Tag Archives: Bill of Rights

Why You Should Embrace Surveillance, Not Fight It


By Kevin Kelly – The internet is a tracking machine. It is engineered to track. We will ceaselessly self-track and be tracked by the greater network, corporations, and governments. Everything that can be measured is already tracked, and all that was previously unmeasureable is becoming quantified, digitized, and trackable.

We’re expanding the data sphere to sci-fi levels and there’s no stopping it. Too many of the benefits we covet derive from it. So our central choice now is whether this surveillance is a secret, one-way panopticon — or a mutual, transparent kind of “coveillance” that involves watching the watchers.

The first option is hell, the second redeemable. more> http://tinyurl.com/nty5w3v

Related>

How the NSA Made Your Legal Defense Illegal


By Ben O’Neill – In order for a plaintiff to challenge the constitutionality of the NSA’s illegal surveillance programs, the person first had to prove having been subjected to surveillance, in order to show that they have “standing” to bring the case.

But of course, the very nature of the program is that it is kept secret, and all evidence which would prove that the plaintiff lies within the scope of the program is “classified.”

To obtain this evidence, a plaintiff would have to access classified information, which would then lead them to legal dangers of another kind.

Hence, a wonderfully absurd situation has prevailed. more> http://tinyurl.com/mqejxzp

Related>

How international relations theory shapes U.S. cybersecurity doctrine


By Henry Farrell – The fundamental logic of the security dilemma is straightforward.

Imagine two neighboring states, each of which wants peace while not being sure of the other’s intentions. Imagine further that one of the states decides to build up its military (perhaps by increasing its army), solely in order to defend itself if the other state turns out to have malign intentions.

It may well be that the second state looks at the first state’s decision to increase the size of its army, and worries that the first state is beefing up its military so that it can invade. The second state may then decide, too, to build up its army.

This may, in turn alarm the first state, which begins to fear that the second state is indeed intent on invasion, leading the first state to introduce conscription. And this process may go on, …

The world of the Cold War was, for better or worse, partly built on the foundation of political science ideas. The same is true of the emerging world of cybersecurity. more> http://tinyurl.com/kaecx8s

related>

Defeating NSA Surveillance Isn’t the Real Problem


By Max Eddy – The NSA wasn’t operating in a vacuum. Two key changes aided the creation of the massive spying operation we know today.

The first was the cost of search and storage, which Bruce Schneier said had dropped to the point where it was feasible to store and search huge amounts of data.

Second was a philosophical shift in both user behavior and technology companies. “We build systems that spy on people in exchange for services,” said Schneier. “Surveillance is the business model of the Internet.” more> http://tinyurl.com/m2qoqpf

Related>

Spy Chief James Clapper: We Can’t Stop Another Snowden


By Eli Lake – James Clapper also acknowledges that the very human nature of the bureaucracy he controls virtually insures that more mass disclosures are inevitable.

“In the end,” he says, “we will never ever be able to guarantee that there will not be an Edward Snowden or another Chelsea Manning because this is a large enterprise composed of human beings with all their idiosyncrasies.”

Ben Rhodes, deputy national security adviser for strategic communications, concurs: “I do think he recognizes that we are in a new normal after Snowden where we can’t operate with the expectation where nothing will get out.” more> http://tinyurl.com/myp6jx3

Related>