petej + nsa   385

How social media took us from Tahrir Square to Donald Trump - MIT Technology Review
Rather, the problem is that when we encounter opposing views in the age and context of social media, it’s not like reading them in a newspaper while sitting alone. It’s like hearing them from the opposing team while sitting with our fellow fans in a football stadium. Online, we’re connected with our communities, and we seek approval from our like-minded peers. We bond with our team by yelling at the fans of the other one. In sociology terms, we strengthen our feeling of “in-group” belonging by increasing our distance from and tension with the “out-group”—us versus them. Our cognitive universe isn’t an echo chamber, but our social one is. This is why the various projects for fact-checking claims in the news, while valuable, don’t convince people. Belonging is stronger than facts.
socialMedia  politics  activism  communication  ArabSpring  Egypt  TahrirSquare  Tunisia  Syria  Iran  Twitter  MubarakHosni  authoritarianism  power  control  ObamaBarack  targeting  technoUtopianism  bigData  misinformation  polarisation  NSA  security  Facebook  Google  monopolies  YouTube  algorithms  attention  insults  TrumpDonald  USA  Russia  trolling  interference  corruption  accountability  filterBubble  surveillance  platforms  personalData  inequality  precarity  insecurity  dctagged  dc:creator=TufekciZeynep  recommendations 
august 2018 by petej
The need for urgent collective action to keep people safe online: Lessons from last week’s cyberattack - Microsoft on the Issues
Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action.

The governments of the world should treat this attack as a wake-up call. They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world. We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits. This is one reason we called in February for a new “Digital Geneva Convention” to govern these issues, including a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them.
WannaCry  malware  ransomware  security  Microsoft  vulnerability  NSA  CIA  state  government  intelligence  responsibility 
may 2017 by petej
The Leviathan of Silicon Valley
"There are hundreds of startups in Berlin — some of them are nonprofit groups — that are trying to fight surveillance with cool apps. To me, fighting what I perceive to be the cutting edge of neoliberal capitalism with an app is probably as stupid as fighting the European Central Bank and austerity measures with an app; it requires a very different approach. It requires a political campaign, it requires a political force on the ground, it requires social movements and proper analytical and economic analysis of the forces that have produced the problem that you’re trying to solve — in this case the problem of privacy.

Unfortunately, we in Europe, for the most part, have been completely caught up in this simplistic mindset, whereby we either opt for new legal solutions, or we encourage entrepreneurs to build apps that will deliver privacy."
SiliconValley  informationTechnology  monopolies  neoliberalism  Google  SchmidtEric  data  personalData  control  surveillance  NSA  policing  privatisation  infrastructure  SnowdenEdward  commodification  financialisation  dctagged  dc:creator=MorozovEvgeny 
january 2016 by petej
Big Data, No Thanks | booktwo.org
"The two chambers represent an encounter with two annihilations – one of the body, and one of the mind, but both of the self. We’ve built modern civilisation on the dialectic that more information leads to better decisions, but our engineering has caught up with our philosophy. The novelist and activist Arundhati Roy, writing on the occasion of the detonation of India’s first nuclear bomb, called it “The End of Imagination” – and again, this revelation is literalised by our information technologies. We have to figure out a new way of living with in the light of the technologies we’ve built for ourselves. But then, we’ve been trying to do that for a while."
nuclearWeapons  CND  civilDisobedience  directAction  computing  technology  SnowdenEdward  surveillance  NSA  data  personalData  bigData  AshleyMadison  leaks  security 
november 2015 by petej
These Are the Emails Snowden Sent to First Introduce His Epic NSA Leaks | WIRED
"My personal desire is that you paint the target directly on my back. No one, not even my most trusted confidant, is aware of my intentions and it would not be fair for them to fall under suspicion for my actions. You may be the only one who can prevent that, and that is by immediately nailing me to the cross rather than trying to protect me as a source."
SnowdenEdward  NSA  whistleblower  whistleblowing  surveillance  communication  privacy  film  Citizenfour  PoitrasLaura 
october 2014 by petej
« earlier      
per page:    204080120160

related tags

30c3  academia  accountability  ACLU  activism  Afghanistan  aircraft  airport  al-Qaeda  algorithm  algorithms  AmashJustin  Amazon  amnesty  analysis  analytics  AngryBirds  animation  anonymity  Anonymous  anxiety  AOL  AppelbaumJacob  Apple  apps  ArabSpring  archives  ArendtHannah  armsTrade  artificialIntelligence  AshleyMadison  AssangeJulian  assassination  asylum  atomicBomb  attention  authoritarianism  authors  automation  autonomy  backdoor  banalityOfEvil  BBC  behaviour  Berlin  Berners-LeeTim  BernsteinWalter  bigData  Bing  BinneyWilliam  biometrics  BlackhurstChris  blackout  Bolivia  Brazil  BT  Bullrun  bullying  bureaucracy  BushGeorgeW  business  businessModels  CableVince  cameras  CameronDavid  camouflage  capitalism  CarneyJay  cartoon  celebrities  censorship  change  CheneyDick  China  CIA  Citizenfour  civilDisobedience  civilLiberties  ClapperJames  CleggNick  closure  cloudComputing  CND  ColdWar  commodification  communcation  communication  CommunicationsDataBill  community  complacency  computers  computing  CondeNast  conference  Congress  consent  consumerism  context  control  cookies  copyright  corruption  credibility  crime  criminalisation  cryptography  culturalHeritage  culture  cyberwar  D-notice  DailyMail  data  dataMining  dataProtection  dc:contributor=GreenwaldGlenn  dc:contributor=MorozovEvgeny  dc:contributor=PoitrasLaura  dc:contributor=SchneierBruce  dc:contributor=SnowdenEdward  dc:creator=AshTimothyGarton  dc:creator=BrinDavid  dc:creator=CarrNicholas  dc:creator=CrawfordKate  dc:creator=DoctorowCory  dc:creator=FreedlandJonathan  dc:creator=GreenwaldGlenn  dc:creator=HarkawayNick  dc:creator=HarrisJohn  dc:creator=HaydenMichael  dc:creator=HindDan  dc:creator=HuppertJulian  dc:creator=JenkinsSimon  dc:creator=MacdonaldKen  dc:creator=MadrigalAlexis  dc:creator=MilneSeumas  dc:creator=MoodyGlyn  dc:creator=MorozovEvgeny  dc:creator=NaughtonJohn  dc:creator=RusbridgerAlan  dc:creator=SchneierBruce  dc:creator=ShirkyClay  dc:creator=StrossCharles  dc:creator=SummersEd  dc:creator=TisoGiovanni  dc:creator=TufekciZeynep  dc:creator=ZuboffShoshana  dc:creator=ZuckermanEthan  dctagged  deception  decryption  DefCon  deletion  DemandProgress  democracy  DerSpiegel  detention  DIA  digitalHumanities  diplomacy  directAction  disclosure  Dishfire  documentary  Domscheit-BergAnke  DrakeThomas  DRIP  drones  DuckDuckGo  E14N  EastGermany  ECJ  Ecuador  Edgehill  editorial  education  EFF  Egypt  election  EllsbergDaniel  email  embassies  encryption  encyption  espionage  ethics  EU  Europe  exile  extradition  extremism  Facebook  facialRecognition  FBI  fear  FeinsteinDianne  film  filterBubble  filtering  financialisation  FISA  FiveEyes  FOAF  forensics  FoucaultMichel  FOXACID  FoxNews  France  freedom  FreedomAct  freedomOfSpeech  funding  gamergate  games  GatesBill  GCHQ  Gemalto  gender  Germany  Gezi  Glimmerglass  globalisation  Google  GoogleGlass  government  Gramsci  GramsciAntonio  graphs  GreenwaldGlenn  Guardian  hackers  hackgate  hacking  HagueWilliam  harassment  HaydenMichael  Heathrow  HeymannStephen  Hiroshima  history  HolderEric  HomelandSecurity  honesty  HongKong  HTTPS  humanRights  HumanRightsWatch  humour  HuntJeremy  hypocrisy  identity  ideology  images  Independent  India  indifference  inequality  inferencing  information  informationTechnology  infrastructure  INSCOM  insecurity  insults  intelligence  interference  Internet  InternetOfThings  interview  intimidation  intrusion  IPT  Iran  ISP  Istanbul  Japan  journalism  journals  JoyceJames  JSTOR  K-Hole  KarpAlex  KGB  language  Lavabit  leaks  legal  legaly  legibility  libertarianism  lifelogging  LinkedIn  literature  LockheedMartin  logging  logo  LRB  maintenance  malware  ManningBradley  ManningChelsea  maps  Marina  marketing  MayerMarissa  McCarthy  media  memory  MerkelAngela  metadata  MI5  MI6  Microsoft  militarisation  military  MirandaDavid  misinformation  MIT  mobilePhones  modems  monitoring  monopolies  morality  Moscow  MubarakHosni  MurdochRupert  MUSCULAR  MySpace  Nagasaki  nanotechnology  NATO  neoliberalism  network  networking  networks  news  Newsnight  NewsOfTheWorld  newspapers  Nicaragua  NIST  normcore  NortonQuinn  NotW  NSA  nuclearWeapons  NYT  ObamaBarack  obfuscation  oil  openAccess  opendata  OpenSSL  operatingSystems  OrtizCarmen  PACER  Pakistan  Palantir  Paltalk  Panopticon  Parliament  Pentagon  personalData  PGP  phone  phonehacking  photographs  PKI  platforms  PoitrasLaura  polarisation  policing  policy  politics  pornography  power  precarity  prediction  presentation  press  printing  PRISM  privacy  private  privatisation  prize  profiling  propaganda  protest  public  publicDomain  publishing  pump.io  PutinVladimir  Quantum  ranking  ransomware  Raytheon  recommendations  Reddit  regulation  rendition  report  representation  reputation  research  responsibility  retention  review  RigbyLee  RIPA  risk  robots  routers  RSA  RSS  RusbridgerAlan  Russia  scale  SchmidtEric  scholarlyCommunication  ScottJames  search  SecondLife  secrecy  security  selectCommittee  selfies  semanticWeb  Sigint  Signal  SiliconValley  simCards  SimonDavid  SKYNET  Skype  slides  smears  SMS  snoopersCharter  SnowdenEdward  socialGraph  socialMedia  socialNetworking  society  software  SOPA  SovietUnion  Spain  SpicerSean  SqueakyDolphin  SSL  standards  Stanford  startups  Stasi  state  stateOfException  statistics  storage  storytelling  surveillance  surveillanceCapitalism  sustainability  SwartzAaron  SXSW  Syria  sysadmins  TahrirSquare  Tails  TAO  targeting  technology  technoUtopianism  TED  telephone  television  Tempora  terminology  terrorism  theft  TheIntercept  TheMatrix  ThielPeter  threats  Tor  tracking  transparency  treason  trolling  TrumpDonald  trust  Tunisia  Twitter  UAV  UK  universities  USA  USSR  Vatican  Venezuela  Verizon  video  virtualWorlds  visualisation  vocabulary  Vodafone  Vogue  VPN  vulnerability  WannaCry  war  WarkKirsty  warOnTerror  WashingtonPost  weapons  wearables  Web  WhatsApp  whistleblower  whistleblowing  wikileaks  wikipedia  wikipediaPage  Windows  WindowsXP  WinnerReality  wiretapping  women  WorldOfWarcraft  WorldWarII  writers  wtf  WydenRon  XKeyscore  Yahoo  YeltsinBoris  youth  YouTube  ZuckerbergMark 

Copy this bookmark:



description:


tags: