2015,” the report’s authors wrote. “These figures highlight the clear shortfall in established reporting, with only 16,349 cyber dependent and approximately 700,000 cyber-enabled incidents reported to Action Fraud over the same period.”

While there is a persistent issue associated with counting ‘cyber’ events, that UK organizations are highlighting this kind of fraud and espionage so prominently does indicate a real problem is being faced by organizations.

Categories
Links

Russia passes ‘Big Brother’ anti-terror laws

Russia has passed legislation which functionally adopts many of the worst — and largely discredited — surveillance provisions that Europe adopted in the past and is now abandoning. Specifically, Russian telecoms will be required to retain data traffic information for 6 months, as well as assist government agencies decrypt information. The law will also (further) penalize those who support terrorist activities or engage in other types of social disturbances: the problem is that such accusations are increasingly used to target those disliked by the government as opposed to those whom are actually supporting terrorism or the destruction of Russian society.

It will be particularly interesting to see what, if any, effect the EU has on Russia’s new law. Will the law, which flagrantly violates human rights, inhibit Russia’s ability to trade with EU member nations or will the infringement be ignored? Or will the EU be so consumed by the Brexit that it cannot — or will not — turn its attention to one of its largest trading partners?

Categories
Aside Links

Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us

Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us:

In March, Brazilian police briefly jailed a Facebook exec after WhatsApp failed to comply with a surveillance order in a drug investigation. The same month, The New York Times revealed that WhatsApp had received a wiretap order from the US Justice Department. The company couldn’t have complied in either case, even if it wanted to. Marlin­spike’s crypto is designed to scramble communications in such a way that no one but the people on either end of the conversation can decrypt them (see sidebar). “Moxie has brought us a world-class, state-of-the-art, end-to-end encryption system,” WhatsApp cofounder Brian Acton says. “I want to emphasize: world-class.”

For Marlinspike, a failed wiretap can mean a small victory. A few days after Snowden’s first leaks, Marlin­spike posted an essay to his blog titled “We Should All Have Something to Hide,” emphasizing that privacy allows people to experi­ment with lawbreaking as a precursor for social progress. “Imagine if there were an alternate dystopian reality where law enforcement was 100 percent effective, such that any potential offenders knew they would be immediately identified, apprehended, and jailed,” he wrote. “How could people have decided that marijuana should be legal, if nobody had ever used it? How could states decide that same-sex marriage should be permitted?”

We live in a world where mass surveillance is a point of fact, not a fear linked with dystopic science fiction novels. Moxie’s work doesn’t blind the watchers but it has let massive portions of the world shield the content of their communications – if not the fact they are communicating in the first place – from third-parties seeking to access those communications. Now unauthorized parties such a government agencies are increasingly being forced to target specific devices, instead of the communications networks writ large, which may have the effects of shifting state surveillance from that which is mass to that which is targeted. Such a consequence would be a major victory for all persons, regardless of whether they live in a democratic state or not.

Categories
Links

Policy – Privacy Paranoia: Is Your Smartphone Spying On You?

Policy – Privacy Paranoia: Is Your Smartphone Spying On You?:

Privacy alarmism is one act in a bigger spectacle. In alarmists’ minds, something could go terribly wrong, and although it never has nor is it likely to happen, we should change the world and imposed new political and bureaucratic order to prepare for it. Privacy concerns in general are fertile breeders of this pattern, and have already inflicted on us useless and expensive laws like HIPPA and FERPA. Now, privacy alarmism has set its sights on the biggest prize: the shrinking of Big Data.

While I’m glad that the author has apparently never suffered an issue linked to a privacy infringement, the same cannot be said for an enormous percentage of the world’s population. Mass intrusion, with and without consent, into communications privacy is a prominent issue internationally because of how private and public bodies alike exploit information that is collected.

We are functionally experimenting on the entire population when collecting and applying math to enormous datasets: to say that there has been no harm, ever, to date is possible. But doing so functionally depends on ignoring the lived reality of many of the persons impacted by big data and digital technology.

Categories
Links

Women in politics: Why Ottawa isn’t quite as equal as we think it is

Women in politics: Why Ottawa isn’t quite as equal as we think it is:

Theoretically, more women on ballots means more women in office, as research shows voters have no bias against them as candidates. But Thomas’s own research shows that parties are not setting up female candidates for a fair fight. In 2011, she found that all three national parties (the Green party did not run a full slate) placed more women than men in “unwinnable” ridings. Women were more likely to run in another party’s stronghold (59 per cent vs. 47 per cent for men), less likely to run in competitive battlegrounds (24 per cent vs. 28 per cent) and less likely to run in their own party’s strongholds (17 per cent vs. 25 per cent) than men.

A good long-form piece on gender equality in politics. It digs a lot deeper than most of the often-feelgood pieces that are written about the federal government’s gender policies, providing both historical information on gender equality, analysis of contemporary practices, and how other jurisdictions work far more diligently to foster equality in public offices.

Categories
Links

Hackers Hijack a Big Rig Truck’s Accelerator and Brakes

Hackers Hijack a Big Rig Truck’s Accelerator and Brakes:

When WIRED reached out to trucking industry body the National Motor Freight Traffic Association about the Michigan research, the NMFTA’s chief technology officer Urban Jonson said the group is taking the researchers’ work seriously, and even funding future research from the same team. And Jonson acknowledged that the possibility of the nightmare scenario they present, of a remote attack on heavy vehicles, is real. “A lot of these systems were designed to be isolated,” says Jonson. “As automobile manufacturers are increasingly connecting vehicles with telematics systems, some of these issues need to be addressed.”

That the Association’s reaction is to work with researchers instead of trying to sue them is a very good sign.

Categories
Links

How foreign governments spy using PowerPoint and Twitter

How foreign governments spy using PowerPoint and Twitter:

Right now, there are probably many journalists, human rights organizations and democracy activists walking around oblivious to the invisible tracking that is going on behind their backs. It’s time to wake up to the silent epidemic of targeted digital attacks on civil society and do something about it.

The protections built into our technologies are flimsy and routinely subverted. The merits of a ‘first to market’ ethos that predominates technical innovation must be contrasted, and weighed, against the mortal risk these same technologies pose to some users.