Police surveillance: threat scores
The Washington Post examines the use of "threat scores" generated by billions of data points crunched by Intrado's Beware software by local police. One of the earliest adopters: Fresno, California, which regards it as poviding safety for its officers. Intrado claims the software's workings are trade secrets.
sccoring  police  lawenforcement  tradesecrets 
25 days ago
The facts on China's social credit systems
This piece analyzes the inner workings of Sesame credit.
China  scoring 
25 days ago
Meet "Sledgehammer Shannon", the lawyer who is Uber's worst nightmare
Mother Jones outlines the career of Boston labor lawyer Lisa Shannon. Among her successes is blocking restaurants from skimming waitstaff's tips. She is now behind several class action suits to get "sharing economy" companies to class their workers as employees, not "contractors".
sharingeconomy  uber  law 
5 weeks ago
The Fare Game
In this comic, Al Jazeera considers the implications of services like Uber that live and die by mutual ratings - and the consequences for trust and privacy. Not so much the sharing economy as the rating economy.
uber  sharingeconomy  reputation 
5 weeks ago
Internet Freedom Is Actively Dissolving in America
At Vice, Jason Koebler argues that internet freedom depends on access - and that access in the US is losing ground as poorer people, facing tough financial choices, drop their broadband in favor of mobile data.
access  usa 
5 weeks ago
Techno-skeptics' objection growing louder
The Washington Post's Joel Achenbach writes about the November 2015 NYC event to take back/reinvent the Net. Features docuumentary filmmaker Astra Taylor, Jaron Lanier, Robert Atkinson.
takebackthenet  privacy  technoskepticism 
5 weeks ago
Vinyl makes more money for UK music labels than YouTube
At Ars Technica, Mark Walton reports from the Music Futures conference that BPI claimss that its revenues from sales of vinyl - £12.1 million in 2013 - were worth more than YouTube's 14 billion streams. Google does not break out regional labels, but claims it has paid more than $3 billion to music labels to date and the number continues to grow. The article includes a note that IFPI is suing Soundcloud for unpaid royalties.
music  copyright  streaming  google  bpi 
11 weeks ago
Ads that use inaudible sound to link devices
At Ars Technica, Dan Goodin writes that several companies supply technology that allows TV ads and ads displayed in computer browsers to play an inaudible (to humans) sound that enables cross-device tracking of individuals. Consumers use up to five devices a day, and these were unlinked siloes of data - until now.
adtech  advertising  privacy 
11 weeks ago
Copyright and Anne Frank's diary
At Torrentfreak, Rick Falkvinge angrily reports that the foundation that owns the copyright to Anne Frank's diary is actively seeking to prevent its entry into the public domain (Anne Frank died in 1945) by newly claimimng her father, Otto Frank, is not its editor, as previously styled, but its co-author, which would keep the work in copyright until 2050. It's well known that Otto Frank expurgated many passages; it's only in recent years that the public has seen the full text of what she wrote. BoingBoing (http://boingboing.net/2015/11/14/copyfraud-anne-frank-foundati.html) calls it "copyfraud".
copyright  publicdomain 
11 weeks ago
What we know about the computer formulas making decisions in your life
Pro Publica studies what happens when big data is bad data and algorithms can't tell the difference. In a previous article (linked) it also reports on a study of Uber's dynamic pricing.
algorithmicliving  bigdata 
november 2015
Convicted by Code
At Slate, Rebecca Wexler discusses the issues surrounding proprietary code that makes decisions with deep impact on our lives, including one case where a defendant accused of a 1977 "cold case" murder based solely on DNA evidence interpreted by a proprietary program, was denied the right to inspect the source code by the manufacturer.
opensource  socialjustice  internetofthings 
october 2015
Internet Advertising Bureau launches "LEAN" advertising
IAB comes to grips with how much online ads have alienated consumers. Can they come up with ads that are a better user experience?
advertising  adtech 
october 2015
MOOCs haven't lived up to the hype
Phys.org looks at the failure of MOOCs to reach successfully beyond the demographic of males from industrialized countries. Completion rates remain low, and professors express their frustration at watching students fail in the absence of systems to provide support to those coming from poorer educational backgrounds.
bigdata  education  moocs 
october 2015
Drone makers cautious about Obama plans for registration
Debates about registering commercial and domestic drones have begun, as this Bloomberg piece discusses. Opponents argue that registration is unworkable because of the myriad devices that can be built from readily available parts and their constantly changing nature.
october 2015
Inside Corporate America's Campaign to Ditch Worker's Compensation
Pro Publica reports on Texas lawyer Bill Minick's bright idea to allow large companies to opt out of state laws intended to ensure support for injured workers. Texas has already passed such a law; South Carolina and Tennessee are considering it, and companies such as Wal-Mart, Nordstrom, and Lowe's are campaigning to extend the idea to a dozen other states.
socialjustice  corpUSA 
october 2015
Inside China's plan to give every citizen a character score
New Scientist reports on China's new big data scoring system, which includes everything from points on your driver's license to what you buy. James Seng provides some additional background at http://james.seng.sg/2015/10/11/what-is-chinas-citizen-scores/.
bigdata  scoring  china 
october 2015
The porn business isn't anything like you think it is
At Wired, Cade Metz explains life in the modern online porn industry: thin margins with audiences eaten away by social media and mobile, and losing access to cutting-edge technology. All our ideas about its wealth and audience size are outdated.
porn  socialnetworks  mobile 
october 2015
IBM Watson's perfect data and goodbye, privacy
Computerworld discusses the capabilities of IBM Watson, released to developers in a broad array of applications.
ibm  bigdata  watson 
october 2015
Mapping the spread of Tor
This article shows how widespread and global the Tor network has become. Leading the world with the biggest number of nodes is Germany, with the US a close second.
privacy  anonymity  tor 
october 2015
Stop Googling, Let's Talk
Sherry Turkle discusses the ways phones and always-on are causing a generation to fail to acquire the ability to talk to one another.
turkle  mobile  psychology  virtualcommunities 
october 2015
Facebook blocks ads for articles about marijuana legislation
An editor at The Atlantic tells the story of trying to use a paid ad campaign to promote and article about a cannabis derivative that gives no high and helps children with severe epilepsy. Facebook blocked the campaign on the basis that the product was illegal. (The product in fact is the article, not the oil, but never mind.)
censorship  facebook 
october 2015
Zurich Insurance: cyber costs threaten to overwhelm cyber benefits
The rising cost of cyber security and data breaches...well, like the headline says.
security  cba 
september 2015
Why the Internet of Things favours dominance
Maria Farrell argues that we are not opting into the Internet of Things; it's being forced on us, turning us from citizens to pools of data for harvesting.
privacy  internetofthings  balanceofpower 
september 2015
The surprising predictability of Android lock patterns
Just as humans overwhelmingly flock to a few obvious passwords, they also tend to choose the same lock patterns on their smartphones. Not surprisingly, really: the grid is small, and many human fingers aren't.
security  passwords 
august 2015
Australian academics challenge "web of avarice" in scientific publishing
The Guardian reports on a group of Australian academics' efforts to challenge the dominance of a few publishers over scientific publishing that sees institutions paying as much as $19,000 (Elsevier) to $21,000 (Springer) for a single journal subscription.
openaccess  sciencepublishing 
august 2015
Inside Amazon
This NY Times story takes a hard look at Amazon's bruising employment practices. While other tech companies hand out family leave, free food and gym access, and work/life balance, Amazon favors tough employment.
Amazon  labor 
august 2015
We'll see you, anon
The Economist looks at privacy issues with respect to big data and cites Cynthia Dwork's work at Microsoft on differential privacy - techniques for protecting privacy while retaining the data's usefulness.
privacy  bigdata 
august 2015
Gang of Transnational Crime Organizations Roll Out Own Encrypted Communication System
Marcy Wheeler writes about Symphony, a system of communications tools for the financial services sector that "prevent government spying" and have "no backdoors".
banks  finance  surveillance  organizedcrime 
august 2015
Trade dispute about Dental Devices Could End up Changing the Future of the Entire Internet
In the process of stopping ClearCorrect from infringing on patents held by InvisAlign, both makers of clear braces, the International Trade Commission has ruled importing digital files is illegal. This is the first time the agency has taken action against virtual, rather than physical action. The Court of Appeals in Washington, DC will hear arguments on August 11. Briefs have been filed by the Internet Association, EFF, and Public Knowledge.
copyright  patent  intellectualproperty  dentistry 
august 2015
Websites: please stop blocking password managers
This Wired article asks a number of major companies why they block password managers, which help users create and manage strong passwords instead of weak ones, and gets a range of answers.
security  passwords 
july 2015
Why the Internet of Things encourages dominance
In this Guardian article, Julia Powles and Jat Singh argue that the complexity of IoT systems will of necessity reinforce hierarchies and centralized dominance.
internetofthings  centralization 
july 2015
The world's first hack: the telegraph and the invention of privacy
In the Guardian, Thomas McMullan follows in Tom Standage's footsteps and invokes the telegraph as prior art, recounting the capture of murderer John Tawell, Nevil Maskelyne's hack of Marconi's demonstration (recounted by Paul Marks in New Scientist in 2011), and the use of codes and ciphers to protect text.
telegraph  hacking 
july 2015
When algorithms discrminate
In the NY Times, Claire Cain Miller examines the widely held belief that algorithms are neutral, reviewing research from CMU (that showed that men were more frequently shown ads for high-paying executive jobs than women). Deirdre Mulligan suggests what coded discrimination is tolerated in such cases is a matter of public policy.
advertising  CMU  google  algorithmicliving  bigdata  discrimination  Mulligan 
july 2015
The case of the amazing gay-marriage data
Science of Us reports on the efforts of graduate student David Broockman to stand up - and eventually expose fraud in - a study that appeared to show that personal canvassing works to change hearts and minds about gay marriage when the canvasser themselves is gay.
science  sciencefraud 
june 2015
There's an Uber for everything now
While Uber faces regulatory issues in various locations, the Wall Street Journal reports that in San Francisco, at least temporarily, there's a service for almost everything - many of them more useful than it might first appear.
apps  sharingeconomy 
may 2015
Screen time versus play time: what tech leaders won't let their own kids do
The Guardian interviews a number of tech leaders to find out how they approach technology with their kids. Many favor Waldorf schools (which limit screen time) and other techniques to let their kids explore the physical world rather than the virtual world.
education  children 
may 2015
Tiny updates to tech can present obstacles for disabled people
Paul Kotler, who struggles with autism and apraxia, writes in Wired about the opportunities and challenges tech presents. Both are largely by-products of mass market design.
access  disabilities 
may 2015
EFF's 404 Report on copyright
EFF examines the 2014 report of the US Trade Representative under S301 - the one under which USTR dubs nations like Canada "rogue nations" for not enacting the copyright laws the US wants. EFF counters with short case studies from myriad countries about the chilling effects of copyright extremism.
EFF  copyright  UStrade 
may 2015
FBI admits flaws in hair analysis over decades
The Washington Post reports that the FBI has been systematically offering "flawed testimony" in cases featuring hair analysis that favored prosecutors for decades.
fbi  forensics  judicialabuse 
may 2015
Bitcoin is disrupting the Argentine economy
The impact of bitcoin is best seen in places where financial services don't work as well as they do in most of the UK/EU/US. Nicholas Popper examines one such case: Argentina.
bitcoin  money  argentina 
may 2015
Can the Internet Be Saved without Harming Democracy?
29 policy influencers publish a report arguing for the protection and promotion of human rights online. They include Michael Chertoff (first director of the Department of Homeland Security) and David Omand (former director of GCHQ).
internetgovernance  gchq 
april 2015
The Cyber-Threat of Things
My piece at Infosecurity Magazine on the coming security threats posed by the internet of Things as cyberspace invades the physical world.
security  internetofthings  wg 
april 2015
Network Analysis of Third-Party Tracking
This research from Microsoft shows that 99.5% of users (across the world) are captured by the ad tracking networks within 30 clicks.
advertising  tracking 
march 2015
The Cost of Paying Attention
Matthew B. Crawford comments on the privatization of public space and the loss of silence as a resource: in modern airports and elsewhere advertising is creeping into everything from the bins at security to the walls of the London tube (at least there the video is silent; in Rome it includes audio). Silence in such places is increasingly a luxury only the wealthy can afford (for example, by paying admission to airline clubs).
privacy  peace  silence  nytimes 
march 2015
How One Stupid Tweet Ruined Justice Sacco's Life
Jon Ronson writes about interviewing the victims of global public shaming, mostly via Twitter. For most, the experience has been severely traumatic, and recovery very slow. (From conversations I've had with people who've also been through this mill, it can indeed be very scarring.)
publicshaming  twitter  nytimes 
march 2015
Secret History of Silicon Valley
By Steve Blank.
The Secret History of Silicon Valley – Backstory
• Part 1: The Vietnam War
• Part 2: B-52’s and the Soviet Air Defense System
• Part 3: Bill Perry/ESL and the Cold War
• Part 4: Undisclosed Locations
• Part 5: Silicon Valley, the 2nd 100 years
• Part 6: Stanford, Terman and WWII
• Part 7: Stanford, Terman and the Cold War
• Part 8: Stanford and the rise of Cold War Entrepreneurship
• Part 9: Stanford and Electronic Intelligence
• Part 10: Stanford and Weapons Systems
• Part 11: The Rise of Venture Capital
• Part 12: The First Valley IPO’s
• Part 13: Startups with Nuclear Missiles
• Part 14: Spy Satellites in Silicon Valley
• Part 15: Lockheed – Silicon Valley largest employer
• Part 16: Balloon Wars
siliconvalley  history 
february 2015
It's the labels, not Spotify, that are screwing over artists
Pando analyzes streaming revenues to show that while streaming services are often blamed for the small amounts of money they pay artists the reason is that 73% of those revenues go to the labels. The article also says music industry revenues has halved since 2000.
musicbusiness  music  copyright 
february 2015
Inadevertent algorithmic cruelty
In this blog posting - and be sure to read both the comments and the <a href="http://meyerweb.com/eric/thoughts/2014/12/27/well-that-escalated-quickly/">follow-up</a> - Meyerweb considers the social theoughtlessness of (social media) algorithms such as the one that assumed they would like to see a summary of their year, which included, prominently pictured, their dead child.
algorithmicliving  facebook 
december 2014
The Fall of the Banner Ad
Farhad Manjoo in the NY Times writes about the rise and now - finally - decline of the ubiquitous banner ad, now being replaced by native ads that load quicker and clutter less.
advertising  media 
november 2014
The decade-long quest to stop Spamford Wallace
The story of trying to bring the notorious 1990s spammer, Sanford Wallace, to justice (arstechnica).
november 2014
Frank Tirole and "Platform Competition in Two-Sided Markets"
Vox discusses Tirole's Nobel prize and his 2002 paper, which does much to explain the "free" service model that drives Google, Facebook, and so many other Internet businesses.
economics  privacy  google  Facebook  dataprotection 
november 2014
The Dark Market for Personal Data
UMD prof Frank Pasquale, writing in the New York Times, advocates a change in the law to regulate the US's estimated 4,000 data brokers, whose services animate all sorts of secret - and often unfair - decisions about all aspects of individuals' lives. A prelude to the release of his "The Black Box Society".
scoring  dataprotection  privacy 
november 2014
Australia's metadata grab
PI's Carly Nyst, writing in the Guardian, discusses Australia's adoption of data retention.
dataretention  surveillance  australia 
november 2014
Be grateful for drizzle (the risks of high-frequency trading)
This piece from the LRB discusses the speed with which the entire market can disappear due to high-frequency trading. Of particular interest is the fact that the company for which a former trader worked had been running automated checks to eliminate bugs such as the sign error that set off an exponential series of trades that, stopped 20 second later than it was, would have bankrupted the firm (and then the clearing house and the market). The firm had stopped running the checks because the company losing the speed race.
automation  risks  finance 
november 2014
Delusions of Big Data and Other Huge Engineering Efforts
UC Berkeley prof Michael Jordan discusses the limitations of machine learning with Lee Gomes.
november 2014
EFF Surveillance Self-Defense Guide
The EFF has updated its guide to privacy and security for Internet users.
privacy  security  eff  surveillance 
november 2014
Google's Right to be Forgotten meeting 2014-10-17
Video of the 4+ hour meeting of the Google Advisory Council in London on the right to be forgotten.
google  dataprotection  righttobeforgotten 
november 2014
Why Google's Self-Driving Car May Never Happen
Lee Gomes, who has written about the Google cars for Slate, discusses all the things that Google's cars currently cannot do: find potholes, respond to ad hoc changes in traffic signals and road layouts, and travel unfamiliar landscapes, which means all but a few thousand miles of the US. The cars rely heavily in inch-perfect maps, which are expensive to collect and even more so to keep up to date.
google  robots  ai 
october 2014
Why kids sext
The Atlantic studies a case of mass uploads of teen sexts and discovers that sexting has become part of the ordinary teen experience. Discusses when and how the law should be involved.
teens  sex  lawenforcement 
october 2014
The complete Feynman lectures on physics
Terrific resource for learning the subject.
physics  education 
august 2014
Not a Tea Party - A Confederate Party
An interesting take on the current state of US politics, which sees the present situation as a reflection of confederate victory in the Civil War. Not the way most people see it, but he argues that we're wrong.
uspolitics  teaparty 
august 2014
Sherlock Holmes: not too "complex" for the public domain
A US 7th Circuit Court judge has ruled against the Doyle estate's argument that because new information about Sherlock Holmes continued to appear in the later stories the earlier stories are still copyrighted, thereby demanding licensing fees from an author compiling a set of modern pastiches by various authors.
copyright  greatdetectives 
june 2014
CFP2014: Debate on the right to be forgotten
Debate features Judith Rauhofer, with possibly the clearest explanation of the ECJ's decision in Google vs Spain you will ever see, Mike Godwin (Internews), and Emma Llanso (CDT).
privacy  freespeech  dataprotection  google 
june 2014
Ghostwriting for Julian Assange - Andrew O'Hagan's account
This is Andrew O'Hagan's lengthy and detailed story of what went wrong in the efforts to produce what eventually was published by Canongate as Julian Assange's "unauthorized autobiography".
Wikileaks  JulianAssange 
february 2014
Fanboys: Have you ever loved something so much it hurt?
Fascinating article examining the pathology and behavior of people who get so obsessed with a particular (smart phone) vendor that they attack anyone who disagrees even a little bit. These are the modern successors to the folks we used to call "Amigoids".
obsession  Google  Apple 
january 2014
Did refrigerators form a spam-sending botnet? Possibly not
At Ars Technica, Dan Goodin picks apart the technical details in the report that 100,000 smart refrigerators have been hacked to form a botnet to send spam. Yes, it *could* happen and security researchers are already warning about the Internet of Things - but *did* it happen?
internetofthings  security  smartliving 
january 2014
Are the technoriche really ruining San Francisco?
This interview with Rebecca Solnit brings her previous essay on the topic up to date. She compares Google's choice to run luxury buses for its employees rather than push and contribute funds to better public transportation to the effect of bottled water on a city with pollution in the public water supply. San Frncisco, the city where many worked just enough to fund idealistic activism, is becoming a bedroom community for (mostly) young (mostly) men with little investment in the city itself, like a company town. For prior art, see also Paulina Borsook's Mother Jones essay (later book) Cyberselfish.
google  socialjustice  siliconvalley 
january 2014
Analysis of the data retention directive opinion
This blog posting from Freedom to Tinker has a helpful analysis of the data retention directive judgment and its compatibility with human rights - and it also has a helpful analysis of EU vs US privacy law and misconceptions.
privacy  dataretention  ecthr 
december 2013
Wikipedia's lamest edit wars
As seen on Slashdot. Many don't seem entirely lame: they tackle questions of classification and principle that librarians have probably wrestled with since time immemorial. Might have made sense to adopt the librarians' solutions, though.
december 2013
Watching a bitcoin heist in real time
Internet users chase the thief of 96,000 bitcoins.
december 2013
A robot walks into a bar...
A profile of Data, the robot comedian. Can robots be funny?
december 2013
The Big Data Brain Drain: Why Science Is in Trouble
Argues that the skills scientific research needs are increasingly the same ones that succeed in industry and proposes some ways that academia needs to change to keep up.
bigdata  science  research 
october 2013
eLifeSciences annual report
One year of open access after its founding, eLife Sciences reports.
october 2013
Privacy fears grow as cities increase surveillance
The New York Times reports on surveillance systems originally deployed for anti-terrorism that are being used for increased surveillance.
privacy  surveillance  functioncreep 
october 2013
Somebody stole 7 milliseconds from the Federal Reserve
Mother Jones covers the story that in the 7ms it took the Fed's news that it would not be tapering its bond-buying program to get out, huge orders were placed. Two problems: 1) the leak of information enabling someone to game the markets; 2) the way high-speed automated trading now dominates and distorts the markets.
finance  security  equalopportunity 
september 2013
Scary search engine finds baby monitors, webcams, power plants...
The search engine Shodan finds Internet-connected devices that can then be taken over and controlled. As the Internet of Things gets deployed, this sort of thing will be a major concern.
securty  surveillance  search 
september 2013
Streaming music: how much are artists paid?
This article looks at the royalties artists are paid for streaming music, based on data Zoe Keating has published on her blog detailing what she's been paid by the various services. Keating would like to see the services provide artists with their raw listener data - as she says, everyone is entitled to that *except* the artists on whose work these services are built. I would agree: instead of recreating the music business in the image of the past, we have the chance to give artists much better understanding of their audiences and doing so should be a standard element of the T&Cs under which the services are allowed to use artists' music.
music  streaming  copyright  musicbusiness 
august 2013
Ideas to get women involved in tech sector
The Guardian considers the reasons for decreasing numbers of women in technology. Meanwhile, at Consulting Adult - http://consultingadultblog.blogspot.co.uk/2010/01/life-in-boys-dorm-my-career-at-sun.html - Nancy Householder Hauge reminisces about the various manifestations of sexism she encountered in her early days at Sun.
women  sexualharassment 
august 2013
Russia's response to Snowden leaks: control the Net
The New York Times reports that Snowden's revelations about the NSA have given Russia new impetus to pursue control over the Internet via the ITU.
Russia  nsa  internetgovernance  ITU 
july 2013
« earlier      
access adtech advertising africa ai algorithmicliving amazon anonymity apple apps argentina australia automation badideas balanceofpower banks bigdata bitcoin borders bpi canada cba censorship centralization children china cmu copyright corpusa crypto cyberattacks dataprotection dataretention dcpolitics dentistry digitaldivide disabilities discrimination dmca dns drones dwaynehendricks economics ecthr education eff equalopportunity facebook fbi finance forensics freespeech functioncreep funding gchq google greatdetectives hacking health history ibm icann identityfraud infrastructure intellectualproperty internetgovernance internethistory internetofthings itu judicialabuse julianassange kurzweil labor law lawenforcement media mobile money moocs mulligan music musicbusiness newthreats nsa nytimes obsession openaccess opensource organizedcrime orphanworks passwords patent peace photography physics piracy police porn privacy psychology publicdomain publicshaming radio reputation research righttobeforgotten risks robots russia sccoring science sciencefraud sciencepublishing scoring search security securty self-quantified sex sexualharassment sharingeconomy silence siliconvalley smartliving socialjustice socialnetworks software spain spam streaming surveillance takebackthenet teaparty technoskepticism teens telegraph tools tor tracking tradesecrets turkle twitter uavs uber usa uspolitics ustrade virtualcommunities watson wearablecomputing werobot wg wikileaks wikipedia women

Copy this bookmark: