Skip to main content

Home/ History Readings/ Group items tagged surveillance

Rss Feed Group items tagged

Javier E

Senate Votes to Extend Electronic Surveillance Authority - NYTimes.com - 0 views

  • Congress gave final approval on Friday to a bill extending the government’s power to intercept electronic communications of spy and terrorism suspects, after the Senate voted down proposals from several Democrats and Republicans to increase protections of civil liberties and privacy.
  • clearing it for approval by President Obama, who strongly supports it. Intelligence agencies said the bill was their highest legislative priority.
  • Congressional critics of the bill said that they suspected that intelligence agencies were picking up the communications of many Americans, but that they could not be sure because the agencies would not provide even rough estimates of how many people inside the United States had had communications collected under authority of the surveillance law, known as the Foreign Intelligence Surveillance Act.
  • ...5 more annotations...
  • The Foreign Intelligence Surveillance Act was adopted in 1978 and amended in 2008, with the addition of new surveillance authority and procedures, which are continued by the bill approved on Friday. The 2008 law was passed after the disclosure that President George W. Bush had authorized eavesdropping inside the United States, to search for evidence of terrorist activity, without the court-approved warrants ordinarily required for domestic spying.
  • By a vote of 52 to 43, the Senate on Friday rejected a proposal by Mr. Wyden to require the national intelligence director to tell Congress if the government had collected any domestic e-mail or telephone conversations under the surveillance law. The Senate also rejected, 54 to 37, an amendment that would have required disclosure of information about significant decisions by a special federal court that reviews applications for electronic surveillance in foreign intelligence cases.
  • The No. 2 Senate Democrat, Richard J. Durbin of Illinois, said the surveillance law “does not have adequate checks and balances to protect the constitutional rights of innocent American citizens.” “It is supposed to focus on foreign intelligence,” Mr. Durbin said, “but the reality is that this legislation permits targeting an innocent American in the United States as long as an additional purpose of the surveillance is targeting a person outside the United States.”
  • Mr. Merkley said the administration should provide at least unclassified summaries of major decisions by the Foreign Intelligence Surveillance Court. “An open and democratic society such as ours should not be governed by secret laws,” Mr. Merkley said, “and judicial interpretations are as much a part of the law as the words that make up our statute.”
  • Mr. Wyden said these writs reminded him of the “general warrants that so upset the colonists” more than 200 years ago. “The founding fathers could never have envisioned tweeting and Twitter and the Internet,” Mr. Wyden said. “Advances in technology gave government officials the power to invade individual privacy in a host of new ways.”
Alex Trudel

Europe Is Spying on You - The New York Times - 0 views

  • STRASBOURG, France — When Edward Snowden disclosed details of America’s huge surveillance program two years ago, many in Europe thought that the response would be increased transparency and stronger oversight of security services. European countries, however, are moving in the opposite direction. Instead of more public scrutiny, we are getting more snooping.
  • France recently adopted a controversial law on surveillance that permits major intrusions, without prior judicial authorization, into the private lives of suspects and those who communicate with them, live or work in the same place or even just happen to be near them.
  • Meanwhile, Austria is set to discuss a draft law that would allow a new security agency to operate with reduced external control and to collect and store communication data for up to six years. The Netherlands is considering legislation allowing dragnet surveillance of all telecommunications, indiscriminate gathering of metadata, decryption and intrusion into the computers of non-suspects. And in Finland, the government is even considering changing the Constitution to weaken privacy protections in order to ease the adoption of a bill granting the military and intelligence services the power to conduct electronic mass surveillance with little oversight.
  • ...5 more annotations...
  • More recently, as new technologies have offered more avenues to increase surveillance and data collection, the court has reiterated its position in a number of leading cases against several countries, including France, Romania, Russia and Britain, condemned for having infringed the right to private and family life that in the interpretation of the cour
  • unnecessary “wide-ranging and particularly serious interference with the fundamental right to respect for private life” and personal data, this court reaffirmed the outstanding place privacy holds in Europe
  • If European governments and parliaments do not respect fundamental principles and judicial obligations, our lives will become much less private. Our ability to participate effectively in public life is threatened, too, because these measures curtail our freedom of speech and our right to receive information — including that of public interest. Not all whistleblowers have the technical knowledge Mr. Snowden possessed. Many would fear discovery if they communicated with journalists, who in turn would lose valuable sources, jeopardizing their ability to reveal unlawful conduct in both the public and private spheres. Watergates can only happen when whistleblowers feel protected.
  • First, legislation should limit surveillance and the use of data in a way that strictly respects the right to privacy as spelled out in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, European data protection standards, the case law of the European Court of Human Rights and that of the European Court of Justice. These norms oblige states to respect human rights when they gather and store information relating to our private lives and to protect individuals from unlawful surveillance, including when carried out by foreign agencies.
  • Third, security agencies must operate under independent scrutiny and judicial review. This will require intrusive oversight powers for parliaments and a judiciary that is involved in the decision-making process to ensure accountability. Countries that have adopted controversial surveillance laws should reconsider or amend them. And those considering new surveillance legislation should do so with great caution.
Javier E

Thieves of experience: On the rise of surveillance capitalism - 0 views

  • n the choices we make as consumers and private citizens, we have always traded some of our autonomy to gain other rewards. Many people, it seems clear, experience surveillance capitalism less as a prison, where their agency is restricted in a noxious way, than as an all-inclusive resort, where their agency is restricted in a pleasing way
  • Zuboff makes a convincing case that this is a short-sighted and dangerous view — that the bargain we’ve struck with the internet giants is a Faustian one
  • but her case would have been stronger still had she more fully addressed the benefits side of the ledger.
  • ...17 more annotations...
  • there’s a piece missing. While Zuboff’s assessment of the costs that people incur under surveillance capitalism is exhaustive, she largely ignores the benefits people receive in return — convenience, customization, savings, entertainment, social connection, and so on
  • hat the industries of the future will seek to manufacture is the self.
  • Behavior modification is the thread that ties today’s search engines, social networks, and smartphone trackers to tomorrow’s facial-recognition systems, emotion-detection sensors, and artificial-intelligence bots.
  • All of Facebook’s information wrangling and algorithmic fine-tuning, she writes, “is aimed at solving one problem: how and when to intervene in the state of play that is your daily life in order to modify your behavior and thus sharply increase the predictability of your actions now, soon, and later.”
  • “The goal of everything we do is to change people’s actual behavior at scale,” a top Silicon Valley data scientist told her in an interview. “We can test how actionable our cues are for them and how profitable certain behaviors are for us.”
  • This goal, she suggests, is not limited to Facebook. It is coming to guide much of the economy, as financial and social power shifts to the surveillance capitalists
  • Combining rich information on individuals’ behavioral triggers with the ability to deliver precisely tailored and timed messages turns out to be a recipe for behavior modification on an unprecedented scale.
  • it was Facebook, with its incredibly detailed data on people’s social lives, that grasped digital media’s full potential for behavior modification. By using what it called its “social graph” to map the intentions, desires, and interactions of literally billions of individuals, it saw that it could turn its network into a worldwide Skinner box, employing psychological triggers and rewards to program not only what people see but how they react.
  • spying on the populace is not the end game. The real prize lies in figuring out ways to use the data to shape how people think and act. “The best way to predict the future is to invent it,” the computer scientist Alan Kay once observed. And the best way to predict behavior is to script it.
  • competition for personal data intensified. It was no longer enough to monitor people online; making better predictions required that surveillance be extended into homes, stores, schools, workplaces, and the public squares of cities and towns. Much of the recent innovation in the tech industry has entailed the creation of products and services designed to vacuum up data from every corner of our lives
  • “The typical complaint is that privacy is eroded, but that is misleading,” Zuboff writes. “In the larger societal pattern, privacy is not eroded but redistributed . . . . Instead of people having the rights to decide how and what they will disclose, these rights are concentrated within the domain of surveillance capitalism.” The transfer of decision rights is also a transfer of autonomy and agency, from the citizen to the corporation.
  • What we lose under this regime is something more fundamental than privacy. It’s the right to make our own decisions about privacy — to draw our own lines between those aspects of our lives we are comfortable sharing and those we are not
  • Other possible ways of organizing online markets, such as through paid subscriptions for apps and services, never even got a chance to be tested.
  • Online surveillance came to be viewed as normal and even necessary by politicians, government bureaucrats, and the general public
  • Google and other Silicon Valley companies benefited directly from the government’s new stress on digital surveillance. They earned millions through contracts to share their data collection and analysis techniques with the National Security Agenc
  • As much as the dot-com crash, the horrors of 9/11 set the stage for the rise of surveillance capitalism. Zuboff notes that, in 2000, members of the Federal Trade Commission, frustrated by internet companies’ lack of progress in adopting privacy protections, began formulating legislation to secure people’s control over their online information and severely restrict the companies’ ability to collect and store it. It seemed obvious to the regulators that ownership of personal data should by default lie in the hands of private citizens, not corporations.
  • The 9/11 attacks changed the calculus. The centralized collection and analysis of online data, on a vast scale, came to be seen as essential to national security. “The privacy provisions debated just months earlier vanished from the conversation more or less overnight,”
Javier E

Opinion | How Capitalism Betrayed Privacy - The New York Times - 0 views

  • For much of human history, what we now call “privacy” was better known as being rich
  • depended on another, even more impressive achievement: the creation of a middle class
  • The historical link between privacy and the forces of wealth creation helps explain why privacy is under siege today. It reminds us, first, that mass privacy is not a basic feature of human existence but a byproduct of a specific economic arrangemen
  • ...20 more annotations...
  • in a capitalist country, our baseline of privacy depends on where the money is. And today that has changed.
  • The forces of wealth creation no longer favor the expansion of privacy but work to undermine it
  • We have witnessed the rise of what I call “attention merchants” and what the sociologist Shoshana Zuboff calls “surveillance capitalism” — the commodification of our personal data by tech giants like Facebook a
  • We face a future in which active surveillance is such a routine part of business that for most people it is nearly inescapable
  • we are on the road back to serfdom.
  • stronger privacy protections. But that will require laws that do not merely tinker with but fundamentally alter the economics of privacy.
  • In the United States, it is safe to say, privacy “won” the 20th century. Its crowning triumph was the Supreme Court’s recognition in 1965 of a constitutional right to privacy
  • By the 1960s the rise of a propertied middle class had put each man in his “castle,”
  • The race to maximize those assets by companies big and small has made surveillance a growth industry. It is in this sense that capitalism has begun to change sides.
  • new technologies coupled with new theories of value have transformed the economics of privacy. A drastic decrease in the cost of mass surveillance (thanks to the internet) has increased the value of two types of asset: our data and our attention.
  • the richest companies in the world now generate wealth by putting as many trackers, devices and screens inside our homes and as close to our bodies as possible
  • money can be made by consolidating everything that is known about an individual.
  • There is good reason to believe that, if nothing is done, gratuitous surveillance will be built into nearly every business and business model.
  • Some have argued that there’s no need to be concerned
  • The end result is selling people stuff, not sending them to Siberia.
  • data and surveillance networks created for one purpose can and will be used for others. You must assume that any personal data that Facebook or Android keeps are data that governments around the world will try to get o
  • once you realize you’re being watched, it is a tough sensation to shake. As our experiences with social media have made all too clear, we act differently when we know we are “on the record.”
  • Mass privacy is the freedom to act without being watched and thus, in a sense, to be who we really are — not who we want others to think we are. At stake, then, is something akin to the soul.
  • To be truly effective, privacy laws must seek to change the incentives that foster gratuitous surveillance and the reckless accumulation of personalized data. We need strong bans, including those that prohibit companies from sharing their customers’ personal information
  • companies that repeatedly fail to protect sensitive data need to face dire consequences.
Javier E

Colleges are turning students' phones into surveillance machines - The Washington Post - 0 views

  • When Syracuse University freshmen walk into professor Jeff Rubin’s Introduction to Information Technologies class, seven small Bluetooth beacons hidden around the Grant Auditorium lecture hall connect with an app on their smartphones and boost their “attendance points.”
  • And when they skip class? The SpotterEDU app sees that, too, logging their absence into a campus database that tracks them over time and can sink their grade. It also alerts Rubin, who later contacts students to ask where they’ve been. His 340-person lecture has never been so full.“They want those points,” he said. “They know I’m watching and acting on it. So, behaviorally, they change.”
  • Dozens of schools now use such technology to monitor students’ academic performance, analyze their conduct or assess their mental health.
  • ...20 more annotations...
  • The tracking systems, they worry, will infantilize students in the very place where they’re expected to grow into adults, further training them to see surveillance as a normal part of living, whether they like it or not.
  • A flood of cameras, sensors and microphones, wired to an online backbone, now can measure people’s activity and whereabouts with striking precision, reducing the mess of everyday living into trend lines that companies promise to help optimize.
  • “These administrators have made a justification for surveilling a student population because it serves their interests, in terms of the scholarships that come out of their budget, the reputation of their programs, the statistics for the school,”
  • Instead of GPS coordinates, the schools rely on networks of Bluetooth transmitters and wireless access points to piece together students’ movements from dorm to desk. One company that uses school WiFi networks to monitor movements says it gathers 6,000 location data points per student every day.
  • The dream of some administrators is a university where every student is a model student, adhering to disciplined patterns of behavior that are intimately quantified, surveilled and analyzed
  • “Graduates will be well prepared … to embrace 24/7 government tracking and social credit systems,” one commenter on the Slashdot message board said. “Building technology was a lot more fun before it went all 1984.”
  • one feeling is almost universally shared, according to interviews with more than a dozen students and faculty members: that the technology is becoming ubiquitous, and that the people being monitored — their peers, and themselves — can’t really do anything about it.
  • “We’re reinforcing this sense of powerlessness … when we could be asking harder questions, like: Why are we creating institutions where students don’t want to show up?”
  • SpotterEDU chief Rick Carter, a former college basketball coach, said he founded the app in 2015 as a way to watch over student athletes: Many schools already pay “class checkers” to make sure athletes remain eligible to play.
  • “Students today have so many distractions,” said Tami Chievous, an associate athletic director at the University of Missouri, where advisers text some freshmen athletes if they don’t show up within five minutes of class. “We have to make sure they’re doing the right thing.”
  • Students’ attendance and tardiness are scored into a point system that some professors use for grading, Carter said, and schools can use the data to “take action” against truant students, such as grabbing back scholarship funds
  • For even more data, schools can turn to the Austin-based start-up Degree Analytics, which uses WiFi check-ins to track the movements of roughly 200,000 students across 19 state universities, private colleges and other schools.
  • Benz tells school administrators that his system can solve “a real lack of understanding about the student experience”: By analyzing campus WiFi data, he said, 98 percent of their students can be measured and analyzed.
  • A classifier algorithm divides the student body into peer groups — “full-time freshmen,” say, or “commuter students” — and the system then compares each student to “normal” behavior, as defined by their peers. It also generates a “risk score” for students based around factors such as how much time they spent in community centers or at the gym.
  • Some administrators love the avalanche of data these kinds of WiFi-based systems bring. “Forget that old ominous line, ‘We know where you live.’ These days, it’s, ‘We know where you are,’ ” Purdue University president Mitch Daniels wrote last year about his school’s location-tracking software. “Isn’t technology wonderful?”
  • If these systems work so well in college, administrators might argue, why not high school or anywhere else?
  • He now says he wishes schools would share the data with parents, too. “I just cut you a $30,000 check,” he said, “and I can’t find out if my kid’s going to class or not?”
  • Some parents, however, wish their children faced even closer supervision. Wes Grandstaff, who said his son, Austin, transformed from a struggling student to college graduate with SpotterEDU’s help, said the added surveillance was worth it: “When you’re a college athlete, they basically own you, so it didn’t matter what he felt: You’re going to get watched and babysat whether you like it or not.”
  • Joanna Grama, an information-security consultant and higher-education specialist who has advised the Department of Homeland Security on data privacy, said she doubted most students knew they were signing up for long-term monitoring when they clicked to connect to the campus WiFi.
  • “At what point in time do we start crippling a whole generation of adults, human beings, who have been so tracked and told what to do all the time that they don’t know how to fend for themselves?” she said. “Is that cruel? Or is that kind?”
Javier E

Opinion | Warning! Everything Is Going Deep: 'The Age of Surveillance Capitalism' - The... - 0 views

  • recent advances in the speed and scope of digitization, connectivity, big data and artificial intelligence are now taking us “deep” into places and into powers that we’ve never experienced before — and that governments have never had to regulate before.
  • deep learning, deep insights, deep surveillance, deep facial recognition, deep voice recognition, deep automation and deep artificial minds.
  • how did we get so deep down where the sharks live?
  • ...11 more annotations...
  • The short answer: Technology moves up in steps, and each step, each new platform, is usually biased toward a new set of capabilities. Around the year 2000 we took a huge step up that was biased toward connectivity, because of the explosion of fiber-optic cable, wireless and satellites.
  • Around 2007, we took another big step up. The iPhone, sensors, digitization, big data, the internet of things, artificial intelligence and cloud computing melded together and created a new platform that was biased toward abstracting complexity at a speed, scope and scale we’d never experienced before.
  • Over the last decade, these advances in the speed of connectivity and the elimination of complexity have grown exponentially
  • It means machines can answer so many more questions than nonmachines, also known as “humans.” The percentage of calls a chatbot, or virtual agent, is able to handle without turning the caller over to a person is called its “containment rate,” and these rates are steadily soaring. Soon, automated systems will be so humanlike that they will have to self-identify as machines.
  • Unfortunately, we have not developed the regulations or governance, or scaled the ethics, to manage a world of such deep powers, deep interactions and deep potential abuses.
  • But bad guys, who are always early adopters, also see the same potential to go deep in wholly new ways.
  • Surveillance capitalism,” Zuboff wrote, “unilaterally claims human experience as free raw material for translation into behavioral data. Although some of these data are applied to service improvement, the rest are declared as a proprietary behavioral surplus, fed into advanced manufacturing processes known as ‘machine intelligence,’ and fabricated into prediction products that anticipate what you will do now, soon and later. Finally, these prediction products are traded in a new kind of marketplace that I call behavioral futures markets. Surveillance capitalists have grown immensely wealthy from these trading operations, for many companies are willing to lay bets on our future behavior.”
  • “People are looking to achieve very big numbers. Earlier they had incremental, 5 to 10 percent goals in reducing their work force. Now they’re saying, ‘Why can’t we do it with 1 percent of the people we have?’
  • I wish I thought that catch-up was around the corner. I don’t. Our national discussion has never been more shallow — reduced to 280 characters.
  • This has created an opening and burgeoning demand for political, social and religious leaders, government institutions and businesses that can go deep — that can validate what is real and offer the public deep truths, deep privacy protections and deep trust.
  • But deep trust and deep loyalty cannot be forged overnight. They take time.
Javier E

Genetic sequencing: U.S. lags behind in key tool against coronavirus mutations - The Wa... - 0 views

  • The lack of widespread genetic sequencing means the window is closing to find and slow the spread of variants such as the one first spotted in Britain, which appears to be much more transmissible, and those initially detected in Brazil and South Africa. All have been discovered in small numbers in the United States.
  • Now is when genetic sequencing — a process that maps out the genetic code of the particular virus that infected someone so it can be compared with others — would do the most good, while such variants are less prevalent in the U.S. population and action can be taken against them.
  • “We are in a race against time because of these mutations. And in that race, we are falling behind,”
  • ...17 more annotations...
  • The problem echoes the country’s catastrophic stumbles early in the pandemic, when a lack of testing allowed the virus to spread widely. Currently, only a tiny fraction of all positive coronavirus tests in the United States are forwarded for further sequencing.
  • t if scientists don’t know what strains are moving through the population, the mutations that matter may pop up undetected.
  • For months, scientists have been sounding alarms and trying to ramp up genetic sequencing of test samples, but the effort has been plagued by a lack of funding, political will and federal coordination
  • Centers for Disease Control and Prevention Director Rochelle Walensky said Friday that the government is increasing the level of sequencing nationwide.“We have scaled up surveillance dramatically just in the last 10 days, in fact. But our plans for scaling up surveillance are even more than what we’ve done so far,”
  • Ultimately, the country needs real-time data — similar to the dashboards now used to track daily cases, hospitalizations and deaths — to track variants and their prevalence across the country
  • “None of that exists right now. We’re incredibly behind compared to other countries,”
  • The U.S. effort is so underdeveloped that it’s impossible to say exactly how many virus cases are sequenced daily.
  • The CDC has warned that the variant found in the United Kingdom — which British scientists said could be up to 70 percent more transmissible — could become dominant in the United States by March.
  • It also recently contracted with four private companies — Quest, Labcorp, Illumina and Helix — to conduct more sequencing. By mid-February, those contracts should hit full capacity, analyzing 6,000 samples per week, CDC officials said.
  • Illumina estimates that the country needs to sequence 5 percent of its coronavirus cases to detect a new variant when the variant represents about 0.1 percent to 1.0 percent of the country’s case
  • However, the United States so far has only sequenced about 0.32 percent of its total cases
  • the country ranks 38th out of 130 countries reporting whole-genome sequencing data.
  • The United States has sequenced 84,177 samples out of 25.7 million cases as of Friday, according to a Washington Post analysis. By comparison, the United Kingdom, in ninth place, has sequenced 214,000 genomes — almost 6 percent — of the country’s 3.7 million cases.
  • Unlike the United States, the U.K. invested in genetic sequencing early on in the pandemic, launching its genomics consortium in March with a $27 million investment and a multimillion-dollar boost late last year.
  • Even before the emergence of mutations such as the variants first discovered in South Africa and the United Kingdom, U.S. experts had been warning for months about the need for a national standard for genetic surveillance.
  • In May, the CDC launched a surveillance program for the coronavirus called SPHERES (SARS-CoV-2 Sequencing for Public Health Emergency Response, Epidemiology, and Surveillance). But, in practice, the program relied on a haphazard patchwork of academic labs contributing genetic sequencing on a volunteer basis.
  • A July report by the National Academies of Science said that “poor funding, coordination, and capacity” had led to a “patchy, typically passive, and reactive” U.S. sequencing effort.
katherineharron

Marie Yovanovitch calls for investigation into 'disturbing' surveillance as ex-diplomat... - 0 views

  • Former US Ambassador to Ukraine Marie Yovanovitch on Tuesday called for an investigation into the "disturbing" notion that she was under surveillance from associates of the President's personal lawyer, Rudy Giuliani.
  • The texts released by the House Democrats Tuesday show Connecticut Republican congressional candidate Robert Hyde berating Yovanovitch and suggest he was monitoring her while she was in Kiev and relaying her movements to Parnas. Hyde declined to comment to CNN when asked if he had surveilled Yovanovitch, who served as a key witness in the House impeachment probe.
  • Another retired ambassador said they had "never heard of anything like it.""It's common that terrorists and former communists do this to us. It's appalling and incomprehensible that somebody who is working for the President's personal lawyer would have been doing this to our ambassador," they told CNN.That ambassador explained that surveillance is a "real problem" that's "unfortunately pretty common" for diplomats. Embassies have "surveillance detection teams" -- normally locally hired staff -- "who actually are out there looking to see if anyone is showing unwarranted interest" in embassy operations, they said.
  • ...2 more annotations...
  • Yovanovitch, who was recalled from her post in Kiev in May 2019 after a smear campaign led by Trump's allies, has been repeatedly maligned by the US President. He told his Ukrainian counterpart in July 2019 that she was "going to go through some things," according to a rough White House transcript of the presidents' conversation -- a message Yovanovitch said she found threatening.
  • McEldowney told CNN she believes Pompeo is "derelict in his duty for refusing to speak out about diplomats who are loyally and faithfully and professionally carrying out their responsibilities and who are being slandered by political attacks."The State Department did not reply to a request for comment about the criticism.
Javier E

Opinion | I Used to Work for Google. I Am a Conscientious Objector. - The New York Times - 0 views

  • “We can forgive your politics and focus on your technical contributions as long as you don’t do something unforgivable, like speaking to the press.”
  • This was the parting advice given to me during my exit interview from Google after spending a month internally arguing, resignation letter in hand, for the company to clarify its ethical red lines around Project Dragonfly, the effort to modify Search to meet the censorship and surveillance demands of the Chinese Communist Party.
  • When a prototype circulated internally of a system that would ostensibly allow the Chinese government to surveil Chinese users’ queries by their phone numbers, Google executives argued that it was within existing norms
  • ...8 more annotations...
  • the time has passed when tech companies can simply build tools, write algorithms and amass data without regard to who uses the technology and for what purpose.
  • Nearly a decade ago, Cisco Systems was sued in federal court on behalf of 11 members of the Falun Gong organization, who claimed that the company built a nationwide video surveillance and “forced conversion” profiling system for the Chinese government that was tailored to help Beijing crack down on the group
  • According to Cisco’s own marketing materials, the video analyzer — which would now be marketed as artificial intelligence — was the “only product capable of recognizing over 90 percent of Falun Gong pictorial information.”
  • The failure to punish Cisco set a precedent for American companies to build artificial intelligence for foreign governments to use for political oppression
  • Thermo Fisher, sold DNA analyzers to aid in the current large-scale domestic surveillance and internment of hundreds of thousands of Uighurs, a predominantly Muslim ethnic group, in the region of Xinjiang.
  • Mr. Yang defended Yahoo’s human rights commitments and emphasized the importance of the Chinese market. Google used a similar defense for Dragonfly last year.
  • Tech companies are spending record amounts on lobbying and quietly fighting to limit employees’ legal protections for organizing. North American legislators would be wise to answer the call from human rights organizations and research institutions by guaranteeing explicit whistle-blower protections similar to those recently passed by the European Union
  • Ideally, they would vocally support an instrument that legally binds businesses — via international human rights law — to uphold human rights.
zareefkhan

House Republicans Vote to Release Secret Memo on Russia Probe - The New York Times - 0 views

  • Republicans on the House Intelligence Committee, disregarding Justice Department warnings that their actions would be “extraordinarily reckless,” voted Monday evening to release a contentious secret memorandum said to accuse the department and the F.B.I. of misusing their authority to obtain a secret surveillance order on a former Trump campaign associate.
  • Under the obscure House rule invoked by the committee, President Trump now has five days to review the document and decide whether to try to block it from going public. The White House has repeatedly indicated that it wants the memo out, but Mr. Trump’s Justice Department had been working to slow or block its release.
  • Speaking to reporters after the closed-door vote, Representative Adam Schiff of California, the top Democrat on the committee, said it has been a “sad day” for the committee and that Republicans had voted “to politicize the intelligence process.
  • ...7 more annotations...
  • Speaking to reporters after the closed-door vote, Representative Adam Schiff of California, the top Democrat on the committee, said it has been a “sad day” for the committee and that Republicans had voted “to politicize the intelligence process
  • The memo, which was made available to all members of the House, is said to contend that officials from the two agencies were not forthcoming to a Foreign Intelligence Surveillance Court judge.
  • The New York Times reported on Sunday that the memo reveals that Deputy Attorney General Rod J. Rosenstein, a top Trump appointee, signed off an application to extend the surveillance of Mr. Page shortly after taking office last spring. The renewal shows that the Justice Department under Mr. Trump saw reason to believe that Mr. Page was acting as a Russian agent.
  • The inclusion of Mr. Rosenstein’s action in the memo could expose him to a torrent of criticism from Republicans on Capitol Hill and from conservatives in the media who have seized on the surveillance to argue that the Russia investigation may have been tainted from the start.
  • There is no known precedent for the Republicans’ action. Though House rules allow the Intelligence Committee to vote to disclose classified information if it is deemed to be in the public interest, the rule is not thought to have ever been used.
  • Stephen E. Boyd, an assistant attorney general, said it would be “extraordinarily reckless” to release a memo drawing on classified information without official review. He said the department is “unaware of any wrongdoing related to the FISA process.”
  • Democrats responded to the committee’s actions with outrage.
Javier E

Is Firefox better than Chrome? It comes down to privacy. - The Washington Post - 0 views

  • Web’s biggest snoop of all: Google. Seen from the inside, its Chrome browser looks a lot like surveillance software.
  • It turns out, having the world’s biggest advertising company make the most popular Web browser was about as smart as letting kids run a candy shop.
  • In a week of Web surfing on my desktop, I discovered 11,189 requests for tracker “cookies” that Chrome would have ushered right onto my computer
  • ...12 more annotations...
  • Google’s product managers told me in an interview that Chrome prioritizes privacy choices and controls, and they’re working on new ones for cookies. But they also said they have to get the right balance with a “healthy Web ecosystem” (read: ad business).
  • Firefox’s product managers told me they don’t see privacy as an “option” relegated to controls. They’ve launched a war on surveillance, starting this month with “enhanced tracking protection” that blocks nosy cookies by default on new Firefox installations.
  • They’re everywhere — one study found third-party tracking cookies on 92 percent of websites.
  • what responsibility does a browser have in protecting us from code that isn’t doing much more than spying?
  • In 2015, Mozilla debuted a version of Firefox that included anti-tracking tec
  • that’s what it activated this month on all websites. This isn’t about blocking ads — those still come through. Rather, Firefox is parsing cookies to decide which ones to keep for critical site functions and which ones to block for spying
  • Apple’s Safari browser, used on iPhones, also began applying “intelligent tracking protection” to cookies in 2017, using an algorithm to decide which ones were bad.
  • Google itself, through its Doubleclick and other ad businesses, is the No. 1 cookie maker — the Mrs. Fields of the Web
  • “Our viewpoint is to deal with the biggest problem first, but anticipate where the ecosystem will shift and work on protecting against those things as well,” said Peter Dolanjski, Firefox’s product lead.
  • Google quietly began signing Gmail users into Chrome last fall. Google says the Chrome shift didn’t cause anybody’s browsing history to be “synced” unless they specifically opted in — but I found mine was being sent to Google and don’t recall ever asking for extra surveillance. (You can turn off the Gmail auto-login by searching “Gmail” in Chrome settings and switching off “Allow Chrome sign-in.”)
  • And as a nonprofit, it earns money when people make searches in the browser and click on ads — which means its biggest source of income is Google. Mozilla’s chief executive says the company is exploring new paid privacy services to diversify its income.
  • Its biggest risk is that Firefox might someday run out of steam in its battle with the Chrome behemoth. Even though it’s the No. 2 desktop browser, with about 10 percent of the market, major sites could decide to drop support, leaving Firefox scrambling.
brickol

China, Desperate to Stop Coronavirus, Turns Neighbor Against Neighbor - The New York Times - 0 views

  • These outcasts are from Wuhan, the capital of Hubei Province, which is at the center of a rapidly spreading viral outbreak that has killed more than 420 people in China and sent fear rippling around the world. They are pariahs in China, among the millions unable to go home and feared as potential carriers of the mysterious coronavirus.
  • All across the country, despite China’s vast surveillance network with its facial recognition systems and high-end cameras that is increasingly used to track its 1.4 billion people, the government has turned to familiar authoritarian techniques — like setting up dragnets and asking neighbors to inform on one another — as it tries to contain the outbreak.
  • Local officials offered no explanation but returned a few days later to fasten police tape to his door and hang a sign that warned neighbors that a Wuhan returnee lived there. The sign included an informant hotline to call if anyone saw him or his family leave the apartment. Mr. Tang said he received about four calls a day from different local government departments.
  • ...10 more annotations...
  • “In reality there’s not much empathy,” he said. “It’s not a caring tone they’re using. It’s a warning tone. I don’t feel very comfortable about it.”
  • China has a major incentive to track down potential carriers of the disease. The coronavirus outbreak has put parts of the country under lockdown, brought the world’s second-largest economy to a virtual standstill and erected walls between China and the rest of the world.
  • Still, even some government officials called for understanding as concerns about prejudice spread. Experts warned such marginalization of an already vulnerable group could prove counterproductive, further damaging public trust and sending those who should be screened and monitored deeper underground.
  • While networks of volunteers and Christian groups have been vocal about offering help, many local leaders have focused efforts on finding and isolating people from Hubei. On big screens and billboards, propaganda videos and posters warn people to stay inside, wear masks and wash hands.
  • In the northern province of Hebei, one county offered bounties of 1,000 yuan, or about $140, for each Wuhan person reported by residents. I
  • In the eastern province of Jiangsu, quarantine turned to imprisonment after authorities used metal poles to barricade shut the door of a family recently returned from Wuhan. To get food, the family relied on neighbors who lowered provisions with a rope down to their back balcony
  • “They’re only working to separate Wuhan people from Nanjing people,” Mr. Li said. “They don’t care at all if Wuhan people infect each other.”
  • Across the country, the response from local authorities often resembles the mass mobilizations of the Mao era rather than the technocratic, data-driven wizardry depicted in propaganda about China’s emerging surveillance state. They have also turned to techniques Beijing used to fight the outbreak of SARS, another deadly disease, in 2002 and 2003, when China was much less technologically sophisticated.
  • Checkpoints to screen people for fevers have popped up at tollbooths, at the front gates of apartment complexes and in hotels, grocery stores and train stations. Often those wielding the thermometer guns don’t hold them close enough to a person’s forehead, generating unusually low temperature readings. Such checks were worthless, for instance, against one man in the western province of Qinghai, whom police are investigating on suspicion that he covered up his symptoms to travel.
  • “I feel that the villagers are ignorant and the government isn’t helping; instead it’s leaking the information everywhere without telling them that I don’t have any symptoms,”
Javier E

Coronavirus economy plans are clear: No return to normal in 2020 - Vox - 0 views

  • Over the past few days, I’ve been reading the major plans for what comes after social distancing. You can read them, too. There’s one from the right-leaning American Enterprise Institute, the left-leaning Center for American Progress, Harvard University’s Safra Center for Ethics, and Nobel Prize-winning economist Paul Romer.
  • In different ways, all these plans say the same thing: Even if you can imagine the herculean political, social, and economic changes necessary to manage our way through this crisis effectively, there is no normal for the foreseeable future.
  • The AEI, CAP, and Harvard plans aren’t identical, but they’re similar. All of them feature a period of national lockdown — in which extreme social distancing is deployed to “flatten the curve” and health and testing capacity is surged to “raise the line.”
  • ...12 more annotations...
  • All of them then imagine a phase two, which relaxes — but does not end — social distancing while implementing testing and surveillance on a mass scale. This is where you must begin imagining the almost unimaginable.
  • The CAP and Harvard plans both foresee a digital pandemic surveillance state in which virtually every American downloads an app to their phone that geotracks their movements, so if they come into contact with anyone who later is found to have Covid-19, they can be alerted and a period of social quarantine can begin
  • o state the obvious: The technological and political obstacles are massive. While similar efforts have borne fruit in Singapore and South Korea, the US is a very different country, with a more mistrustful, individualistic culture. Already, polling shows that 70 percent of Republicans, and 46 percent of Democrats, strongly oppose using cellphone data to enforce quarantine orders.
  • The alternative to mass surveillance is mass testing. Romer’s proposal is to deploy testing on a scale no one else is contemplating — 22 million tests per day — so that the entire country is being tested every 14 days, and anyone who tests positive can be quickly quarantined
  • The AEI proposal is the closest thing to a middle path between these plans. It’s more testing, but nothing approaching Romer’s hopes. It’s more contact tracing, but it doesn’t envision an IT-driven panopticon. But precisely for that reason, what it’s really describing is a yo-yo between extreme lockdown and lighter forms of social distancing, continuing until a vaccine is reached.
  • This, too, requires some imagination. Will governors who’ve finally, at great effort, reopened parts of their economies really keep throwing them back into lockdown every time ICUs begin to fill? Will Trump have the stomach to push the country back into quarantine after he’s lifted social distancing guidelines?
  • even if the political hurdles could be cleared, it’s obvious, reading the AEI proposal, that there’ll be no “V-shaped recovery” of the economy. Scott Gottlieb, the former FDA commissioner who helped craft the plan, says he thinks something like 80 percent of the economy will return — that may sound like a lot, but it’s an economic collapse of Great Depression proportions.
  • As unlikely as these futures may be, I think the do-nothing argument is even less plausible: It imagines that we simply let a highly lethal virus kill perhaps millions of Americans, hospitalize tens of millions more, and crush the health system, while the rest of us go about our daily economic and social business.
  • That is, in my view, far less likely than the construction of a huge digital surveillance state. I care about my privacy, but not nearly so much as I care about my mother.
  • My point isn’t to criticize these plans when I have nothing better to offer. Indeed, my point isn’t to criticize them at all. It’s simply to note that these aren’t plans for returning to anything even approaching normal
  • They either envision life under a surveillance and testing state of dystopian (but perhaps necessary!) proportions, or they envision a long period of economic and public health pain, as we wrestle the disease down only to see it roar back, as seems to be happening in Singapore.
  • As of now, the White House has neither chosen nor begun executing on a plan of its own. That’s a terrible abdication of leadership, but reading through the various proposals, you can see why it’s happened. Imagine you’re the president of the United States in an election year. Which of these futures, with all its costs and risks and pain, would you want to try and sell to the American people?
Javier E

ROUGH TYPE | Nicholas Carr's blog - 0 views

  • The smartphone has become a repository of the self, recording and dispensing the words, sounds and images that define what we think, what we experience and who we are. In a 2015 Gallup survey, more than half of iPhone owners said that they couldn’t imagine life without the device.
  • So what happens to our minds when we allow a single tool such dominion over our perception and cognition?
  •  Smartphones have become so entangled with our existence that, even when we’re not peering or pawing at them, they tug at our attention, diverting precious cognitive resources. Just suppressing the desire to check our phone, which we do routinely and subconsciously throughout the day, can debilitate our thinking.
  • ...39 more annotations...
  • he has seen mounting evidence that using a smartphone, or even hearing one ring or vibrate, produces a welter of distractions that makes it harder to concentrate on a difficult problem or job. The division of attention impedes reasoning and performance.
  • Another 2015 study, appearing in the Journal of Computer-Mediated Communication, showed that when people hear their phone ring but are unable to answer it, their blood pressure spikes, their pulse quickens, and their problem-solving skills decline.
  • The researchers recruited 520 undergraduates at UCSD and gave them two standard tests of intellectual acuity. One test gauged “available working-memory capacity,” a measure of how fully a person’s mind can focus on a particular task. The second assessed “fluid intelligence,” a person’s ability to interpret and solve an unfamiliar problem. The only variable in the experiment was the location of the subjects’ smartphones. Some of the students were asked to place their phones in front of them on their desks; others were told to stow their phones in their pockets or handbags; still others were required to leave their phones in a different room.
  • In both tests, the subjects whose phones were in view posted the worst scores, while those who left their phones in a different room did the best. The students who kept their phones in their pockets or bags came out in the middle. As the phone’s proximity increased, brainpower decreased.
  • In subsequent interviews, nearly all the participants said that their phones hadn’t been a distraction—that they hadn’t even thought about the devices during the experiment. They remained oblivious even as the phones disrupted their focus and thinking.
  • A second experiment conducted by the researchers produced similar results, while also revealing that the more heavily students relied on their phones in their everyday lives, the greater the cognitive penalty they suffered.
  • the “integration of smartphones into daily life” appears to cause a “brain drain” that can diminish such vital mental skills as “learning, logical reasoning, abstract thought, problem solving, and creativity.”
  • Imagine combining a mailbox, a newspaper, a TV, a radio, a photo album, a public library and a boisterous party attended by everyone you know, and then compressing them all into a single, small, radiant object. That is what a smartphone represents to us. No wonder we can’t take our minds off it.
  • They found that students who didn’t bring their phones to the classroom scored a full letter-grade higher on a test of the material presented than those who brought their phones. It didn’t matter whether the students who had their phones used them or not: All of them scored equally poorly.
  • A study of nearly a hundred secondary schools in the U.K., published last year in the journal Labour Economics, found that when schools ban smartphones, students’ examination scores go up substantially, with the weakest students benefiting the most.
  • Social skills and relationships seem to suffer as well.
  • Because smartphones serve as constant reminders of all the friends we could be chatting with electronically, they pull at our minds when we’re talking with people in person, leaving our conversations shallower and less satisfying.
  • In a 2013 study conducted at the University of Essex in England, 142 participants were divided into pairs and asked to converse in private for ten minutes. Half talked with a phone in the room, half without a phone present. The subjects were then given tests of affinity, trust and empathy. “The mere presence of mobile phones,” the researchers reported in the Journal of Social and Personal Relationships, “inhibited the development of interpersonal closeness and trust” and diminished “the extent to which individuals felt empathy and understanding from their partners.”
  • The evidence that our phones can get inside our heads so forcefully is unsettling. It suggests that our thoughts and feelings, far from being sequestered in our skulls, can be skewed by external forces we’re not even aware o
  • Not only do our phones shape our thoughts in deep and complicated ways, but the effects persist even when we aren’t using the devices. As the brain grows dependent on the technology, the research suggests, the intellect weakens.
  • even in the history of captivating media, the smartphone stands out. It is an attention magnet unlike any our minds have had to grapple with before. Because the phone is packed with so many forms of information and so many useful and entertaining functions, it acts as what Dr. Ward calls a “supernormal stimulus,” one that can “hijack” attention whenever it is part of our surroundings — and it is always part of our surroundings.
  •  Scientists have long known that the brain is a monitoring system as well as a thinking system. Its attention is drawn toward any object that is new, intriguing or otherwise striking — that has, in the psychological jargon, “salience.”
  • The irony of the smartphone is that the qualities that make it so appealing to us — its constant connection to the net, its multiplicity of apps, its responsiveness, its portability — are the very ones that give it such sway over our minds.
  • We need to give our minds more room to think. And that means putting some distance between ourselves and our phones.
  • Social media apps were designed to exploit “a vulnerability in human psychology,” former Facebook president Sean Parker said in a recent interview. “[We] understood this consciously. And we did it anyway.”
  • A quarter-century ago, when we first started going online, we took it on faith that the web would make us smarter: More information would breed sharper thinking. We now know it’s not that simple.
  • As strange as it might seem, people’s knowledge and understanding may actually dwindle as gadgets grant them easier access to online data stores
  • In a seminal 2011 study published in Science, a team of researchers — led by the Columbia University psychologist Betsy Sparrow and including the late Harvard memory expert Daniel Wegner — had a group of volunteers read forty brief, factual statements (such as “The space shuttle Columbia disintegrated during re-entry over Texas in Feb. 2003”) and then type the statements into a computer. Half the people were told that the machine would save what they typed; half were told that the statements would be erased.
  • Afterward, the researchers asked the subjects to write down as many of the statements as they could remember. Those who believed that the facts had been recorded in the computer demonstrated much weaker recall than those who assumed the facts wouldn’t be stored. Anticipating that information would be readily available in digital form seemed to reduce the mental effort that people made to remember it
  • The researchers dubbed this phenomenon the “Google effect” and noted its broad implications: “Because search engines are continually available to us, we may often be in a state of not feeling we need to encode the information internally. When we need it, we will look it up.”
  • as the pioneering psychologist and philosopher William James said in an 1892 lecture, “the art of remembering is the art of thinking.”
  • Only by encoding information in our biological memory can we weave the rich intellectual associations that form the essence of personal knowledge and give rise to critical and conceptual thinking. No matter how much information swirls around us, the less well-stocked our memory, the less we have to think with.
  • As Dr. Wegner and Dr. Ward explained in a 2013 Scientific American article, when people call up information through their devices, they often end up suffering from delusions of intelligence. They feel as though “their own mental capacities” had generated the information, not their devices. “The advent of the ‘information age’ seems to have created a generation of people who feel they know more than ever before,” the scholars concluded, even though “they may know ever less about the world around them.”
  • That insight sheds light on society’s current gullibility crisis, in which people are all too quick to credit lies and half-truths spread through social media. If your phone has sapped your powers of discernment, you’ll believe anything it tells you.
  • Data, the novelist and critic Cynthia Ozick once wrote, is “memory without history.” Her observation points to the problem with allowing smartphones to commandeer our brains
  • When we constrict our capacity for reasoning and recall or transfer those skills to a gadget, we sacrifice our ability to turn information into knowledge. We get the data but lose the meaning
  • Phone makers like Apple and Samsung and app writers like Facebook, Google and Snap design their products to consume as much of our attention as possible during every one of our waking hours
  • Harvard Business School professor emerita Shoshana Zuboff argues in her new book that the Valley’s wealth and power are predicated on an insidious, essentially pathological form of private enterprise—what she calls “surveillance capitalism.” Pioneered by Google, perfected by Facebook, and now spreading throughout the economy, surveillance capitalism uses human life as its raw material. Our everyday experiences, distilled into data, have become a privately-owned business asset used to predict and mold our behavior, whether we’re shopping or socializing, working or voting.
  • By reengineering the economy and society to their own benefit, Google and Facebook are perverting capitalism in a way that undermines personal freedom and corrodes democracy.
  • Under the Fordist model of mass production and consumption that prevailed for much of the twentieth century, industrial capitalism achieved a relatively benign balance among the contending interests of business owners, workers, and consumers. Enlightened executives understood that good pay and decent working conditions would ensure a prosperous middle class eager to buy the goods and services their companies produced. It was the product itself — made by workers, sold by companies, bought by consumers — that tied the interests of capitalism’s participants together. Economic and social equilibrium was negotiated through the product.
  • By removing the tangible product from the center of commerce, surveillance capitalism upsets the equilibrium. Whenever we use free apps and online services, it’s often said, we become the products, our attention harvested and sold to advertisers
  • this truism gets it wrong. Surveillance capitalism’s real products, vaporous but immensely valuable, are predictions about our future behavior — what we’ll look at, where we’ll go, what we’ll buy, what opinions we’ll hold — that internet companies derive from our personal data and sell to businesses, political operatives, and other bidders.
  • Unlike financial derivatives, which they in some ways resemble, these new data derivatives draw their value, parasite-like, from human experience.To the Googles and Facebooks of the world, we are neither the customer nor the product. We are the source of what Silicon Valley technologists call “data exhaust” — the informational byproducts of online activity that become the inputs to prediction algorithms
  • internet companies operate in what Zuboff terms “extreme structural independence from people.” When databases displace goods as the engine of the economy, our own interests, as consumers but also as citizens, cease to be part of the negotiation. We are no longer one of the forces guiding the market’s invisible hand. We are the objects of surveillance and control.
Javier E

As Coronavirus Mutates, the World Stumbles Again to Respond - The New York Times - 0 views

  • Denmark, which has invested in genetic surveillance, discovered the variant afflicting Britain in multiple Danish regions and recently tightened restrictions. The health minister compared it to a storm surge, predicting that it would dominate other variants by mid-February.
  • And as countries go looking, they are discovering other variants, too.
  • With the world stumbling in its vaccination rollout and the number of cases steeply rising to peaks that exceed those seen last spring, scientists see a pressing need to immunize as many people as possible before the virus evolves enough to render the vaccines impotent.
  • ...13 more annotations...
  • “We do know how to dial down the transmission of the virus by a lot with our behavior,” said Carl T. Bergstrom, an evolutionary biologist at the University of Washington in Seattle. “We’ve got a lot of agency there.”
  • The vaccine alone will not be enough to get ahead of the virus: It will take years to inoculate enough people to limit its evolution. In the meantime, social distancing, mask-wearing and hand-washing — coupled with aggressive testing, tracking and tracing — might buy some time and avert devastating spikes in hospitalizations and deaths along the way. These strategies could still turn the tide against the virus, experts said.
  • “It’s a race against time,” said Marion Koopmans, a Dutch virologist and a member of a World Health Organization working group on coronavirus adaptations.
  • experts had warned from the start that it would only be a matter of time before the virus became an even more formidable adversary.
  • The spread of the variant lashing Britain has left some countries vulnerable at a time when they seemed on the brink of scientific salvation.A case in point: Israel. The country, which had launched a remarkably successful vaccine rollout, tightened its lockdown on Friday after having discovered cases of the variant. About 8,000 new infections have been detected daily in recent days, and the rate of spread in ultra-Orthodox communities has increased drastically.
  • Yet in the course of the pandemic, governments have often proven reluctant or unable to galvanize support for those basic defenses. Many countries have all but given up on tracking and tracing. Mask-wearing remains politically charged in the United States, despite clear evidence of its efficacy.
  • “Every situation we have studied in depth, where a virus has jumped into a new species, it has become more contagious over time,” said Andrew Read, an evolutionary microbiologist at Penn State University. “It evolves because of natural selection to get better, and that’s what’s happening here.”
  • Experts say that countries should focus instead on ramping up vaccinations, particularly among essential workers who face a high risk with few resources to protect themselves. The longer the virus spreads among the unvaccinated, the more mutations it might collect that can undercut the vaccines’ effectiveness.
  • The variants that have emerged in South Africa and Brazil are a particular threat to immunization efforts, because both contain a mutation associated with a drop in the efficacy of vaccines. In one experiment, designed to identify the worst-case scenario, Dr. Bloom’s team analyzed 4,000 mutations, looking for those that would render vaccines useless. The mutation present in the variants from both Brazil and South Africa proved to have the biggest impact.
  • Still, every sample of serum in the study neutralized the virus, regardless of its mutations, Dr. Bloom said, adding that it would take a few more years before the vaccines need to be tweaked.“There should be plenty of time where we can be prospective, identify these mutations, and probably update the vaccines in time.”
  • Dr. Rambaut and colleagues released a paper on the variant discovered in Britain on Dec. 19 — the same day that British officials announced new measures. The variant had apparently been circulating undetected as early as September. Dr. Rambaut has since credited the South Africa team with the tip that led to the discovery of the variant surging in Britain.
  • Public health officials have formally recommended that type of swift genetic surveillance and information-sharing as one of the keys to staying on top of the ever-changing virus. But they have been calling for such routine surveillance for years, with mixed results.
  • Britain has one of the most aggressive surveillance regimens, analyzing up to 10 percent of samples that test positive for the virus. But few countries have such robust systems in place. The United States sequences less than 1 percent of its positive samples. And others cannot hope to afford the equipment or build such networks in time for this pandemic.
Conner Armstrong

Anger Growing Among Allies Over U.S. Surveillance - NYTimes.com - 0 views

  • Ms. Merkel herself angrily demanded assurances from President Obama that her cellphone was not the target of an American intelligence tap
  • “If that is true, what we hear, then that would be really bad,” Mr. de Maizière told ARD, Germany’s leading state television channel. America is Germany’s best friend, he noted, adding: “It really can’t work like this.” He suggested that there would be consequences. “We can’t simply go back to business as usual,” he said. Katrin Göring-Eckardt, the leader of the Greens, shared the indignation, noting that America is a close ally but that normal business could not be conducted “if we go about suspecting one another.” Her consternation was mixed with an element of “we told you so.” The Greens had argued since the first disclosures last summer of mass American surveillance that Ms. Merkel needed to be more vigorous and not simply accept American assurances that no German laws had been broken.
sgardner35

Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border - NYTimes.com - 0 views

  • Without public notice or debate, the Obama administration has ex
  • panded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents.
  • The disclosures, based on documents provided by Edward J. Snowden, the former N.S.A. contractor, and shared with The New York Times and ProPublica, come at a time of unprecedented cyberattacks on American financial institutions, businesses and government agencies, but also of greater scrutiny of secret legal justifications for broader government surveillance.
  • ...9 more annotations...
  • Government officials defended the N.S.A.’s monitoring of suspected hackers as necessary to shield Americans from the increasingly aggressive activities of foreign governments. But critics say it raises difficult trade-offs that should be subject to public debate.
  • “That’s a major policy decision about how to structure cybersecurity in the U.S. and not a conversation that has been had in public.”
  • One internal N.S.A. document notes that agency surveillance activities through “hacker signatures pull in a lot.”
  • “Reliance on legal authorities that make theoretical distinctions between armed attacks, terrorism and criminal activity
  • may prove impractical,” the White House National Security Council wrote in a classified annex to a policy report in May 2009, which was included in the N.S.A.’s internal files.
  • The disclosure that the N.S.A. and the F.B.I. have expanded their cybersurveillance adds a dimension to a recurring debate over the post-Sept. 11 expansion of government spying powers: Information about Americans sometimes gets swept up incidentally when foreigners are targeted, and prosecutors can use that information in criminal cases.
  • Citing the potential for a copy of data “exfiltrated” by a hacker to contain “so much” information about Americans, one N.S.A. lawyer suggested keeping the stolen data out of the agency’s regular repository for information collected by surveillance
  • In a response to questions for this article, the F.B.I. pointed to its existing procedures for protecting victims’ data acquired during investigations, but also said it continually reviewed its policies “to adapt to these changing threats while protecting civil liberties and the interests of victims of cybercrimes
  • “The technology so often outstrips whatever rules and structures and standards have been put in place, which means that government has to be constantly self-critical and we have to be able to have an open debate about it,” Mr. Obama said.
Alex Trudel

Kerry: Israel agrees to surveillance at Jerusalem holy site - CNN.com - 0 views

  • Israel's Prime Minister has agreed to 24-hour video surveillance at a disputed Jerusalem holy site -- a move that U.S. Secretary of State John Kerry said could be "a game-changer" to reduce regional bloodshed.
  • "Today I hope that we could begin to turn the page on this very difficult period," Kerry added.
  • Tensions have been brewing for weeks in and around Israel and Palestinian territories, erupting into deadly violence
  • ...5 more annotations...
  • Eight Israelis have been killed after being stabbed, shot or run over by Palestinians, violence that Prime Minister Benjamin Netanyahu has accused Palestinian leader Mahmoud Abbas of inciting partly with his talk about the Jerusalem holy site.
  • wounded 1,850 in the West Bank, Jerusalem and Gaza, according to the Palestinian Health Ministry.
  • Prior to leaving Amman for Saudi Arabia, Kerry announced not only the apparent surveillance video, which was proposed by the Jordanian King, but also Israel's pledge "to continue to enforce its longstanding policy on religious worship at the Temple Mount.
  • Israeli forces currently check people and bags outside the site, but do not patrol inside the premises.
  • He added that Israel does welcome coordination between its authorities and those from Jordan, "including to make sure visitors ... maintain restraints and respect for the sanctity of the area.
Javier E

Review: Charlie Savage's 'Power Wars' Dissects Obama's Evolution on National Security -... - 0 views

  • In the 2008 presidential campaign, Barack Obama repeatedly criticized President George W. Bush for his “war on terror,” including the use of torture, indefinite detention, warrantless surveillance, secrecy and expansive presidential power. Yet after nearly seven years of the Obama administration, many (though not all) of these Bush-era policies remain in effect.
  • Why was there no greater change?
  • Charlie Savage addresses that question exhaustively, describing how President Obama, his top aides and, above all, his lawyers grappled again and again with the many questions about counterterrorism they inherited when they took office.
  • ...16 more annotations...
  • in its 700-plus pages, the author catalogs virtually all the legal disputes over counterterrorism in the Obama era, all the justifications, procedural steps and bureaucratic battles, to the point where at times his book seems more like a compendium than a narrative
  • With the exception of torture, which President Obama prohibited on his first day in office, his administration managed mostly to provide new legal underpinnings for many of the national-security policies (including warrantless surveillance, indefinite detention at Guantánamo Bay and drone strikes) that were first adopted under Mr. Bush
  • President Obama will some day be seen “as less a transformative post-9/11 president than a transitional one.”
  • in some areas like surveillance, the Obama team never planned to outlaw the policies, despite what some of his supporters on the left may have thought
  • He has led a “lawyerly” administration, Mr. Savage writes, one that has added “an additional layer of rules, standards and procedures” to “the unsettling premise that the United States was still at war and would, of necessity, remain so with no end in sight.”
  • Power Wars” opens with an incident that Mr. Savage considers a fundamental turning point for the Obama administration: the attempt by the so-called underwear bomber, Umar Farouk Abdulmutallab, to detonate explosives aboard a plane heading for Detroit on Christmas Day in 2009.
  • the political fallout from this incident, arguably including the Democrats’ loss of a Senate seat with Scott Brown’s upset victory in Massachusetts, effectively spooked the Obama team. It “profoundly hardened the Obama administration’s attitude towards counterterrorism,” he writes.
  • there are alternative ways of interpreting the Obama administration’s policy steps on national security in its early years. One is that well before that time, the administration was already spooked: It had retreated on counterterrorism issues throughout the president’s first year in office.
  • Gregory Craig, President Obama’s first White House counsel, who had pushed for quicker and more vigorous changes in counterterrorism policies, had already left the administration after a series of battles with other White House officials who were reluctant to take actions that might anger the C.I.A.
  • In short, the Obama White House was from the outset under pressure from the military and intelligence communities not to veer too sharply from the policies and decisions of the Bush era
  • during the Bush years, the Democrats mounted two strands of attack on the post-9/11 policies. The first was from the civil liberties perspective, to assert that policies like warrantless surveillance were inherently wrong. The second line of attack was to say that the Bush administration’s policies violated the rule of law because President Bush adopted them on his own without congressional or other legal authority.
  • President Obama’s “specific complaints” about the Bush programs and his promises “were heavily tilted towards fixing the legal process.”
  • the death of Osama bin Laden in a 2011 raid by Navy SEALs in Pakistan, a subject of renewed controversy
  • He concludes that the lawyers’ activities and the memos they wrote fit with the Obama administration’s account of the raid and not with the revisionist theories about it.
  • Mr. Savage writes that there is no simple judgment to be made on President Obama’s legacy on counterterrorism issues: His administration deeply disappointed defenders of civil liberties critics on the left but was also regularly attacked by hawks on the right.
  • “Obama’s record was irreducibly messy and complex, not unlike the world in which he tried to govern,”
Javier E

Far-Right Rally in Chemnitz, Germany Sparks Backlash - The Atlantic - 0 views

  • Though the AfD may be emboldened by its boost in the polls following the events in Chemnitz, it might still encounter trouble elsewhere. This week, the AfD has faced calls by some of its political opponents for the party to be put under domestic surveillance for its links to radical groups. Although such surveillance has been imposed on two of AfD’s youth groups over concerns of right-wing extremism, calls to impose surveillance on the entire party have been rejected by Interior Minister Hoorst Seehofer, who cited insufficient grounds for such a move.
  • Though the AfD has attempted to distance itself from groups like Pegida in the past, some within the party have called for making common cause with them in order to mobilize more supporters. In Chemnitz, Dirusus said, “it seems the radical wing of the AfD won out.” Indeed, one of AfD’s lawmakers, Björn Höcke, was pictured last week marching alongside Pegida founder Lutz Bachmann.
  • what happened in Chemnitz was largely unprecedented—and not just because of the scale of the riots. “What is interesting about this is you obviously had a mix of people on the far-right side,” Marcel Dirsus, a political scientist at the University of Kiel, told me, noting the confluence of AfD supporters with more extreme groups such as the far-right, anti-Islam nationalist movement Pegida.
  • ...1 more annotation...
  • Germans did appear to answer that call Monday night, with counter-demonstrators drawing an estimated 65,000 attendees to a unity concert, in contrast to the estimated 8,000 who attended the far-right rallies.
1 - 20 of 289 Next › Last »
Showing 20 items per page