Tag Archives: Bill of Rights

Why You Should Embrace Surveillance, Not Fight It


By Kevin Kelly – The internet is a tracking machine. It is engineered to track. We will ceaselessly self-track and be tracked by the greater network, corporations, and governments. Everything that can be measured is already tracked, and all that was previously unmeasureable is becoming quantified, digitized, and trackable.

We’re expanding the data sphere to sci-fi levels and there’s no stopping it. Too many of the benefits we covet derive from it. So our central choice now is whether this surveillance is a secret, one-way panopticon — or a mutual, transparent kind of “coveillance” that involves watching the watchers.

The first option is hell, the second redeemable. more> http://tinyurl.com/nty5w3v

Related>

How the NSA Made Your Legal Defense Illegal


By Ben O’Neill – In order for a plaintiff to challenge the constitutionality of the NSA’s illegal surveillance programs, the person first had to prove having been subjected to surveillance, in order to show that they have “standing” to bring the case.

But of course, the very nature of the program is that it is kept secret, and all evidence which would prove that the plaintiff lies within the scope of the program is “classified.”

To obtain this evidence, a plaintiff would have to access classified information, which would then lead them to legal dangers of another kind.

Hence, a wonderfully absurd situation has prevailed. more> http://tinyurl.com/mqejxzp

Related>

How international relations theory shapes U.S. cybersecurity doctrine


By Henry Farrell – The fundamental logic of the security dilemma is straightforward.

Imagine two neighboring states, each of which wants peace while not being sure of the other’s intentions. Imagine further that one of the states decides to build up its military (perhaps by increasing its army), solely in order to defend itself if the other state turns out to have malign intentions.

It may well be that the second state looks at the first state’s decision to increase the size of its army, and worries that the first state is beefing up its military so that it can invade. The second state may then decide, too, to build up its army.

This may, in turn alarm the first state, which begins to fear that the second state is indeed intent on invasion, leading the first state to introduce conscription. And this process may go on, …

The world of the Cold War was, for better or worse, partly built on the foundation of political science ideas. The same is true of the emerging world of cybersecurity. more> http://tinyurl.com/kaecx8s

related>

Defeating NSA Surveillance Isn’t the Real Problem


By Max Eddy – The NSA wasn’t operating in a vacuum. Two key changes aided the creation of the massive spying operation we know today.

The first was the cost of search and storage, which Bruce Schneier said had dropped to the point where it was feasible to store and search huge amounts of data.

Second was a philosophical shift in both user behavior and technology companies. “We build systems that spy on people in exchange for services,” said Schneier. “Surveillance is the business model of the Internet.” more> http://tinyurl.com/m2qoqpf

Related>

Spy Chief James Clapper: We Can’t Stop Another Snowden


By Eli Lake – James Clapper also acknowledges that the very human nature of the bureaucracy he controls virtually insures that more mass disclosures are inevitable.

“In the end,” he says, “we will never ever be able to guarantee that there will not be an Edward Snowden or another Chelsea Manning because this is a large enterprise composed of human beings with all their idiosyncrasies.”

Ben Rhodes, deputy national security adviser for strategic communications, concurs: “I do think he recognizes that we are in a new normal after Snowden where we can’t operate with the expectation where nothing will get out.” more> http://tinyurl.com/myp6jx3

Related>

How many criminals have NSA’s phone records busted? Maybe one


By Grant Gross – “Made in the U.S.A. is no longer a badge of honor, but a basis for questioning the integrity and the independence of U.S.-made technology,” Dean Garfield, president and CEO of the Information Technology Industry Council (ITI) told lawmakers. “Many countries are using the NSA’s disclosures as a basis for accelerating their policies around forced localization and protectionism.”

Officials with the Obama administration haven’t accurately described the NSA programs to Congress, said Representative Trent Franks, an Arizona Republican. “We feel that we have been blatantly deceived on what some of these programs have done,” he said. more> http://tinyurl.com/m5txpo3

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built


By Dune Lawrence – Tor provides privacy by separating identity from routing online.

In a normal session online, you’re browsing from your computer or a router that’s assigned its own IP address. Every request you send out carries that address, and information is returned there.

When you use Tor, instead of your chat message, or the URL you type going directly to its destination, it’s routed through Tor’s network of volunteer nodes, moving through at least three of them, before exiting the network and proceeding to the endpoint.

The website that receives it doesn’t know what your IP address is, nor does any point in the Tor circuit except for the entry relay.

For most users, a Tor session does not feel different from going on the Web with the Firefox browser. But all the winding through relays does slow things down. more>http://tinyurl.com/mc3e7e4

Related>