Skip to main content

Home/ Dystopias/ Group items tagged security

Rss Feed Group items tagged

Ed Webb

BlackBerry's Security Approach Leads to Theories of Secret Deals - NYTimes.com - 0 views

  • R.I.M. officials flatly denied last week that the company had cut deals with certain countries to grant authorities special access to the BlackBerry system. They also said R.I.M. would not compromise the security of its system. At the same time, R.I.M. says it complies with regulatory requirements around the world.
  • law-enforcement agencies in the United States had an advantage over their counterparts overseas because many of the most popular e-mail services — Gmail, Hotmail and Yahoo — are based here, and so are subject to court orders. That means the government can often see messages in unencrypted forms, even if sent from a BlackBerry
  • “R.I.M. could be technically correct that they are not giving up anything,” said Lee Tien, a senior staff lawyer at the Electronic Frontier Foundation, a San Francisco group that promotes civil liberties online. “But their systems are not necessarily more secure because there are other places for authorities to go to.” When China first allowed BlackBerry service in the last few years, sales were restricted to hand-held devices linked to enterprise servers within the country. Many security experts say Chinese security agencies have direct access to all data stored on those servers, which are often owned by government-controlled corporations.
  • ...1 more annotation...
  • a recently changed Indian law that gives the government the power to intercept any “computer communication” without court order to carry out criminal investigations
Ed Webb

Border Patrol, Israel's Elbit Put Reservation Under Surveillance - 0 views

  • The vehicle is parked where U.S. Customs and Border Protection will soon construct a 160-foot surveillance tower capable of continuously monitoring every person and vehicle within a radius of up to 7.5 miles. The tower will be outfitted with high-definition cameras with night vision, thermal sensors, and ground-sweeping radar, all of which will feed real-time data to Border Patrol agents at a central operating station in Ajo, Arizona. The system will store an archive with the ability to rewind and track individuals’ movements across time — an ability known as “wide-area persistent surveillance.” CBP plans 10 of these towers across the Tohono O’odham reservation, which spans an area roughly the size of Connecticut. Two will be located near residential areas, including Rivas’s neighborhood, which is home to about 50 people. To build them, CBP has entered a $26 million contract with the U.S. division of Elbit Systems, Israel’s largest military company.
  • U.S. borderlands have become laboratories for new systems of enforcement and control
  • these same systems often end up targeting other marginalized populations as well as political dissidents
  • ...16 more annotations...
  • the spread of persistent surveillance technologies is particularly worrisome because they remove any limit on how much information police can gather on a person’s movements. “The border is the natural place for the government to start using them, since there is much more public support to deploy these sorts of intrusive technologies there,”
  • the company’s ultimate goal is to build a “layer” of electronic surveillance equipment across the entire perimeter of the U.S. “Over time, we’ll expand not only to the northern border, but to the ports and harbors across the country,”
  • In addition to fixed and mobile surveillance towers, other technology that CBP has acquired and deployed includes blimps outfitted with high-powered ground and air radar, sensors buried underground, and facial recognition software at ports of entry. CBP’s drone fleet has been described as the largest of any U.S. agency outside the Department of Defense
  • Nellie Jo David, a Tohono O’odham tribal member who is writing her dissertation on border security issues at the University of Arizona, says many younger people who have been forced by economic circumstances to work in nearby cities are returning home less and less, because they want to avoid the constant surveillance and harassment. “It’s especially taken a toll on our younger generations.”
  • Border militarism has been spreading worldwide owing to neoliberal economic policies, wars, and the onset of the climate crisis, all of which have contributed to the uprooting of increasingly large numbers of people, notes Reece Jones
  • In the U.S., leading companies with border security contracts include long-established contractors such as Lockheed Martin in addition to recent upstarts such as Anduril Industries, founded by tech mogul Palmer Luckey to feed the growing market for artificial intelligence and surveillance sensors — primarily in the borderlands. Elbit Systems has frequently touted a major advantage over these competitors: the fact that its products are “field-proven” on Palestinians
  • Verlon Jose, then-tribal vice chair, said that many nation members calculated that the towers would help dissuade the federal government from building a border wall across their lands. The Tohono O’odham are “only as sovereign as the federal government allows us to be,”
  • Leading Democrats have argued for the development of an ever-more sophisticated border surveillance state as an alternative to Trump’s border wall. “The positive, shall we say, almost technological wall that can be built is what we should be doing,” House Speaker Nancy Pelosi said in January. But for those crossing the border, the development of this surveillance apparatus has already taken a heavy toll. In January, a study published by researchers from the University of Arizona and Earlham College found that border surveillance towers have prompted migrants to cross along more rugged and circuitous pathways, leading to greater numbers of deaths from dehydration, exhaustion, and exposure.
  • “Walls are not only a question of blocking people from moving, but they are also serving as borders or frontiers between where you enter the surveillance state,” she said. “The idea is that at the very moment you step near the border, Elbit will catch you. Something similar happens in Palestine.”
  • CBP is by far the largest law enforcement entity in the U.S., with 61,400 employees and a 2018 budget of $16.3 billion — more than the militaries of Iran, Mexico, Israel, and Pakistan. The Border Patrol has jurisdiction 100 miles inland from U.S. borders, making roughly two-thirds of the U.S. population theoretically subject to its operations, including the entirety of the Tohono O’odham reservation
  • Between 2013 and 2016, for example, roughly 40 percent of Border Patrol seizures at immigration enforcement checkpoints involved 1 ounce or less of marijuana confiscated from U.S. citizens.
  • the agency uses its sprawling surveillance apparatus for purposes other than border enforcement
  • documents obtained via public records requests suggest that CBP drone flights included surveillance of Dakota Access pipeline protests
  • CBP’s repurposing of the surveillance tower and drones to surveil dissidents hints at other possible abuses. “It’s a reminder that technologies that are sold for one purpose, such as protecting the border or stopping terrorists — or whatever the original justification may happen to be — so often get repurposed for other reasons, such as targeting protesters.”
  • The impacts of the U.S. border on Tohono O’odham people date to the mid-19th century. The tribal nation’s traditional land extended 175 miles into Mexico before being severed by the 1853 Gadsden Purchase, a U.S. acquisition of land from the Mexican government. As many as 2,500 of the tribe’s more than 30,000 members still live on the Mexican side. Tohono O’odham people used to travel between the United States and Mexico fairly easily on roads without checkpoints to visit family, perform ceremonies, or obtain health care. But that was before the Border Patrol arrived en masse in the mid-2000s, turning the reservation into something akin to a military occupation zone. Residents say agents have administered beatings, used pepper spray, pulled people out of vehicles, shot two Tohono O’odham men under suspicious circumstances, and entered people’s homes without warrants. “It is apartheid here,” Ofelia Rivas says. “We have to carry our papers everywhere. And everyone here has experienced the Border Patrol’s abuse in some way.”
  • Tohono O’odham people have developed common cause with other communities struggling against colonization and border walls. David is among numerous activists from the U.S. and Mexican borderlands who joined a delegation to the West Bank in 2017, convened by Stop the Wall, to build relationships and learn about the impacts of Elbit’s surveillance systems. “I don’t feel safe with them taking over my community, especially if you look at what’s going on in Palestine — they’re bringing the same thing right over here to this land,” she says. “The U.S. government is going to be able to surveil basically anybody on the nation.”
Ed Webb

From Helmand to Merseyside: Unmanned drones and the militarisation of UK policing | ope... - 0 views

  • the intensifying cross-overs between the use of drones to deploy lethal force in the war zones of Asia and the Middle East, and their introduction within western airspace, need to be stressed. The European Defence Agency, for example, a body funded by the UK and other European governments,  is lobbying hard to support the widespread diffusion of drones within UK and EU policing and security as a  means to bolster the existing strengths of European security corporations like BAE systems, EADS and Thales within  booming global markets for armed and military drones. The global market for drones is by far the most dynamic sector in the global airline industry. The current annual market of $2.7 billion is predicted to reach $8.3 billion by 2020 and $55 billion is likely to be spent on drones in the next decade. A specific concern of the EU is that European defense and security corporations are failing to stake claims within booming global drone markets whilst US and Israeli companies clean up.
  • what scholars of surveillance term ‘function-creep’ is likely to be a key feature of drone deployments
  •  it is startling that the main concern so far in public policy debates about the introduction of military-standard surveillance drones into routine police practice in Western countries has surrounded the (very real) dangers of collision with other aircraft.
  • ...1 more annotation...
  • the widespread introduction of almost silent, pilotless drones with military-standard imaging equipment raises major new questions about the way in which the UK as a ‘surveillance society’. Is the civilian deployment of such drones a justified and proportionate response to civilian policing needs or a thinly-veiled attempt by security corporations to build new and highly profitable markets? Once deployed, what ethical and regulatory guidelines need to be in place to govern drone deployment and the ‘targeting’ of drone sensors? Above all, are transparent regulatory systems in place to prevent law enforcement agencies from abusing radical extensions in their powers to vertically and covertly spy on all aspects of civilian life 24 hours a day?
Ed Webb

Was Stuxnet Built to Attack Iran's Nuclear Program? - PCWorld Business Center - 0 views

  • A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
  • Langner thinks that it's possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.
  • Many security researchers think that it would take the resources of a nation state to accomplish.
  • ...3 more annotations...
  • y messing with Operational Block 35, Stuxnet could easily cause a refinery's centrifuge to malfunction, but it could be used to hit other targets too, Byres said. "The only thing I can say is that it is something designed to go bang," he said.
  • Bushehr is a plausible target, but there could easily be other facilities -- refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group. "It's not obvious that it has to be the nuclear program," he said. "Iran has other control systems that could be targeted."
  • Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.
Ed Webb

The Sci-Fi Roots of the Far Right-From 'Lucifer's Hammer' to Newt's Moon Base to Donald... - 0 views

  • Strong leader Senator Jellison (who is white) then asks former Shire founder Hugo Beck what went wrong, and Beck says his fellow hippies just never realized how great technology and laissez-faire economics were, and now all his old friends are dining on human flesh under the thumb of a scary black communist.
  • Today, Lucifer’s Hammer reads as a depiction of a post-apocalyptic war between Trump counties and Clinton counties, simultaneously promising American renewal even as it depicts unavoidable catastrophe. The comet acts as a cleansing, wiping away so much dead wood of civilization. (Feminism, too, comes in for repeated knocks.)
  • SDI was only one part of a larger right-wing techno-futurist project. SDI historian Edward Linenthal cites a 1983 interview with Newt Gingrich in which the young conservative Congressman predicted that SDI would not just destroy Russia’s Communists but liberalism, too. SDI would be “a dagger at the heart of the liberal welfare state” because it destroys “the liberal myth of scarcity,” leaving only “the limits of a free people’s ingenuity, daring, and courage.”
  • ...8 more annotations...
  • Gingrich subsequently secured a job for Pournelle’s son with Congressman Dana Rohrabacher in 1994, who like Gingrich is now a stalwart space booster and Trump supporter.
  • What Trump does is less important than the fact that he kicks over the table, strengthening America’s military state while demolishing bureaucracy and ignoring niceties. Democracy and law matter less than security and innovation
  • with communism a fading threat by the late 80’s, Gingrich shifted his focus to the specter of a new enemy, arguing in 1989 that “Islamic extremism may well be the greatest threat to Western values and Western security in the world.” Such fear-mongering—Islamic extremism remains a fraction as destructive as the nuclear Soviet Union—may seem ill-suited to optimism in mankind’s future, but as a political project it can be uncannily effective. Pournelle wrote that Islam demands adherence to a principle of “Islam or the sword,” and that an aggressive military response is not only justified but demanded: we are at war with the Caliphate.
  • Gingrich and Pournelle’s enthusiasm had less to do with Trump’s particular ambitions than with his capacity for destruction of the status quo. Much of the chaos Trump foments is, to Gingrich and Pournelle, a key feature to induce the future they want—the one where the feminists and “eco-terrorists” and university professors are soundly defeated
  • In their science fiction as in life, Gingrich and Pournelle shared an optimistic belief in power of technology—and an equally powerful insistence on the inevitability of conflict. They believed this required a robust, authoritarian state apparatus to preserve order and bind citizens together. Indeed, while backing Reagan, Gingrich had promoted a techno-futurism that was less conservative than it was authoritarian: he called for pruning inefficiency while aggressively promoting expansion and military technology. For his part, Pournelle published anthologies of science-fiction and techno-military essays through the 1980s under the name There Will Be War.
  • No science-fiction writer since has exerted as significant a political influence as Pournelle. But Pournelle does have a spiritual successor in Castalia House, the independent science-fiction publisher run by white nationalist Theodore Beale, aka Vox Day. Beale, like Gingrich, has said that his job is to save Western Civilization—and that it is in dire need of saving. Beale, however, is far more explicit about race.
  • Pournelle has dissociated himself from Beale’s politics, but Castalia House’s republishing of Pournelle’s 1980s There Will Be War series (as well as publishing a new volume 10) is no mere coincidence. Rather, they are indications of a shared worldview. To these writers, civil rights, equality, and civil liberties are irritants and impediments to progress at best. At worst, they are impositions on the holy forces of the market and social Darwinism (“evolution in action”) that sort out the best from the rest. And to all of them, the best tend to be white (with a bit of space for “the good ones” of other races). If there has been a shift in thought between the 1970s and today, it’s that the expected separation of wheat from chaff hasn’t taken place, and so now more active measures need to be taken—building the border walls and deportations, for example. Trump is an agent of these active measures—an agent of revolution, or at least the destruction that precedes a revolution.
  • Trump was far from the first to eliminate the line between right-wing thought and outright bigotry.
Ed Webb

To avoid ID, more are mutilating fingerprints - The Boston Globe - 2 views

  • a sevenfold spike in people arrested with mutilated fingertips, a disturbing trend they said reflects dire efforts to evade the harsher punishments that come with multiple arrests, to avoid deportation, or to fool the increasingly sophisticated computers that do most fingerprint checks
  • While authorities have had some recent successes in identifying those with mutilated fingerprints, most have not been identified. Indeed, of the recorded arrests this decade in Massachusetts, only 17 percent were positively identified by matching their scuffed fingerprints with previously recorded prints.
  • detectives suspect they are missing many others who may have been recorded as new fingerprints by the state’s computer system, which receives on average about 700 fingerprint cards a day from some 360 law enforcement agencies around the state
  • ...4 more annotations...
  • Officials at the FBI, Department of Homeland Security, and Immigration and Customs Enforcement said they do not keep national records of the number of suspects found to have deliberately disfigured their fingerprints.
  • Jose Elias Zaiter-Pou, a doctor who flew from the Dominican Republic and allegedly planned to surgically remove the fingerprints of illegal immigrants for a $4,500 fee
  • Surface cuts do not do the job, he said; the marring must go deep under the skin, which grows back with the original patterns if not sufficiently disfigured.
  • “I can’t imagine the pain it must take. You have to get deep down, in the nerve endings. I see these people, to go to this extreme, as a real danger to society.’’
  •  
    Sign in stranger
  •  
    Ahhh that's disgusting. And disturbing. And it's awful that people feel they need to go to this extreme.
Ed Webb

Surveillance does not make us safe | openDemocracy - 1 views

  • Surveillance is about power– rarely safety or security
  • The possession of great powers by the state should prompt a principled determination to ensure that the permissible exercise of such powers is strictly defined, regulated and monitored so as to guarantee that any intrusion into liberty and privacy of the individual is fully justified by an obviously superior community interest.
  •  
    I agree that Surveillance can be used for safety and security reasons. I mean we can't deny that video's of robberies and such haven't come in handy for catching the bad guys. However, I also agree that it has a lot to do with power. It's so easy to take surveillance too far and impede on others' privacys. It's scary... Emily
Ed Webb

Russia Weighs K.G.B. Powers for Security Agency - NYTimes.com - 0 views

  • The note contends that print and electronic media “openly facilitate the formation of negative processes in the spiritual sphere, propagate the cult of individualism, violence and mistrust in the government’s ability to protect its citizens, in effect drawing youth to extremist acts.”
  • On Tuesday, opposition leaders worried that the F.S.B.’s new powers would be used to suppress dissent of all kinds. “In the Soviet times, there really were warnings issued for anti-Soviet activity,” Viktor I. Ilyukhin, a Communist deputy who serves on the Duma committee on constitutional law, told the newspaper Noviye Izvestiya. “But even then, the warnings were delivered only by prosecutors,” Mr. Ilyukhin said. “Now, they spit on all that. Any citizen can be called an extremist for taking a public position, for political activity. A warning can be given to anyone who criticizes the powers that be. If you print this interview, they will announce that Ilyukhin is an extremist.”
  •  
    Minority Report?
Ed Webb

Three lessons from the Times Square bomb. - By Fred Kaplan - Slate Magazine - 0 views

  • Terrorism, in some of its forms, may be a campaign of war—but it manifests itself in criminal acts. And while the military has a role in combating terrorist organizations (see the war in Afghanistan, the drone attacks on al-Qaida leaders in Pakistan, etc.), the acts are often best pre-empted, foiled, and punished by the routine procedures of a well-trained police force and intelligence organizations.
  • a continuously busy sidewalk is a safe sidewalk, because those who have business there—"the natural proprietors of the street"—provide "eyes upon the street."
  • Research project for a sociologist: Have terrorist attacks in Western cities taken place more often, or less often, in areas with lots of street vendors?
  • ...2 more annotations...
  • the use—and popularity—of public security cameras will certainly get a boost.
  • These cameras are probably permanent fixtures in American cities. And city dwellers (as well as tourists) may have come to accept that privacy cannot be presumed when they're out on public streets.
Ed Webb

The Digital Maginot Line - 0 views

  • The Information World War has already been going on for several years. We called the opening skirmishes “media manipulation” and “hoaxes”, assuming that we were dealing with ideological pranksters doing it for the lulz (and that lulz were harmless). In reality, the combatants are professional, state-employed cyberwarriors and seasoned amateur guerrillas pursuing very well-defined objectives with military precision and specialized tools. Each type of combatant brings a different mental model to the conflict, but uses the same set of tools.
  • There are also small but highly-skilled cadres of ideologically-motivated shitposters whose skill at information warfare is matched only by their fundamental incomprehension of the real damage they’re unleashing for lulz. A subset of these are conspiratorial — committed truthers who were previously limited to chatter on obscure message boards until social platform scaffolding and inadvertently-sociopathic algorithms facilitated their evolution into leaderless cults able to spread a gospel with ease.
  • There’s very little incentive not to try everything: this is a revolution that is being A/B tested.
  • ...17 more annotations...
  • The combatants view this as a Hobbesian information war of all against all and a tactical arms race; the other side sees it as a peacetime civil governance problem.
  • Our most technically-competent agencies are prevented from finding and countering influence operations because of the concern that they might inadvertently engage with real U.S. citizens as they target Russia’s digital illegals and ISIS’ recruiters. This capability gap is eminently exploitable; why execute a lengthy, costly, complex attack on the power grid when there is relatively no cost, in terms of dollars as well as consequences, to attack a society’s ability to operate with a shared epistemology? This leaves us in a terrible position, because there are so many more points of failure
  • Cyberwar, most people thought, would be fought over infrastructure — armies of state-sponsored hackers and the occasional international crime syndicate infiltrating networks and exfiltrating secrets, or taking over critical systems. That’s what governments prepared and hired for; it’s what defense and intelligence agencies got good at. It’s what CSOs built their teams to handle. But as social platforms grew, acquiring standing audiences in the hundreds of millions and developing tools for precision targeting and viral amplification, a variety of malign actors simultaneously realized that there was another way. They could go straight for the people, easily and cheaply. And that’s because influence operations can, and do, impact public opinion. Adversaries can target corporate entities and transform the global power structure by manipulating civilians and exploiting human cognitive vulnerabilities at scale. Even actual hacks are increasingly done in service of influence operations: stolen, leaked emails, for example, were profoundly effective at shaping a national narrative in the U.S. election of 2016.
  • The substantial time and money spent on defense against critical-infrastructure hacks is one reason why poorly-resourced adversaries choose to pursue a cheap, easy, low-cost-of-failure psy-ops war instead
  • Information war combatants have certainly pursued regime change: there is reasonable suspicion that they succeeded in a few cases (Brexit) and clear indications of it in others (Duterte). They’ve targeted corporations and industries. And they’ve certainly gone after mores: social media became the main battleground for the culture wars years ago, and we now describe the unbridgeable gap between two polarized Americas using technological terms like filter bubble. But ultimately the information war is about territory — just not the geographic kind. In a warm information war, the human mind is the territory. If you aren’t a combatant, you are the territory. And once a combatant wins over a sufficient number of minds, they have the power to influence culture and society, policy and politics.
  • If an operation is effective, the message will be pushed into the feeds of sympathetic real people who will amplify it themselves. If it goes viral or triggers a trending algorithm, it will be pushed into the feeds of a huge audience. Members of the media will cover it, reaching millions more. If the content is false or a hoax, perhaps there will be a subsequent correction article – it doesn’t matter, no one will pay attention to it.
  • The 2014-2016 influence operation playbook went something like this: a group of digital combatants decided to push a specific narrative, something that fit a long-term narrative but also had a short-term news hook. They created content: sometimes a full blog post, sometimes a video, sometimes quick visual memes. The content was posted to platforms that offer discovery and amplification tools. The trolls then activated collections of bots and sockpuppets to blanket the biggest social networks with the content. Some of the fake accounts were disposable amplifiers, used mostly to create the illusion of popular consensus by boosting like and share counts. Others were highly backstopped personas run by real human beings, who developed standing audiences and long-term relationships with sympathetic influencers and media; those accounts were used for precision messaging with the goal of reaching the press. Israeli company Psy Group marketed precisely these services to the 2016 Trump Presidential campaign; as their sales brochure put it, “Reality is a Matter of Perception”.
  • This shift from targeting infrastructure to targeting the minds of civilians was predictable. Theorists  like Edward Bernays, Hannah Arendt, and Marshall McLuhan saw it coming decades ago. As early as 1970, McLuhan wrote, in Culture is our Business, “World War III is a guerrilla information war with no division between military and civilian participation.”
  • Combatants are now focusing on infiltration rather than automation: leveraging real, ideologically-aligned people to inadvertently spread real, ideologically-aligned content instead. Hostile state intelligence services in particular are now increasingly adept at operating collections of human-operated precision personas, often called sockpuppets, or cyborgs, that will escape punishment under the the bot laws. They will simply work harder to ingratiate themselves with real American influencers, to join real American retweet rings. If combatants need to quickly spin up a digital mass movement, well-placed personas can rile up a sympathetic subreddit or Facebook Group populated by real people, hijacking a community in the way that parasites mobilize zombie armies.
  • Attempts to legislate away 2016 tactics primarily have the effect of triggering civil libertarians, giving them an opportunity to push the narrative that regulators just don’t understand technology, so any regulation is going to be a disaster.
  • The entities best suited to mitigate the threat of any given emerging tactic will always be the platforms themselves, because they can move fast when so inclined or incentivized. The problem is that many of the mitigation strategies advanced by the platforms are the information integrity version of greenwashing; they’re a kind of digital security theater, the TSA of information warfare
  • Algorithmic distribution systems will always be co-opted by the best resourced or most technologically capable combatants. Soon, better AI will rewrite the playbook yet again — perhaps the digital equivalent of  Blitzkrieg in its potential for capturing new territory. AI-generated audio and video deepfakes will erode trust in what we see with our own eyes, leaving us vulnerable both to faked content and to the discrediting of the actual truth by insinuation. Authenticity debates will commandeer media cycles, pushing us into an infinite loop of perpetually investigating basic facts. Chronic skepticism and the cognitive DDoS will increase polarization, leading to a consolidation of trust in distinct sets of right and left-wing authority figures – thought oligarchs speaking to entirely separate groups
  • platforms aren’t incentivized to engage in the profoundly complex arms race against the worst actors when they can simply point to transparency reports showing that they caught a fair number of the mediocre actors
  • What made democracies strong in the past — a strong commitment to free speech and the free exchange of ideas — makes them profoundly vulnerable in the era of democratized propaganda and rampant misinformation. We are (rightfully) concerned about silencing voices or communities. But our commitment to free expression makes us disproportionately vulnerable in the era of chronic, perpetual information war. Digital combatants know that once speech goes up, we are loathe to moderate it; to retain this asymmetric advantage, they push an all-or-nothing absolutist narrative that moderation is censorship, that spammy distribution tactics and algorithmic amplification are somehow part of the right to free speech.
  • We need an understanding of free speech that is hardened against the environment of a continuous warm war on a broken information ecosystem. We need to defend the fundamental value from itself becoming a prop in a malign narrative.
  • Unceasing information war is one of the defining threats of our day. This conflict is already ongoing, but (so far, in the United States) it’s largely bloodless and so we aren’t acknowledging it despite the huge consequences hanging in the balance. It is as real as the Cold War was in the 1960s, and the stakes are staggeringly high: the legitimacy of government, the persistence of societal cohesion, even our ability to respond to the impending climate crisis.
  • Influence operations exploit divisions in our society using vulnerabilities in our information ecosystem. We have to move away from treating this as a problem of giving people better facts, or stopping some Russian bots, and move towards thinking about it as an ongoing battle for the integrity of our information infrastructure – easily as critical as the integrity of our financial markets.
Ed Webb

Narrative Napalm | Noah Kulwin - 0 views

  • there are books whose fusion of factual inaccuracy and moral sophistry is so total that they can only be written by Malcolm Gladwell
  • Malcolm Gladwell’s decades-long shtick has been to launder contrarian thought and corporate banalities through his positions as a staff writer at The New Yorker and author at Little, Brown and Company. These insitutitions’ disciplining effect on Gladwell’s prose, getting his rambling mind to conform to clipped sentences and staccato revelations, has belied his sly maliciousness and explosive vacuity: the two primary qualities of Gladwell’s oeuvre.
  • as is typical with Gladwell’s books and with many historical podcasts, interrogation of the actual historical record and the genuine moral dilemmas it poses—not the low-stakes bait that he trots out as an MBA case study in War—is subordinated to fluffy bullshit and biographical color
  • ...13 more annotations...
  • by taking up military history, Gladwell’s half-witted didacticism threatens to convince millions of people that the only solution to American butchery is to continue shelling out for sharper and larger knives
  • Although the phrase “Bomber Mafia” traditionally refers to the pre-World War II staff and graduates of the Air Corps Tactical School, Gladwell’s book expands the term to include both kooky tinkerers and buttoned-down military men. Wild, far-seeing mavericks, they understood that the possibilities of air power had only just been breached. They were also, as Gladwell insists at various points, typical Gladwellian protagonists: secluded oddballs whose technical zealotry and shared mission gave them a sense of community that propelled them beyond any station they could have achieved on their own.
  • Gladwell’s narrative is transmitted as seamlessly as the Wall Street or Silicon Valley koans that appear atop LinkedIn profiles, Clubhouse accounts, and Substack missives.
  • Gladwell has built a career out of making banality seem fresh
  • Drawing a false distinction between the Bomber Mafia and the British and American military leaders who preceded them allows Gladwell to make the case that a few committed brainiacs developed a humane, “tactical” kind of air power that has built the security of the world we live in today.
  • By now, the press cycle for every Gladwell book release is familiar: experts and critics identify logical flaws and factual errors, they are ignored, Gladwell sells a zillion books, and the world gets indisputably dumber for it.
  • “What actually happened?” Gladwell asks of the Blitz. “Not that much! The panic never came,” he answers, before favorably referring to an unnamed “British government film from 1940,” which is in actuality the Academy Award-nominated propaganda short London Can Take It!, now understood to be emblematic of how the myth of the stoic Brit was manufactured.
  • Gladwell goes to great pains to portray Curtis “Bombs Away” LeMay as merely George Patton-like: a prima donna tactician with some masculinity issues. In reality, LeMay bears a closer resemblance to another iconic George C. Scott performance, one that LeMay directly inspired: Dr. Strangelove’s General Buck Turgidson, who at every turn attempts to force World War III and, at the movie’s close, when global annihilation awaits, soberly warns of a “mineshaft gap” between the United States and the Commies. That, as Gladwell might phrase it, was the “real” Curtis LeMay: a violent reactionary who was never killed or tried because he had the luck to wear the brass of the correct country on his uniform. “I suppose if I had lost the war, I would have been tried as a war criminal,” LeMay once told an Air Force cadet. “Fortunately, we were on the winning side.”
  • Why would Malcolm Gladwell, who seems to admire LeMay so much, talk at such great length about the lethality of LeMay’s Japanese firebombing? The answer lies in what this story leaves out. Mentioned only glancingly in Gladwell’s story are the atomic bombs dropped on Japan. The omission allows for a stupid and classically Gladwell argument: that indiscriminate firebombing brought a swift end to the war, and its attendant philosophical innovations continue to envelop us in a blanket of security that has not been adequately appreciated
  • While LeMay’s 1945 firebombing campaign was certainly excessive—and represented the same base indifference to human life that got Nazis strung up at Nuremberg—it did not end the war. The Japanese were not solely holding out because their military men were fanatical in ways that the Americans weren’t, as Gladwell seems to suggest, citing Conrad Crane, an Army staff historian and hagiographer of LeMay’s[1]; they were holding out because they wanted better terms of surrender—terms they had the prospect of negotiating with the Soviet Union. The United States, having already developed an atomic weapon—and having made the Soviet Union aware of it—decided to drop it as it became clear the Soviet Union was readying to invade Japan. On August 6, the United States dropped a bomb on Hiroshima. Three days later, and mere hours after the Soviet Union formally declared war on the morning of August 9, the Americans dropped the second atomic bomb on Nagasaki. An estimated 210,000 people were killed, the majority of them on the days of the bombings. It was the detonation of these bombs that forced the end of the war. The Japanese unconditional surrender to the Americans was announced on August 15 and formalized on the deck of the USS Missouri on September 2. As historians like Martin Sherwin and Tsuyoshi Hasegawa have pointed out, by dropping the bombs, the Truman administration had kept the Communist threat out of Japan. Imperial Japan was staunchly anticommunist, and under American post-war dominion, the country would remain that way. But Gladwell is unequipped to supply the necessary geopolitical context that could meaningfully explain why the American government would force an unconditional surrender when the possibility of negotiation remained totally live.
  • In 1968, he would join forces with segregationist George Wallace as the vice-presidential candidate on his “American Independent Party” ticket, a fact literally relegated to a footnote in Gladwell’s book. This kind of omission is par for the course in The Bomber Mafia. While Gladwell constantly reminds the reader that the air force leadership was trying to wage more effective wars so as to end all wars, he cannot help but shove under the rug that which is inconvenient
  • This is truly a lesson for the McKinsey set and passive-income crowd for whom The Bomber Mafia is intended: doing bad things is fine, so long as you privately feel bad about it.
  • The British advocacy group Action on Armed Violence just this month estimated that between 2016 and 2020 in Afghanistan, there were more than 2,100 civilians killed and 1,800 injured by air strikes; 37 percent of those killed were children.
  •  
    An appropriately savage review of Gladwell's foray into military history. Contrast with the elegance of KSR's The Lucky Strike which actually wrestles with the moral issues.
Ed Webb

TSA is adding face recognition at big airports. Here's how to opt out. - The Washington... - 0 views

  • Any time data gets collected somewhere, it could also be stolen — and you only get one face. The TSA says all its databases are encrypted to reduce hacking risk. But in 2019, the Department of Homeland Security disclosed that photos of travelers were taken in a data breach, accessed through the network of one of its subcontractors.
  • “What we often see with these biometric programs is they are only optional in the introductory phases — and over time we see them becoming standardized and nationalized and eventually compulsory,” said Cahn. “There is no place more coercive to ask people for their consent than an airport.”
  • Those who have the privilege of not having to worry their face will be misread can zip right through — whereas people who don’t consent to it pay a tax with their time. At that point, how voluntary is it, really?
Ed Webb

Iran Says Face Recognition Will ID Women Breaking Hijab Laws | WIRED - 0 views

  • After Iranian lawmakers suggested last year that face recognition should be used to police hijab law, the head of an Iranian government agency that enforces morality law said in a September interview that the technology would be used “to identify inappropriate and unusual movements,” including “failure to observe hijab laws.” Individuals could be identified by checking faces against a national identity database to levy fines and make arrests, he said.
  • Iran’s government has monitored social media to identify opponents of the regime for years, Grothe says, but if government claims about the use of face recognition are true, it’s the first instance she knows of a government using the technology to enforce gender-related dress law.
  • Mahsa Alimardani, who researches freedom of expression in Iran at the University of Oxford, has recently heard reports of women in Iran receiving citations in the mail for hijab law violations despite not having had an interaction with a law enforcement officer. Iran’s government has spent years building a digital surveillance apparatus, Alimardani says. The country’s national identity database, built in 2015, includes biometric data like face scans and is used for national ID cards and to identify people considered dissidents by authorities.
  • ...5 more annotations...
  • Decades ago, Iranian law required women to take off headscarves in line with modernization plans, with police sometimes forcing women to do so. But hijab wearing became compulsory in 1979 when the country became a theocracy.
  • Shajarizadeh and others monitoring the ongoing outcry have noticed that some people involved in the protests are confronted by police days after an alleged incident—including women cited for not wearing a hijab. “Many people haven't been arrested in the streets,” she says. “They were arrested at their homes one or two days later.”
  • Some face recognition in use in Iran today comes from Chinese camera and artificial intelligence company Tiandy. Its dealings in Iran were featured in a December 2021 report from IPVM, a company that tracks the surveillance and security industry.
  • US Department of Commerce placed sanctions on Tiandy, citing its role in the repression of Uyghur Muslims in China and the provision of technology originating in the US to Iran’s Revolutionary Guard. The company previously used components from Intel, but the US chipmaker told NBC last month that it had ceased working with the Chinese company.
  • When Steven Feldstein, a former US State Department surveillance expert, surveyed 179 countries between 2012 and 2020, he found that 77 now use some form of AI-driven surveillance. Face recognition is used in 61 countries, more than any other form of digital surveillance technology, he says.
Ed Webb

Glenn Greenwald: How America's Surveillance State Breeds Conformity and Fear | Civil Li... - 0 views

  • The Surveillance State hovers over any attacks that meaningfully challenge state-appropriated power. It doesn’t just hover over it. It impedes it, it deters it and kills it.  That’s its intent. It does that by design.
  • the realization quickly emerged that, allowing government officials to eavesdrop on other people, on citizens, without constraints or oversight, to do so in the dark, is a power that gives so much authority and leverage to those in power that it is virtually impossible for human beings to resist abusing that power.  That’s how potent of a power it is.
  • If a dictator takes over the United States, the NSA could enable it to impose total tyranny, and there would be no way to fight back.
  • ...23 more annotations...
  • Now it’s virtually a religious obligation to talk about the National Security State and its close cousin, the Surveillance State, with nothing short of veneration.
  • The NSA, beginning 2001, was secretly ordered to spy domestically on the communications of American citizens. It has escalated in all sorts of lawless, and now lawful ways, such that it is now an enormous part of what that agency does. Even more significantly, the technology that it has developed is now shared by a whole variety of agencies, including the FBI
  • Now, the Patriot Act is completely uncontroversial. It gets renewed without any notice every three years with zero reforms, no matter which party is in control.
  • hey are two, as I said, established Democrats warning that the Democratic control of the Executive branch is massively abusing this already incredibly broad Patriot Act. And one of the things they are trying to do is extract some basic information from the NSA about what it is they’re doing in terms of the surveillance on the American people.  Because even though they are on the Intelligence Committee, they say they don’t even know the most basic information about what the NSA does including even how many Americans have had their e-mails read or had their telephone calls intercepted by the NSA.
  • "We can’t tell you how many millions of Americans are having their e-mails read by us, and their telephone calls listened in by us, because for us to tell you that would violate the privacy of American citizens."
  • An article in Popular Mechanics in 2004 reported on a study of American surveillance and this is what it said: “There are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week. Americans are being watched. All of us, almost everywhere.” There is a study in 2006 that estimated that that number would quadruple to 100 million cameras -- surveillance cameras -- in the United States within five years largely because of the bonanza of post-9/11 surveilling. 
  • it’s not just the government that is engaged in surveillance, but just as menacingly, corporations, private corporations, engage in huge amounts of surveillance on us. They give us cell phones that track every moment of where we are physically, and then provide that to law enforcement agencies without so much as a search warrant.  Obviously, credit card and banking transactions are reported, and tell anyone who wants to know everything we do. We talk about the scandal of the Bush eavesdropping program that was not really a government eavesdropping program, so much as it was a private industry eavesdropping program. It was done with the direct and full cooperation of AT&T, Sprint, Verizon and the other telecom giants. In fact, when you talk about the American Surveillance State, what you’re really talking about is no longer public government agencies. What you’re talking about is a full-scale merger between the federal government and industry. That is what the Surveillance State is
  • The principle being that there can be no human interaction, especially no human communication, not just for international between foreign nations but by America citizens on American soils that is beyond the reach of the U.S. government.
  • at exactly the same time that the government has been massively expanding its ability to know everything that we’re doing it has simultaneously erected a wall of secrecy around it that prevents us from knowing anything that they’re doing
  • government now operates with complete secrecy, and we have none
  • it makes people believe that they’re free even though they’ve been subtly convinced that there are things that they shouldn’t do that they might want to do
  • what has happened in the last three to four years is a radical change in the war on terror. The war on terror has now been imported into United States policy. It is now directed at American citizens on American soil. So rather than simply sending drones to foreign soil to assassinate foreign nationals, we are now sending drones to target and kill American citizens without charges or trial. Rather than indefinitely detaining foreign nationals like Guantanamo, Congress last year enacted, and President Obama signed, the National Defense Authorization Act that permits the detention -- without trial, indefinitely -- of American citizens on U.S. soil.
  • this is what the Surveillance State is designed to do.  It’s justified, in the name of terrorism, of course that’s the packaging in which it’s wrapped, that’s been used extremely, and in all sorts of ways, since 9/11 for domestic application. And that’s being, that’s happening even more. It’s happening in terms of the Occupy movement and the infiltration that federal officials were able to accomplish using Patriot Act authorities. It’s happened with pro-Palestinian activists in the United States and all other dissident groups that have themselves [dealt with] with surveillance and law enforcement used by what was originally the war on terror powers.
  • if the government is able to know what we speak about and know who we’re talking to, know what it is that we’re planning, it makes any kind of activism extremely difficult. Because secrecy and privacy are prerequisites to effective actions.
  • we are training our young citizens to live in a culture where the expect they are always being watched. And we want them to be chilled, we want them to be deterred, we want them not to ever challenge orthodoxy or to explore limits where engaging creativity in any kind. This type of surveillance, by design, breeds conformism.  That’s its purpose. that’s what makes surveillance so pernicious.
  • f you go and speak to communities of American Muslims is you find an incredibly pervasive climate of fear.
  • This climate of fear creates limits around the behavior in which they’re willing to engage in very damaging ways
  • governments, when they want to give themselves abusive and radical powers, typically first target people who they think their citizens won’t care very much about, because they’ll think they’re not affected by it
  • the psychological effects on East German people endure until today. The way in which they have been trained for decades to understand that there are limits to their life, even once you remove the limits, they’ve been trained that those are not things they need to transgress.
  • Rosa Luxembourg said, “He who does not move does not notice his chains.”
  • You can acculturate people to believing that tyranny is freedom, that their limits are actually emancipations and freedom, that is what this Surveillance State does, by training people  to accept their own conformity that they are actually free, that they no longer even realize the ways in which they’re being limited.
  • important means of subverting this one-way mirror that I’ve described is forcible, radical transparency. It’s one of the reasons I support, so enthusiastically and unqualafiably, groups like Anonymous and WikiLeaks. I want holes to be blown in the wall of secrecy.
  • There are things like the Tor project and other groups that enable people to use the internet without any detection from government authorities. That has the effect of preventing regimes that actually bar their citizens from using the Internet from doing so since you can no longer trace the origins of the Internet user. But it also protects people who live in countries like ours where the government is trying to constantly monitor what we do by sending our communications through multiple proxies around the world that can’t be invaded. There’s really a war taking place: an arms race where the government and these groups are attempting to stay one tactical step ahead of the other. In terms of ability to shield internet communications from the government and the government’s ability to invade them and participating in this war in ways that are supportive of the “good side” are really critical as is veiling yourself from the technology that exists, to make what you do as tight as possible.
Ed Webb

Face Recognition Moves From Sci-Fi to Social Media - NYTimes.com - 0 views

  • the democratization of surveillance — may herald the end of anonymity
    • Ed Webb
       
      Democratization means putting this at the command of citizens, not of unaccountable corporations.
  • facial recognition is proliferating so quickly that some regulators in the United States and Europe are playing catch-up. On the one hand, they say, the technology has great business potential. On the other, because facial recognition works by analyzing and storing people’s unique facial measurements, it also entails serious privacy risks
  • researchers also identified the interests and predicted partial Social Security numbers of some students.
  • ...4 more annotations...
  • marketers could someday use more invasive techniques to identify random people on the street along with, say, their credit scores
  • “You might think it’s cool, or you might think it’s creepy, depending on the context,”
  • many users do not understand that Facebook’s tag suggestion feature involves storing people’s biometric data to re-identify them in later photos
  • Mr. Caspar said last week that he was disappointed with the negotiations with Facebook and that his office was now preparing to take legal action over the company’s biometric database. Facebook told a German broadcaster that its tag suggestion feature complied with European data protection laws. “There are many risks,” Mr. Caspar says. “People should be able to choose if they want to accept these risks, or not accept them.” He offered a suggestion for Americans, “Users in the United States have good reason to raise their voices to get the same right.”
Ed Webb

BLDGBLOG: Cities Under Siege - 0 views

  •  
     Uthor said...
Ed Webb

Tracking The Companies That Track You Online : NPR - 1 views

  • A visit to Dictionary.com resulted in 234 trackers being installed on our test computer, and only 11 of those were installed by Dictionary.com.
  • Every time I have a thought, I take an action online and Google it. So [online tracking] does build up these incredibly rich dossiers. One question is: Is knowing your name the right definition of anonymity? Right now, that is considered anonymous. If they don't know your name, they're not covered by laws that regulate personally identifiable information. And that's what the Federal Trade Commission is considering — that the definition of personal information should be expanded beyond name and Social Security number. Another thing that [online tracking] raises is sensitive information. So if you're looking at gay websites, then you're labeled as gay in some database somewhere and then you're followed around and sold on some exchange as gay, and you just may not want that to happen. So I feel like there are some categories that we as a society may not want collected: our political affiliation, our diseases, our income levels and many other things."
  • you can go to the websites of all of these tracking companies and ask them not to track you — which is absurd, because you'd have to know who they are. There is a list of all of them on the ad industry's webpage, and you can opt out of all of them at the same time. But one thing to know about tracking is they actually put a tracker on your computer saying don't track me. So you're opting in to being tracked for not being tracked
1 - 20 of 37 Next ›
Showing 20 items per page