Skip to main content

Home/ Media in Middle East & North Africa/ Group items matching "privacy" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Ed Webb

An Uncertain Future for Jordanian Youth - POMED - 2 views

  • Jordan’s strategic relationships and regional importance continue to win it unmatched financial support from the international community. And as a result, the government has felt little urgency or pressure to undertake real reform or respond to the legitimate demands of its youth. With trust between the youth and the regime low and the perception of corruption high, however, remaining complacent carries grave risks for the country’s stability.
  • “Economic optimism is scant, particularly among the youth,” the Arab Barometer found, adding that the economic crisis was “leading many to consider migration despite global travel restrictions.”
  • the rate of suicide in Jordan has also increased over the past few years amid the dire economic conditions. In 2020, the rate was the highest in 10 years and 45 percent higher than the year before, with one suicide on average every other day. After university graduates threatened earlier this year to commit mass suicide over widespread unemployment, Jordan’s parliament passed legislation criminalizing suicide and attempts to commit suicide in a public place, doubling the fine if it is a mass suicide attempt.
  • ...8 more annotations...
  • There are more than 6.5 million internet and social media users in Jordan, the majority of whom are youth, out of a population of roughly 11 million. Jordanians are avid social media users, and over the years have used Facebook, WhatsApp, and other platforms to share news not broadcast on state-controlled channels, jokes targeting the regime, and rumors about the myriad political and corruption scandals circulating across the country on a regular basis
  • Cybercrimes Law No. 27/2015 is a popular regime tool used to control expression online. Article 11 regulates expression on online platforms such as Facebook, Twitter, and blogs. In April 2019, parliament introduced amendments to the law to criminalize the act of spreading “rumors” and “hate speech,” extending to the use of private messaging apps such as WhatsApp. The latest amendments define hate speech as “every writing and every speech or action intended to provoke sectarian or racial sedition, advocate for violence, or foster conflict between followers of different religions and various components of the nation.” And under the cybercrime law, Jordanians will face a criminal penalty if they are convicted of “sending or resending or disseminating information through the Internet or website or any information system that includes defamation, slander or libel against any person.” Between 2019 and 2020, the cases brought under the cybercrime law exceeded two thousand, more than double the number from the year before. In 2022, there have been more arrests under charges of “spreading false news,” including the detentions of several high-profile journalists.
  • Even the Jordanian National Center for Human Rights, a semi-governmental organization, wrote in its own recent annual report that “the detention of individuals for what they express is continuing.” Alarmingly, a recent Citizen Lab and Front Line Defenders joint report confirmed that two operators, “likely agencies of the Jordanian government,” used the NSO Group’s Pegasus spyware to hack the phones of at least four Jordanians, including a human rights defender, a lawyer, and a journalist. 
  • Loosely formed groups of youth activists, often described with the term hirak (“movement”), organize in various neighborhoods and towns across Jordan around shared issues. In 2019, a workshop looking at youth activism across the Middle East and North Africa found that youth activism does not adhere to formalized structures of organizing, such as political parties, professional associations, and civil society organizations.
  • we have seen youth movements in the past decade break the generations-old divisions of urban versus rural and West Bank versus East Bank
  • organizing around their shared frustrations over unchecked levels of corruption, perpetual over-education combined with underemployment, and restrictions on what they can write on social media or when they can gather.
  • the attitudes of ruling elites and public officials toward youth are dismissive
  • the many initiatives launched over the years have not ever been driven by local youth demands, but rather have been top-down, buzzword-filled projects, centralized within the newly created Ministry of Youth, with little to no popular support or participation
Ed Webb

Signal asks users to set up TLS proxy servers to help Iranians 'bypass' censorship | Middle East Eye - 0 views

  • Signal has asked users to set up TLS proxy servers to help Iranians bypass censorship of the app, after Iran blocked the encrypted messaging platform. 
  • Signal said it was "working around Iran's censorship" after becoming the most downloaded app on Iranian app stores.
  • Thousands of Iranians flocked to Signal after Facebook-owned WhatsApp announced plans to overhaul its privacy policy. 
  • ...3 more annotations...
  • An Iranian filtering committee blocked Signal after it alleged the app hosted "criminal content". However, neither the government nor the judiciary, which both sit on the committee, are taking responsibility for the move. An Iranian judiciary spokesperson distanced himself from blocking Signal, saying it had not "blocked any media, news outlet or messaging service" since 2019.  The "Identifying the Criminal Content Working Group" consists of six government ministers and seven officials from other authorities.
  • Signal was previously blocked between 2016 and 2017. It joins Telegram, Twitter, Facebook and YouTube, which Iranian authorities have also blocked. 
  • An analyst close to the government told Middle East Eye the judiciary and hardliners were determined to make Iranians pessimistic about reformist candidates ahead of June's presidential elections.  "As Rouhani is close to the end of his tenure, the judiciary and hardliners are determined to make sure Rouhani has no encouraging legacy to make people totally pessimistic about reformists and moderates," said the analyst.  Rouhani has two legacies, according to the analyst: "One is the 2015 nuclear deal, which is somehow in intensive care, and the other is his striving to keep social networks open and unblocked."
Ed Webb

Why we need restrictions on coronavirus surveillance - 0 views

  • As governments around the world struggle to stave the spread of the disease they are understandably harnessing the power of technology. We must ensure this is done with respect for human rights and civil liberties and that we don’t weave a surveillance apparatus that can’t be undone.
  • These technologies are being deployed quickly and, it appears, without human rights impact assessments, sufficient privacy controls, or adequate restrictions on their use outside of the current context.
  • there’s an dearth of information about who has access to the data, how long it can be maintained, what sort of privacy rights people in the databases have, what types of restrictions are in place to ensure the data is only used as intended to combat the spread of the virus, and what could be done with the technology afterwards. If there is one thing we know from technological solutions, once a capacity is built it can be used for many purposes beyond that for which it was intended.
  • ...2 more annotations...
  • The NSO Group, for example, sells sophisticated surveillance technology it says is for fighting terrorism to governments around the world, several of which have turned around and deployed it against journalists. Its Pegasus spyware has been linked to government surveillance of journalists in India, Mexico, Saudi Arabia and the United States, including associates of murdered journalist Jamal Khashoggi. Now the company is reportedly testing in a dozen countries a new technology that matches location data collected by national telecoms with two weeks of mobile-phone tracking information from an infected person to identify those vulnerable to contagion who were in the patient’s vicinity for more than 15 minutes.
  • implementing sunset clauses on any new surveillance powers is essential if we don’t want coronavirus to undermine our rights as well as our health
Ed Webb

OTF | The Rise of Digital Authoritarianism in Egypt: Digital Expression Arrests from 2011-2019 - 0 views

  • Since 2013, Egypt has seen the worst human rights crackdown in the country’s history. The current regime has imprisoned thousands of political activists, criminalized demonstrations, and seized control over the media landscape in a successful effort to limit genuine political discourse. Today it is nearly impossible for any alternative narrative to penetrate conventional modalities of expression. As the state continues to close physical spaces and exert control over traditional media, alternative political voices have been forced to rely on digital platforms as a means to express themselves. In response, the state has turned its attention to these platforms.
  • Online censorship increased in 2017 when the websites of 21 independent media and political organizations were blocked inside the country in a single day. The number of blocked websites in Egypt has since surpassed 500. Large-scale phishing attacks are also frequently launched against Egyptian civil society, with attacks documented in 2017 and 2019. In 2018, several new laws were passed in Egyptian parliament limiting digital expression and inhibiting the right to privacy.
  • After compiling a dataset of 333 digital expression violations (including arrests, acquittals, prison sentences, investigations, fines, lawsuits, and pretrial detentions) in Egypt from 2011 until mid-2019, this report found the number of Egyptian citizens targeted by the state for digital expression has been steadily rising. Analysis of this data reveals a yearly increase in the number of digital expression violations, with a surge in the occurrence of these violations beginning in 2016 and continuing until mid-2019, when the data collection for this report ended.
  • ...6 more annotations...
  • Egyptian security authorities routinely surveil and target social media posts—particularly Facebook content—as a basis for the arrest and detention of Egyptian citizens. The state relies on provisions such as “spreading false news,” “joining a banned group” and “misuse of social media” to detain citizens for digital expression. These charges are found in the Penal Code, the Counterterrorism Law, and the Telecommunications Law, rather than new and highly publicized laws such as the Cybercrime Law and the Media Regulation Law.
  • Detainees held for digital expression violations by the SSP spend long periods in pretrial detention due to the unique procedural rules governing this body; many of these cases are never even brought to court
  • a dramatic increase in the use of a special prosecutorial body, the State Security Prosecution, to investigate digital expression cases.
  • The SSP is a special prosecutorial body which investigates and prosecutes cases related to national security and terrorism; it is notoriously subject to extraordinary procedural rules.
  • Egypt’s Prosecutor General issued a decree in 2018 directing prosecutors to focus on cases concerning the spread of false news. A “rumour collection network” was established for citizens to send in reports of false news and rumours to a WhatsApp number—effectively crowdsourcing surveillance to the civilian population.
  • Egyptian security authorities surveil online expression through technically unsophisticated strategies such as device seizures, observation of social media platforms, and informant networks. Demonstration events on Facebook, particularly during periods of heightened political tension, are routinely targeted by security authorities. Videos are also frequently targeted, as they are easily shared and accessed. Analysis of the dataset found three main types of arrests: mass arrests during periods of increased political tension; high profile figures targeted for their cumulative body of work; and individual posts that cause a citizen to be targeted.
Ed Webb

Western media and depictions of death and injury to 'others' | Racism | Al Jazeera - 0 views

  • not necessary for a newspaper to run images of the dead and injured in a manner that seemed blatantly disrespectful and dehumanising
  • Part of the issue people had with the editorial response was that it seemed to imply that the images were published because the attack in Nairobi was a "special" isolated incident, one that required especially gruesome images to depict "the truth" of what happened. 
  • Kenyans were neither fooled nor placated. Many others in the Global South agreed, as they, too, had experienced - many times over - how powerful news organisations from the geopolitical West present what happens in their communities and countries in two-dimensional ways, often with little regard for how their words and images would affect those who were depicted
  • ...9 more annotations...
  • a long tradition of exploiting the most painful, brutal moments of those in geopolitical locations that the West continues to regard in a condescending, paternalistic manner - particularly those in Africa, the Middle East and Asia. Others  shared examples of The New York Times' past reports on atrocities and terror attacks in the West, which did not include any gruesome images, to disprove the editors' claim that they would "show reality…wherever in the world" in a similar fashion.
  • Kenyans compared The New York Times' coverage of this story - without photos of dead, white, American bodies - to its coverage of the attack in Nairobi and pointed out the newspaper's hypocrisy
  • In response to the charges that Kenyans are engaging in "anti-democratic" behaviour, many pointed out that such lectures on media freedom smack of a smug, "First World" brand of racist superiority. It is a defensive reaction that also allows powerful, privileged news organisations and their foreign correspondents to deflect attention from legitimate criticism of their practices by focusing on "irrational" "mob reactions"
  • "freedom of the press really needs to be distinguished from the foreign press…do[ing] whatever they like. One is about critiquing state excesses and advancing democracy. The other is not necessarily that." 
  • there is ample evidence showing that mainstream media in the US routinely treats black victims of violence differently, that "black people's lives are valued less than whites' in the US". Given that context, she argued, "#RiversideAttack photos are not an isolated incidence. They continue a long tradition of presenting white grief as important and black grief as irrelevant." 
  • Sentilles argued that this discrepancy - and "the very fact of visual access to the dead" from regions that we have historically positioned as "other" - creates and maintains a hierarchy. It encourages those in the geopolitical West to objectify the victims of terror and disaster in "other" lands as lesser beings who do not require the same level of dignity with which we would approach our own. Those others' lives in those far-away locations are less valued, their deaths less impactful, and thus less respect needs to be shown around their deaths. Moreover, "publishing some images while suppressing others sends the message that the visible bodies are somehow less consequential than the bodies granted the privilege of privacy."
  • it remains important that foreign journalists operating in Africa remember to examine and critique their positionality as they report on events in countries into which they have just "parachuted". Members of the foreign press should know that, as representatives of powerful news organisations, they have enormous power to influence the ways in which those in the "West" view "Africa" and "Africans". However, their reports often lack this necessary self-awareness and critique. Instead, their work reflects the lineages of power that come with Western news institutions and the fact of being in a "Western" body (which, no doubt, also depends on how a particular reporter is read as a "racialised" and gendered body) in a particular setting and context.
  • Most Western media outlets' reports on Africa continue to offer their readers predictable, contemporary versions of deeply problematic colonial images of "Africa" that allows them to safely imagine themselves as "civilised", and "Africans" as…well, you know the rest
  • Africans are no longer staying silent
Ed Webb

Giulio, the islands and national security | Mada Masr - 0 views

  • The security logic seems to suggest that one cannot be sure that a researcher working on Islamic endowments in the 15th century isn’t really a spy — he might be looking for maps of Siwa, Halayib and Shalatin, the Yaghbub Oasis, or Tiran and Sanafir. Since we have border disputes with all our neighbors, not only can you not copy maps related to any border issue, you can’t conduct research on any topic vaguely connected to borders.
  • The security logic doesn’t stop at maps and borders. It casts suspicion on every topic. An Egyptian colleague working on Mamluk history was denied a research permit. An American colleague was denied a permit for a project on the history of private presses in the 19th century. A student of mine studies the history of the Labor Corps during World War I; his permit was also rejected
  • The official’s response (I paraphrase) was:Here’s someone studying the history of irrigation, and we have a dispute with Ethiopia over the Nile waters. We have no doubt that this student is honest and isn’t a spy, but how can we be sure that his thesis won’t fall into malicious hands, that it won’t contain information that could harm us — for example, info about Ethiopia’s right to the Nile waters? Such details could damage our negotiating position. Of course, we know employees at the National Archives are sincere patriots, and the same is true of most professors and students doing research there, but we have considerations that no one understands but us.
  • ...11 more annotations...
  • Field research is infinitely more difficult. If a researcher wants to conduct a field study or distribute a questionnaire or opinion survey, she needs the approval of the Central Agency for Public Mobilization and Statistics (CAPMAS). Its very name shows the perceived intimacy of the association between knowledge and the war effort.
  • The situation at the National Archives is reflected in all public institutions. Their mandate is not to serve the public, but to subject them to constant surveillance.
  • the security mentality in countries that respect the public is countered by a mentality that pushes back in the opposite direction, that respects the right to privacy, academic research and free expression. This mentality circumscribes the security mentality with numerous legal and administrative regulations.
  • In Egypt the security mentality runs amok. Just mentioning national security is enough to shut down a conversation instead of initiating it. Voices defending academic freedom and the freedom of research are few and far between (though brave and strong) — most importantly the March 9 Movement (a working group on university independence), the Association of Freedom of Thought and Expression, and the Egyptian Initiative for Personal Rights.
  • The responsible agency treats the National Archives like a state archive, not a national archive owned by and serving the public.
  • When I first saw Giulio Regeni’s photo on Facebook, when he was still missing, my heart skipped a beat. A foreign researcher who speaks Arabic fluently, living in Dokki and moving about the city at will, one who is working on the extremely sensitive topic of workers’ right to form independent unions, and one who is also a political activist who writes anti-regime articles for a communist paper under a pseudonym. If the security authorities knew of him, I thought, they would consider him a spy.But Giulio wasn’t a spy. He was a doctoral student. I never met or corresponded with him, but I know Giulio and know him well. He’s like the students I’ve taught for 20 years. Having now read and become familiar with his work, I can say that not only is he not a spy, he’s an exemplary student, one who loved Egypt and Egyptians and made efforts to help them.
  • we know that we’re living one of the worst moments of our modern history and that our rights, liberties and lives are under threat at all times by our own government.We know that our government, in the name of defending national security, has attacked universities and killed students demonstrating on campus. We know that our government, in the name of defending national security, has shut down the public sphere, appropriated political activity, and prevented people from expressing their opinion and peaceful demonstrating — unless the demonstration’s purpose is to give Abdel Fattah al-Sisi a mandate to do whatever he likes.
  • waging war on civil society organizations, accusing them of foreign collaboration, treason and getting rich off foreign funding. But it’s the government itself, specifically the army, that is the biggest beneficiary of foreign funding. No one dares make a peep about that.
  • arrested tens of thousands of members of Islamist groups and sentenced hundreds of them to death in trials lasting just a few minutes, trials that dealt a mortal blow to the integrity of the Egyptian judiciary and people’s faith in it
  • arrested hundreds of journalists, writers and political activists, and sentenced them to years in prison
  • we, the people, the true owners of this country, are insisting on knowing what happened to Guilio Regeni and are holding on to our right to be consulted about our own national security.
Ed Webb

In defence of anonymity, despite 'Gay girl in Damascus' | Dan Gillmor | Comment is free | guardian.co.uk - 0 views

  • Social media is a minefield for the unwary. Some things demand vetting if not outright verification, because the risk is to be an utter dupe. The BBC has especially sound practices in this regard, but it, too, was fooled.It's worth noting that traditional and new media organisations were instrumental in unmasking the falsity of the "gay girl" blog. Among others, National Public Radio's Andy Carvin asked his Twitter audience for help, and got plenty, while the Washington Post did its own digging into the matter; meanwhile, the Electronic Intifada website pieced together some evidence as well – and all kinds of people with no media affiliations contributed what they knew, learned or surmised.
  • Sounding real is not the same as being real. The fake Amina's blog was especially well done, with details that sounded authentic even to native Syrians. Its unmasked author said he was telling larger truths, but we have a name for this technique: fiction.
  • pseudonym. This is a much-used method online – not revealing one's own name but having a consistent identifier. It's one step away from outright anonymity, where there is no accountability whatever
  • ...3 more annotations...
  • It is up to us to cultivate an abiding distrust for speech when the speaker refuses to stand behind his or her own words – that is, by using one's own name.
  • it is essential to preserve anonymity (in special circumstances), even if we discourage it, while simultaneously improving trust.
  • What we should all fear is what too many in power want to see: the end of anonymity entirely. Governments, in particular, absolutely loathe the idea that people can speak without being identified. It will always be possible to create and disseminate anonymous speech with adept use of technology, but governments and their corporate handmaidens are working hard to make it much more difficult – and I fear there will soon be widespread laws disallowing anonymous speech, even in America. We should not allow them to succeed.
Ed Webb

?utm_source=supr from good.is - StumbleUpon - 1 views

  •  
    what this man said
Ed Webb

How Facebook is Killing Your Authenticity - steve's blog - 0 views

  • This latest push by Facebook to tie people to one identity across the interwebs is very troublesome.
  • The problem with tying internet-wide identity to a broadcast network like Facebook is that people don’t want one normalized identity, either in real life, or virtually.
  • Face it, authenticity goes way down when people know their 700 friends, grandma, and 5 ex-girlfriends are tuning in each time they post something on the web.
  • ...2 more annotations...
  • the off-network spread of Facebook’s identity graph is parasitic for the web
  • Facebook’s insistence that you have one identity across the web is both short-sighted and asinine, and people I talk to are starting to realize this.   Fact is, one social network will not rule the web... People are simply way too social to allow that.
  •  
    Steve Cheney "Facebook is no longer a social network.... Facebook is really a huge broadcast platform." http://bit.ly/f1H60B
  •  
    Not MENA related, but given the ubiquity of FB in MENA, and the identity questions raised, troubling.
Ed Webb

Facebook Officials Keep Quiet on Its Role in Revolts - NYTimes.com - 3 views

  • The social media giant finds itself under countervailing pressures after the uprisings in the Middle East. While it has become one of the primary tools for activists to mobilize protests and share information, Facebook does not want to be seen as picking sides for fear that some countries — like Syria, where it just gained a foothold — would impose restrictions on its use or more closely monitor users, according to some company executives who spoke on the condition of anonymity because they were discussing internal business.
  • Last week, Senator Richard J. Durbin, Democrat of Illinois, urged Facebook to take “immediate and tangible steps” to help protect democracy and human rights activists who use its services, including addressing concerns about not being able to use pseudonyms. In a letter to Mark Zuckerberg, Facebook’s chief executive, Mr. Durbin said the recent events in Egypt and Tunisia had highlighted the costs and benefits of social tools to democracy and human rights advocates. “I am concerned that the company does not have adequate safeguards in place to protect human rights and avoid being exploited by repressive governments,” he wrote.
  • This is an incredible challenge and an incredible opportunity for Facebook, Twitter and Google,” said Ethan Zuckerman, a senior researcher at the Berkman Center for Internet and Society at Harvard University, where he works on projects about the use of technology and media in the developing world. “It might be tougher for Facebook than anyone else. Facebook has been ambivalent about the use of their platform by activists.
  • ...2 more annotations...
  • Twitter and YouTube, which is owned by Google, have been more willing to embrace their roles in activism and unrest, Mr. Zuckerman said. After the Internet was shut down in Egypt, Twitter and Google actively helped protesters by producing a new service, speak2tweet, that allowed people to leave voicemail messages that would be filed as updates on Twitter. Biz Stone, one of Twitter’s founders, used it as an opportunity to emphasize the positive global impact that comes with the open exchange of information. When the Internet was back up, YouTube, working with Storyful, a social media news curation service, took the thousands of videos pouring in from the protests in Tahrir Square to help people access and share the information as quickly as possible on CitizenTube, its news and politics channel.
  • the Global Network Initiative, a voluntary code of conduct for technology companies created in 2008 that requires participating businesses to take reasonable steps to protect human rights
Ed Webb

Digital Ethnography » Blog Archive » Participatory Media Literacy: Why it matters - 0 views

  • students would prefer less technology in the classroom (especially *participatory* technologies that force them to do something other than sit back and memorize material for a regurgitation exercise)
  • participatory media literacy is as much about a literacy of *participation* as it is a literacy of media
  • Knowing something about privacy and the ways online behavior can have consequences at home, at work, in school, along with some sense of how to determine the credibility of information found online, ought to be taught in high school, or at even younger ages. But one of the big questions I don’t have a clue about is how educational institutions are going to be able to adapt quickly enough to a world in which being able to learn, fine, verify, collaborate, and communicate online requires acquisition of active skills, not an easily transmitted collection of facts.
Ed Webb

IDF soldier posts images of blindfold Palestinians on Facebook, from 'best time of my life' - 0 views

  • Israeli blogger Lisa Goldman contacted the former soldier via Facebook, who replied: "I don't speak to leftists."
  • "The horrible pictures demonstrate a norm of treating Palestinians like objects instead of human beings – treatment that disregards their feelings as humans and their right to privacy."
Ed Webb

U.A.E. Moves to Block BlackBerry Services - NYTimes.com - 0 views

  • the southeastern corner
    • Ed Webb
       
      Make that 'northeastern'
  • the latest high-stakes clash between governments and communications providers over the flow of digital information.
  • the BlackBerry’s highly encrypted data system, which offers security to users but makes it more difficult for governments to monitor communications.
  • ...4 more annotations...
  • Saudi Arabia has been closely studying the issue and may follow suit. Other countries, including Kuwait and Bahrain, have also raised concerns.
  • “The U.A.E. has never been a place that offered much in the way of electronic privacy,” said Jim Krane, author of “City of Gold,” a history of Dubai. “The government makes no secret that it monitors electronic communication, including text messages, phone calls and e-mail. The revelation that secure BlackBerry data is frustratingly out of the government’s reach only confirms this.”
  • Analysts and telecommunications experts also believe that security concerns delayed the arrival of BlackBerry service in China. It is unclear what actions the company took, if any, to alleviate those worries.
  • southeastern
Ed Webb

Is the government spying on your Facebook account? - politics.co.uk - 0 views

  • The government's approach to the issue of privacy is not unlike a rat hooked on heroin. It just can't get enough of our personal information.
  • The government promises not to look at the content of messages themselves, and restrict itself to who communicates with whom. This seems ludicrous. If two terrorist suspects are emailing each other frequently, on Facebook or anywhere itself, it's difficult to believe security services won't try to discover the content of the messages. Somewhere in the legislation – either in an amendment to RIPA or a clause of the communications data bill – there will be a power, in 'exceptional circumstances' to read content. And 'exceptional circumstances' tend to become much less exceptional than originally intended.
Ed Webb

Twitter: It's not just for kids -- dailypress.com - 0 views

  • "The rules have changed, and it's not just about social networking either," he said. "Right now, online, anything you do is being recorded. That's the default position you have to take … Whether you're blogging or using Twitter or even sending an e-mail, you have to assume that it will live forever. That's a fundamental shift in how we view our privacy." What's more, social networking sites might be the least dangerous, he said. By their very nature, users can share their complaints and push those who control the sites to make changes. The social networking services tend to be more open than many other online enterprises, he said. Any time you make a purchase over the Internet, for example, someone is probably compiling information about you. "The information is moving whether you know it or not," Costa said. "The thing about social networking is it tends to be more public, more out in the open. But people who aren't used to using instant messaging, or using Twitter, or Web pages and blogs still think of it as a little like letter writing or talking to friends.
Ed Webb

Filmmaker plans to shoot with tiny camera in eye - 0 views

  • Spence said he plans to become a "human surveillance machine" to explore privacy issues and whether people are "sleepwalking into an Orwellian society."
  • Spence, who jokingly calls himself "Eyeborg," told reporters at a media conference in Brussels that the camera hidden in a prosthetic eye — the same pale hazel color as his real one — would also let him capture more natural conversations than he would with a bulky regular camera. "As a documentary maker, you're trying to make a connection with a person," he says, "and the best way to make a connection is through eye contact." But Spence also acknowledged privacy concerns. "The closer I get to putting this camera eye in, the more freaked out people are about me," he said, adding people aren't sure they want to hang around someone who might be filming them at any time
  •  
    That's kind of...creepy and yet at the same time...very interesting. Here is an individual who is using his disability to his advantage.
  •  
    that is bizarre, I can't imagine he will have an easy time getting people to sign releases
1 - 20 of 22 Next ›
Showing 20 items per page