A very helpful resource for deciphering ‘government-speak’ surrounding national security surveillance practices.
Tag: Politics
Caspar Bowden has been aggressively lobbying the EU Parliament over the implications of the FISA Amendments Act for some time. In short, the Act authorizes capturing data from ‘Electronic Communications Service Providers’ when the data possesses foreign intelligence value. The result is that business and personal information, in addition to information directly concerning ‘national security’, can be legitimately collected by the Agency. (For more, see pages 33-35 of this report.)
Caspar’s most recent article outlines the unwillingness of key members of the EU Parliament to take seriously the implications of American surveillance … until it ceases to be an issue for policy wonks, and one of politics. Still, the Parliament has yet to retract recent amendments that would detrimentally affect the privacy rights of European citizens: it will be interesting to see whether the politics of the issue reverse the parliamentarians’ decisions or if lobbying by corporate interests win the day.
2013.6.7
Privacy advocates have long warned that allowing the government to collect and store unlimited “metadata” is a highly invasive form of surveillance of citizens’ communications activities. Those records enable the government to know the identity of every person with whom an individual communicates electronically, how long they spoke, and their location at the time of the communication. Such metadata is what the US government has long attempted to obtain in order to discover an individual’s network of associations and communication patterns. The request for the bulk collection of all Verizon domestic telephone records indicates that the agency is continuing some version of the data-mining program begun by the Bush administration in the immediate aftermath of the 9/11 attack.
Glenn Greenwald (via azspot)
Anyone trying to convince people “it’s only metadata” should be discounted as a fool or a government shill. Or perhaps as being both.
Wow. The Tories better hope that this is really the extent to the rebellion (i.e. backbenchers’ awareness of how their power has been given away to the whip) and not the beginning of real caucuses that are willing to oppose the government.
In an economy of scarcity, a rare commodity like office space will be fought over tenaciously.
I have to admit that I’ve never had an issue finding office spaces on campus; at a previous university I had three separate offices, and presently enjoy two separate (and well furnished!) offices. I tend to work out of those spaces 6-7 days a week, 6-12 hours a day. In other words: I use the spaces that are provided to me.
That said, I’ve watched just how nasty office-space wars can become. Such conflicts aren’t something that I’d wish on my worst enemy, and the most aggravating aspect of most space conflicts is the sheer amount of unused office space. There’s nothing like seeing a war occur between a small group of people in a department for a coveted office space while 95% of the offices are unoccupied because graduate students and faculty alike refuse to come and work on campus.
The Senates internal economy committee sanitized the original audit of Sen. Mike Duffys expenses to remove damning findings, documents obtained by CTV News show.
I really don’t remember the last time I enjoyed eating popcorn so much whilst watching Canadian politics.
Last year Rob Shaw wrote a piece for the Times Colonist about online voting in British Columbia. (This is a Bad Idea by the way, for reasons that are expounded elsewhere.) At the very end of his article, we read:
B.C.’s flirtation with online voting coincides with changes to its information and privacy laws last year that paved the way for high-tech identity cards.
The government has said people will one day be able to use the cards to verify their identity and access Internet-based government services, including, potentially, online voting.
No government document released under FOIA laws that I’ve read has stated voting as a driver of the card. However, this isn’t an indictment of Shaw’s reporting but of the government’s unwillingness to fully disclose documents pertaining to the Services Card.
To be clear: there is no good reason to believe that the Services Card will be particularly helpful in combating the core problems related to online voting. It won’t actually verify that the same person associated with the Card is casting the ballot. It won’t ensure that the person is voting in a non-coerced manner. It won’t guarantee that malware hasn’t affected the computer to ‘vote’ for whomever the malware writer wants voted for.
The Services Card is (seemingly) a solution looking for a problem. Voting is not one problem to which the Card is the solution.
Tim Wu on my book:
Too much assault and battery creates a more serious problem: wrongful appropriation, as Morozov tends to borrow heavily, without attribution, from those he attacks. His critique of Google and other firms engaged in “algorithmic gatekeeping”is basically taken from Lessig’s first book, “Code and Other Laws of Cyberspace,” in which Lessig argued that technology is necessarily ideological and that choices embodied in code, unlike law, are dangerously insulated from political debate. Morozov presents these ideas as his own and, instead of crediting Lessig, bludgeons him repeatedly. Similarly, Morozov warns readers of the dangers of excessively perfect technologies as if Jonathan Zittrain hadn’t been saying the same thing for the past 10 years. His failure to credit his targets gives the misimpression that Morozov figured it all out himself and that everyone else is an idiot.
What my book actually says:
Alas, Internet-centrism prevents us from grasping many of these issues as clearly as we must. To their credit, Larry Lessig and Jonathan Zittrain have written extensively about digital preemption (and Lessig even touched on the future of civil disobedience). However, both of them, enthralled with the epochalist proclamations of Internet-centrism, seem to operate under the false assumption that digital preemption is mostly a new phenomenon that owes its existence to “the Internet,” e-books, and MP3 files. Code is law—but so are turnstiles. Lessig does note that buildings and architecture can and do regulate, but he makes little effort to explain whether the possible shift to code-based regulation is the product of unique contemporary circumstances or merely the continuation of various long-term trends in criminological thinking.
As Daniel Rosenthal notes in discussing the work of both Lessig and Zittrain, “Academics have sometimes portrayed digital preemption as an unfamiliar and novel prospect… In truth, digital preemption is less of a revolution than an extension of existing regulatory techniques.” In Zittrain’s case, his fascination with “the Internet” and its values of “openness” and “generativity,” as well as his belief that “the Internet” has important lessons to teach us, generates the kind of totalizing discourse that refuses to see that some attempts to work in the technological register might indeed be legitimate and do not necessarily lead to moral depravity.
One of the theoretical frames that I use in my dissertations is path dependency. Specifically, I consider whether early decisions with regards to Internet standards (small, early, decisions) actually lead to systems that are challenging to significantly change after systems relying on those protocols are widely adopted (i.e. big, late, decisions aren’t that influential). Once systems enjoy a network effect and see high levels of sunk capital, do they tend to be maintained even if something new comes along that is theoretically ‘superior’?
I mention this background in path dependency because a lot of the really interesting work in this field was written well before Lessig’s and Zittrain’s popular books (yes: there’s still excellent stuff being written today, but core literature predates Lessig or Zittrain). There’s also a extensive literature in public policy, with one of the more popular works being Tools of Government (1983). Hood, in Tools, that outlines how detectors and effectors work for institutions. Hood’s work, in part, attends to how built infrastructure is used to facilitate governance; by transforming the world itself into a regulatory field (e.g. turnstiles, bridges and roads that possess particular driving characteristics, and so forth) the world becomes embedded with an aesthetic of regulation. This aesthetic can significantly ‘nudge’ the actions we choose to take. This thematic of ‘regulation by architecture’ is core to Lessig’s and Zittrain’s arguments, though there are no references to the ‘core books or sources’ that really launched some of this work in the academy.
This said, while there are predecessors that Lessig and Zittrain probably ought to have spent more time writing about, such complaints are true of practically any book or work that is designed to be read by the public and policy makers and academics. The real ‘magic’ of Zittrain and Lessig (and Morozov!) is that their works speak to a wide audience: their books are not, i would argue, written just for academics. As a result some of the nuance or specificity you’d expect in a $150 book that’s purchased by the other 10 specialists in your field is missing. And that’s ok.
Morozov’s key complaint, as I understand it, is that really important problems arise from how these authors’ books are perceived as what they are not. In other words, many people will not understand that many of the more populist books on ‘the Internet’ are being written by people with specific political intentions, who want their books to affect very particular public policy issues and that, as a consequence, these books and other writings have to be read as political works instead of ’dispassionate academic works’.* Their writings act as a kind of trojan horse through which particular ways of thinking of the world become ‘naturalized’, and the authors are ‘first’ to write on topics largely because of their skill in writing about the present while avoiding elongated literature reviews on the past.
I can appreciate Morozov’s concerns around language framing issues, and around the (sometimes) sloppy thinking of these authors. And I can appreciate Morozov’s critics who see him as being blunt and often similarly failing to ‘show all of his work’. For the public, however, I hope that they don’t necessarily see the very public conflicts between Morozov and his colleagues as necessarily an academic dispute in public so much as an unmasking and contestation of divergent political conceptions of the Internet and of literature more generally.
——-
* I write this on the basis of having attended conferences with American legal scholars working in this area. Papers and reports are often written with specific members of federal sub-committees, Congressional and Senate assistants, or federal/state justices in mind. In effect, these authors are writing for people in power to change specific laws and policies. As such you should always hunt for what is ‘really going on’ when reading most popular American legal scholarship.
More Visibility, Less Privacy
While admitting that increased surveillance was “scary” and that governments will have to be thoughtful with their laws, [Bloomberg] seemed to side with prioritizing radical transparency, especially through the use of automated drones, “but what’s the difference whether the drone is up in the air or on the building? I mean intellectually I have trouble making a distinction.”
…
Lest Bloomberg be labeled as a surveillience hawk, the interview took on a tone of inevitability, rather than advocacy: “Everybody wants their privacy, but I don’t know how you’re going to maintain it.”
Gregory Ferenstein, “Bloomberg: ‘We’re Going To Have More Visibility And Less Privacy,’ Drones And Surveillance Coming”
Correct me if I’m wrong, but his sentence “Everybody wants their privacy, but I don’t know how you’re going to maintain it” indicates a failure to understand his role as a politician. If everybody – including, one presumes, residents of New York city – “wants their privacy” then it is his job, and that of council, to protect and preserve those constituents’ privacy.
To be clear: it is not his job to authorize enhanced surveillance, and then throw his hands up and say that he doesn’t get how his constituents are going to realize their wishes as he and council march against those interests.
2013.3.21
An oil spill recovery vessel ran aground en route to a federal announcement on oil tanker safety in Vancouver on Monday, officials have confirmed.
The vessel was making a 12-hour trip from its base in Esquimalt to Vancouver for a tanker safety announcement by Federal Transport Minister Denis Lebel and Natural Resources Minister Joe Oliver when it struck an uncharted sandbar near Sandheads at the mouth of the Fraser River near Steveston.