Skip to main content

Home/ Politically Minded/ Group items tagged digital

Rss Feed Group items tagged

Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
thinkahol *

YouTube - One Trillion Dollars Visualized from Mint.com - 0 views

  •  
    http://www.mint.com | It's official, trillion is the new billion. No longer is government spending talked about in terms of a mere ten digits. With the recent flurry of government spending, we are going to need another three zeros to make sense of it all. One trillion dollars is a number that few people can comprehend, let alone your standard nine digit calculator. So what does one trillion dollars look like?
thinkahol *

Cato Unbound » Blog Archive » The Digital Surveillance State: Vast, Secret, a... - 0 views

  •  
    It is unsurprising that the 9/11 attack fostered a massive expansion of America's already sprawling Surveillance State. But what is surprising, or at least far less understandable, is that this growth shows no signs of abating even as we approach almost a full decade of emotional and temporal distance from that event. The spate of knee-jerk legislative expansions in the immediate aftermath of the 9/11 trauma - the USA-PATRIOT Act - has actually been exceeded by the expansions of the last several years - first secretly and lawlessly by the Bush administration, and then legislatively and out in the open once Democrats took over control of the Congress in 2006. Simply put, there is no surveillance power too intrusive or unaccountable for our political class provided the word "terrorism" is invoked to "justify" those powers.
Skeptical Debunker

Leaked documents: UK record industry wrote web-censorship amendment - Boing Boing - 0 views

  • Parliamentarians need to recognize that copyright touches everyone and every technology in the digital age. It is no longer a question of inter-business regulation and deals. Getting copyright wrong has the potential to mess up our freedom of speech, prevent us from getting the benefits of new technologies, and damage society in other very profound ways. It is therefore deeply inappropriate for such fundamental proposals to have been introduced by both the government or the opposition parties at the behest of one side of the debate. That applies just as much to disconnection, which Mandelson introduced in the summer at the last minute under pressure again from the BPI and other rights holders.
  •  
    Last week, the UK LibDem party was thrown into scandal when two of its Lords proposed an amendment to the Digital Economy Bill that would allow for national web-censorship, particularly aimed at "web-lockers" like Google Docs and YouSendIt. Now a leaked document from the British Phonographic Institute suggests that the amendment was basically written by the record industry lobby and entered into law on their behalf by representatives of the "party of liberty." This weekend, LibDem members who attend the national convention in Birmingham will have the chance to vote on an emergency measure affirming the party's commitment to an open and just Internet, repudiating this disastrous measure. If you (or someone you know) is attending the convention, please support the "Save the Net" emergency measure and help rehabilitate the party's reputation on fundamental freedoms in the information society.
  •  
    Proving once again that special interests can "buy" the "support" of politicians of any stripe! And they can do so regardless of the "best interests" of the "majority of the people", who those politicians are supposedly morally (by honor) and legally (by oath) bound to represent!
rich hilts

Censorship - Rebranded For The Digital Era - 0 views

shared by rich hilts on 22 Jan 11 - No Cached
  •  
    Censorship. It isn't appropriate either way - neither side should practice it. And yet, it is happening more and more to many groups. Facebook is rapidly becoming a battleground for this sort of a battle, as is social media with people being able to report "abusive" this or that which is in reality just a difference of opinion. The question is, which side of the argument will the digital giants out there come down on? Our own personal experience with this new rebranding of an old hypocrisy serves as a warning!
thinkahol *

Pentagon Gets Double-Digit Increase - 0 views

  •  
    House approves $649 billion defense budget bill. Frank criticzes $17 billion increase in 'time of austerity.'
thinkahol *

Why Big Media Is Going Nuclear Against The DMCA | TechCrunch - 0 views

  •  
    When Congress updated copyright laws and passed the Digital Millennium Copyright Act (DMCA) in 1998, it ushered an era of investment, innovation and job creation.  In the decade since, companies like Google, YouTube and Twitter have emerged thanks to the Act, but in the process, they have disrupted the business models and revenue streams of traditional media companies (TMCs).  Today, the TMCs are trying to fast-track a couple of bills in the House and Congress to reverse all of that. Through their lobbyists in Washington, D.C., media companies are trying to rewrite the DMCA through two new bills.  The content industry's lobbyists have forged ahead without any input from the technology industry, the one in the Senate is called Protect IP and the one in the House is called E-Parasites.  The E-Parasite law would kill the safe harbors of the DMCA and allow traditional media companies to attack emerging technology companies by cutting off their ability to transact and collect revenue, sort of what happened to Wikileaks, if you will.  This would scare VCs from investing in such tech firms, which in turn would destroy job creation. The technology industry is understandably alarmed by its implications, which include automatic blacklists for any site issued a takedown notice by copyright holders that would extend to payment providers and even search engines.   What is going on and how exactly did we get here?
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
thinkahol *

Building a Subversive Grassroots Network - IEEE Spectrum - 0 views

  •  
    How Commotion Wireless plans to enable digital communication in the face of an Internet shutdown
thinkahol *

Parsing the Data and Ideology of the We Are 99% Tumblr | Rortybomb - 0 views

  •  
    One of the most fascinating things to come out of the current We Are 99%/Occupy Wall Street protests is the We Are 99% Tumblr.  At the site, people hold up signs that explain their current circumstances, and it tells the story of a whole range of Americans struggling in the Lesser Depression.  It is highly recommended. DATA The site features pictures of individuals holding their signs, and occasionally the tumblr reproduces the text of the signs themselves underneath the image as html text.  Sometimes the text under the image is blank, sometimes it is a different message, but often it is the sign itself. In order to get a slightly better empirical handle on this important tumblr, I created a script designed to read all of the pages and parse out the html text on the site.  It doesn't read the images (can anyone in the audience automate calls to an OCR?), just the html text.  After collecting all the text on all the pages, the code then goes through it to try to find interesting points. It's a fun exercise, pointing out things I wouldn't have seen otherwise.  For instance, I found this adorable little rascal, pictured below, mucking up the algorithm, as the first version of the code assumed all the ages would have two digits.  I found that he, and the sign his mom made for him as a confessional to her son, hit me a ton harder than any of the more direct signs of despair in this economy:
Skeptical Debunker

Opinion: Trudy Rubin: U.S. ignores health care successes in Europe, Japan - San Jose Me... - 0 views

  •  
    One of the most bewildering aspects of the current health care debate is the failure to learn key lessons from health systems abroad. Conservative talk show hosts decry the alleged evils of "socialized medicine" in countries with universal health coverage; they warn grimly of rationed health care. Yet there's nary a peep from Rush Limbaugh or Glenn Beck - let alone Congress - about countries such as Germany, France, Switzerland or Japan, where coverage is universal, affordable, and top quality, and patients see private doctors with little or no waiting. And, oh yes, their health costs are a fraction of our bloated numbers: The French spend 10 percent of GDP on health care, the Germans 11 percent, and they cover every citizen. We spend a whopping 17 percent and leave tens of millions of Americans uninsured. If you want a very readable short course on how European systems really work, take a look at "The Healing of America: A Global Quest for Better, Cheaper, and Fairer Health Care," by T.R. Reid, a former Washington Post foreign correspondent. You might also watch a fascinating 2008 Frontline series, available online, in which Reid was an adviser: "Sick Around the World: Can the U.S. Learn Anything From the Rest of the World About How to Run a Health Care System?"
  •  
    Article continued (Diigo would not highlight!?) - So far, the answer seems to be "no," not because there aren't valuable lessons, but because politicians won't relinquish their myths about European health Advertisement systems. Reid takes up that task. Myth No. 1, he says, is that foreign systems with universal coverage are all "socialized medicine." In countries such as France, Germany, Switzerland, and Japan, the coverage is universal while doctors and insurers are private. Individuals get their insurance through their workplace, sharing the premium with their employer as we do - and the government picks up the premium if they lose their job. Myth No. 2 - long waits and rationed care - is another whopper. "In many developed countries," Reid writes, "people have quicker access to care and more choice than Americans do." In France, Germany, and Japan, you can pick any provider or hospital in the country. Care is speedy and high quality, and no one is turned down. Myth No. 3 really grabs my attention: the delusion that countries with universal care "are wasteful systems run by bloated bureaucracies." In fact, the opposite is true. America's for-profit health insurance companies have the highest administrative costs of any developed country. Twenty percent or more of every premium dollar goes to nonmedical costs: paperwork, marketing, profits, etc. In developed countries with universal coverage, such as France and Germany, the administrative costs average about 5 percent. That's because every developed country but ours has decided health insurance should be a nonprofit operation. These countries also hold down costs by making coverage mandatory and by using a unified set of rules and payment schedules for all hospitals and doctors. This does not mean a single-payer system or a government-run health system. But it does sharply cut health costs by eliminating the mishmash of records and charges used by our myriad insurance firms, who use all kinds of gimmi
Skeptical Debunker

We're so good at medical studies that most of them are wrong - 0 views

  • Statistical validation of results, as Shaffer described it, simply involves testing the null hypothesis: that the pattern you detect in your data occurs at random. If you can reject the null hypothesis—and science and medicine have settled on rejecting it when there's only a five percent or less chance that it occurred at random—then you accept that your actual finding is significant. The problem now is that we're rapidly expanding our ability to do tests. Various speakers pointed to data sources as diverse as gene expression chips and the Sloan Digital Sky Survey, which provide tens of thousands of individual data points to analyze. At the same time, the growth of computing power has meant that we can ask many questions of these large data sets at once, and each one of these tests increases the prospects than an error will occur in a study; as Shaffer put it, "every decision increases your error prospects." She pointed out that dividing data into subgroups, which can often identify susceptible subpopulations, is also a decision, and increases the chances of a spurious error. Smaller populations are also more prone to random associations. In the end, Young noted, by the time you reach 61 tests, there's a 95 percent chance that you'll get a significant result at random. And, let's face it—researchers want to see a significant result, so there's a strong, unintentional bias towards trying different tests until something pops out. Young went on to describe a study, published in JAMA, that was a multiple testing train wreck: exposures to 275 chemicals were considered, 32 health outcomes were tracked, and 10 demographic variables were used as controls. That was about 8,800 different tests, and as many as 9 million ways of looking at the data once the demographics were considered.
  •  
    It's possible to get the mental equivalent of whiplash from the latest medical findings, as risk factors are identified one year and exonerated the next. According to a panel at the American Association for the Advancement of Science, this isn't a failure of medical research; it's a failure of statistics, and one that is becoming more common in fields ranging from genomics to astronomy. The problem is that our statistical tools for evaluating the probability of error haven't kept pace with our own successes, in the form of our ability to obtain massive data sets and perform multiple tests on them. Even given a low tolerance for error, the sheer number of tests performed ensures that some of them will produce erroneous results at random.
David Corking

140,000 Miles of African Roads Added to Open Street Map | Development Seed - 0 views

  • It’s really important that data like GIS data is “open” and freely available to everyone, otherwise that economic (and digital) divide will never lessen.
  •  
    OSM is far from a mere hobby project
1 - 15 of 15
Showing 20 items per page