When the Danish prime minister took a ‘selfie’ at Nelson Mandela’s funeral alongside Obama and Cameron, there was a flurry of alarm in the press. Photographic narcissism, commentators suggested, is now everywhere, the constant mediation of the lens is disrupting experience and memory. Photography, unthinkingly and endlessly made and shared, pollutes awareness of the real world and suppresses memory of anything other than the moment when the image is captured.’
‘“Theresa May will also announce that the Conservative manifesto will contain pledges to introduce banning orders for extremist groups and extremism disruption orders for extremists who spread hate but do not break existing laws.” Conservative briefing note.
The home secretary’s manifesto plan to silence extremists by banning their access to the web and television is cast far wider than the Islamist “preachers of hate” of tabloid headlines. As David Cameron pointed out, the Conservatives now want to look at the “full spectrum of extremism” and not just the “hard end” of that spectrum that counter-terrorism policy has focused on up to now.
The difference is spelled out in the detail of the policy, where it says that it is intended to catch not just those who “spread or incite hatred” on grounds of gender, race or religion but also those who undertake “harmful activities” for the “purpose of overthrowing democracy”.’
‘Theresa May, the current UK Home Secretary, has announced that, if re-elected, her party (the Conservatives) will push for “extremist disruption orders” which would effectively ban people declared “extremist” (using a very broad definition) from using social media or appearing on TV.
Extremists will have to get posts on Facebook and Twitter approved in advance by the police under sweeping rules planned by the Conservatives.
They will also be barred from speaking at public events if they represent a threat to “the functioning of democracy”, under the new Extremist Disruption Orders.
The broad definitions here matter. Part of the plan is to make such rules cover a wide variety of groups and individuals, based on what the government “reasonably believes” they may be up to.’
- Extremists to have Facebook and Twitter vetted by anti-terror police
- Theresa May vows Tory government would introduce ‘snooper’s charter’
- Theresa May: British values will prevail over extremists
- A short analysis of the Home Secretary’s speech to the 2014 Conservative Party Conference
- What are Theresa May’s new ‘extremism disruption orders’?
‘In a much-publicized open letter last week, Apple CEO Tim Cook pledged to protect user privacy with improved encryption on iPhones and iPads and a hard line toward government agents. It was a huge and welcome step toward thwarting the surveillance state, but it also seriously oversold Apple’s commitment to privacy.
Yes, Apple launched a tough-talking new privacy site and detailed a big improvement to encryption in its mobile operating system iOS 8: Text messages, photos, contacts, and call history are now encrypted with the user’s passcode, whereas previously they were not. This follows encryption improvements by Apple’s competitors Google and Yahoo.’
‘The British inventor of the World Wide Web warned on Saturday that the freedom of the internet is under threat by governments and corporations interested in controlling the web.
Tim Berners-Lee, a computer scientist who invented the web 25 years ago, called for a bill of rights that would guarantee the independence of the internet and ensure users’ privacy.’
‘To counter prejudice, some followers of Islam have taken to Twitter with a new hashtag: #MuslimApologies.
Muslims this week began apologizing on social media for algebra (named after a book by mathematician Abu Ja’far Muhammad ibn Musa Al-Khwarizmi), shampoo (first brought to England by a Muslim merchant), “amazing architecture,” and other innovations made possible by members of the Islamic faith throughout history. The point? That Muslims, of whom there are about 1.6 billion, shouldn’t be blamed for the heinous crimes of a few.’
Alabama high schools secretly monitoring students’ social media accounts ‘after tip-off from the NSA?
‘A secret surveillance program has been running in an Alabama high schools after a phone call from the National Security Agency alerted the district to a ‘violent threat’. School officials claim the system began monitoring students’ social media accounts in Huntsville City Schools 18 months ago, when the NSA tipped them off that a student was making violent threats on Facebook
The schools began scanning Facebook and other sites for signs of gang activity, watching for photos of guns, photos of gang signs and threats of violence, as part of a program called SAFe, or Students Against Fear. Internal documents explaining the program were obtained by AL.com, showing four different students – three males and one female – posing on Facebook with handguns.’
‘It’s not just the NSA: A Federal Appeals Court has just noted a disturbing and “extraordinary” trend of the Navy conducting mass surveillance on American civilians, and then using what they find to help local law enforcement prosecute criminals.
In this specific case, a Navy Criminal Investigative Service agent in George scanned the computers of every civilian in Washington state who happened to be using the decentralized Gnutella peer-to-peer network, looking for child pornography. The agent, Steve Logan, found child porn on a computer owned by a man named Michael Dreyer.’
‘The FBI director James Comey has expressed concern that Apple and Google are making phones that cannot be searched by the government.
Speaking to reporters in a briefing Thursday, Mr. Comey said he is worried that such phones could place users “beyond the law,” The Wall Street Journal reported. He added that he’s been in talks with the companies “to understand what they’re thinking and why they think it makes sense.”
Major tech companies recognize the marketing potential of selling products that make consumers feel their data is as secure as can be. Both Apple and Google have made recent announcements emphasizing their new products will make it more difficult for law enforcement to extract customers’ valued data.
But Comey’s remarks raise questions of what, exactly, the government wants.’
- FBI Director Raises Concerns About Smartphone-Security Plans
- Chicago Police: ‘Apple Will Become the Phone of Choice for the Pedophile’
- US Supreme Court to police: To search a cell phone, ‘get a warrant’
- Apple to consumers: Trust us, our devices are secure
- ‘Celebgate’ attack leaks nude photos of celebrities
- Heavenly Bodies: Get Off of My iCloud
- Leaks of nude celebrity photos raise concerns about security of the cloud
- German court rules ex-lovers must delete explicit photos of partners after a break-up
‘Chomsky taught two generations how to read the paper of record, how to detect the warps in its stories, the subtle biases and false constructions, the decisive elisions of context, and servility toward elite power. What Chomsky could do not was toteach us how to stop reading the New York Times. As a result, thousands of activists around the globe reach for the Times (or the Guardian or the Washington Post) each morning, with red pens in hand, begin marking it up and grinding the enamel off their teeth.
Being Luddites, Cockburn and I were late-comers to the web. Our journal CounterPunch didn’t go online until the late 1990s, as the sun was going down on the Clinton administration. But it wasn’t long before we realized the web offered an exit from what we called the Chomsky Paradox, an existential dilemma that often keeps the Left mired in a hostile environment fight phantoms—namely, political reality as constructed by the editors of the elite media.’
‘[...] The Bill introduces the concept of a “delayed notification search warrant” — often referred to in the United States as a ‘no-knock warrant’ — which would allow Australian Federal Police to search premises without prior warning and “without having to produce the warrant at the time of entry and search”.
In addition to defining these new search powers, the Counter-Terrorism Bill sets out measures for accessing digital data held by potential terror suspects. Specifically, it stipulates that this may include “data not held at the premises” which can be accessed by police executing a warrant.’
- Parliament ‘bullied’ to pass national security laws, says Greens senator Scott Ludlam
- Proposed Terror Law Would Allow Australia’s Entire Internet To Be Monitored With Just One Warrant
- The Australia Police State: When Torture Might be Allowed Down Under
- Australian PM: ‘Security may come before some freedoms’
- Australia’s Attorney General Says Metadata Collection Won’t Track Your Web Surfing, Just The Web Addresses You Visit (Huh?)
‘Communist Laos has issued a decree outlawing online criticism of policies of the ruling party or government, state media reported, the latest Southeast Asian country to enact strict internet controls. According to legislation approved by Prime Minister Thongsing Thammavong last week, web users will face criminal action for spreading “false” information aimed at discrediting the government, the official KPL news agency said.
[...] The decree comes as cellphone and internet usage climbs in tandem with economic growth, a reduced poverty rate and greater electricity access in the country of 6.4 million people. The new laws bear similarities to those of its Communist neighbor Vietnam, which commands strong influence over Laos and has a near identical political system… Thailand has [also] closed hundreds of thousands of websites and jailed people who have used the internet to post critical comments about its monarchy under its 2007 Computer Crimes Act.’
‘In this month’s issue of Personality and Individual Differences, a study was published that confirms what we all suspected: internet trolls are horrible people.
Let’s start by getting our definitions straight. An internet troll is someone who comes into a discussion and posts comments designed to upset or disrupt the conversation. Often, it seems like there is no real purpose behind their comments except to upset everyone else involved. Trolls will lie, exaggerate, and offend to get a response.
What kind of person would do this? Canadian researchers decided to find out.’
‘A coalition of anti-establishment politicians and internet freedom advocates led by entrepreneur Kim Dotcom – who promised to shake up New Zealand politics – suffered a humiliating defeat at the country’s parliamentary elections.
The Internet-Mana party gained just 26,500 votes – 1.3 percent of the total, and short of the five percent needed to cross the parliament threshold. With half the parliament seats contested through proportional representation, and half in a first-past-the-post local election, the party also lost its only previous locally elected MP, Hone Harawira, who couldn’t hold onto his seat.’
- New Zealand election: party over for Kim Dotcom as PM wins with landslide
- New Zealand election: National party’s John Key claims victory – as it happened
- John Key says Edward Snowden ‘may well be right’ about NSA spying on NZ
- New Zealand denies it was planning mass domestic spying
- Greenwald, Dotcom, Snowden and Assange take on ‘adolescent’ John Key
- Kim Dotcom Accused Of Employment Law Breach (Documentary)
- Kim Dotcom on TPP: Hollywood trying to control web, totally censor it
- Mega Man: Is This Man Really The ‘Internet’s Biggest Pirate’? (Documentary)
‘Russia may remove itself from the global Internet to protect itself against perceived threats from the West, a Kremlin spokesman suggested on Friday. The Kremlin dismissed accusations it aims to isolate the Russian Internet, and insists it is merely concerned with protecting its national security – particularly as relations with the West have reached their lowest since the Cold War.
However, the country has recently passed several laws targeting Internet use, which include making popular bloggers register as media outlets, and forcing websites to store the personal data of Russian users… The moves come as Russia attempts to reduce its use of American technology, fearing that its communications are vulnerable to US spying. Earlier this year, President Vladimir Putin called the web a “CIA special project”.’
- Kremlin: Russia won’t disconnect from global internet, works on cyber security
- Russia to be disconnected from the Internet?
- Russia’s First Blogger Reacts to Putin’s Internet Crackdown
- Putin Says CIA Created the Internet, Cites Foreign Influence at Yandex
- Snowden defends decision to question Vladimir Putin on surveillance
‘Don’t you just hate it when you want to talk about is your latest all-nighter in Ibiza or how Jeeves packed the wrong Rolex for last weekend’s Hamptons excursion, but your Facebook friends are all “Help me, I’m poor!”
Not to worry, Netropolitan is here to save you from having to hob-knob with undesirable 99 percenters. And it will only cost you $9,000 a year. Netropolitan is a new social network that bills itself as “the online country club for people with more money than time.” It launched today and organizers insist that it’s not a joke.’
‘There is no evidence that Edward Snowden’s revelations about NSA spying inspired Islamic terror groups to hide their electronic communications behind more sophisticated encryption software, according to a new analysis that challenges other recent research and assertions by U.S. officials about the impact of the leaks.
The analysis by Flashpoint Global Partners, a private security firm, examined the frequency of releases and updates of encryption software by jihadi groups and mentions of encryption in jihadi social media forums to assess the impact of Snowden’s information. It found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques, which became public beginning June 5, 2013.’
‘Treasure Map is a vast NSA campaign to map the global internet. The program doesn’t just seek to chart data flows in large traffic channels, such as telecommunications cables. Rather, it seeks to identify and locate every single device that is connected to the internet somewhere in the world—every smartphone, tablet, and computer—”anywhere, all the time,” according to NSA documents. Its internal logo depicts a skull superimposed onto a compass, the eyeholes glowing demonic red.
The breathtaking mission is described in a document from the archive of NSA whistleblower Edward Snowden provided to The Intercept and Der Spiegel. Treasure Map’s goal is to create an “interactive map of the global internet” in “almost real time.” Employees of the so-called “Five Eyes” intelligence alliance—England, Canada, Australia, and New Zealand—can install and use the program on their own computers. It evokes a kind of Google Earth for global data traffic, a bird’s eye view of the planet’s digital arteries.’
‘The New Zealand spy agency, the Government Communications Security Bureau (GCSB), worked in 2012 and 2013 to implement a mass metadata surveillance system even as top government officials publicly insisted no such program was being planned and would not be legally permitted.
Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders. Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key, who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”’
‘Most U.S. government subpoenas for data on Dropbox users are accompanied with a request not to inform the user in question. Dropbox legal counsel Bart Volkmer said those gag orders are repelled unless there is a valid court order.
The revelation accompanied the release of the cloud storage service’s Transparency Report, which going forward will be released twice a year. Yesterday’s report covered January to June of this year, a period during which Dropbox received 268 requests for user information from law enforcement agencies. There were zero data request for Dropbox for Business users, the company said.’
‘The US government threatened to fine Yahoo $250,000 a day if it refused to hand over user data to the National Security Agency, according to court documents unsealed on Thursday.
In a blogpost, the company said the 1,500 pages of once-secret documents shine further light on Yahoo’s previously disclosed clash with the NSA over access to its users’ data. The size of the daily fine was set to double every week that Yahoo refused to comply, the documents show.
The papers outline Yahoo’s secret and ultimately unsuccessful legal battle to resist the government’s demands for the tech firm to cooperate with the NSA’s controversial Prism surveillance programme, revealed by whistleblower Edward Snowden last year.’
‘President Obama just announced war (of sorts) in the Middle East — but he’s not going to wait for Congressional authorization to go to war. But that’s not the only area where the president is threatening to make Congress an afterthought.
Last week, the bill’s author, Senate Judiciary Committee Chair Patrick Leahy released a letter from James Clapper and Eric Holder. A number of news outlets incorrectly reported the letter as an unambiguous endorsement of Leahy’s bill.
‘A proposed anti-terrorism law in France has freedom of expression advocates concerned. The bill, as our friends at La Quadrature du Net frame it, “institutes a permanent state of emergency on the Internet,” providing for harsher penalties for incitement or “glorification” of terrorism conducted online. Furthermore, the bill (in Article 9) allows for “the possibility for the administrative authority to require Internet service providers to block access to sites inciting or apologizing for terrorism” without distinguishing criteria or an authority to conduct the blocking.
Apart from specific concerns that the bill treats online speech as distinct from other speech, other provisions are just as problematic.’
‘Next Wednesday, Sept. 10, if your favorite website seems to load slowly, take a closer look: You might be experiencing the Battle for the Net’s “Internet Slowdown,” a global day of grass-roots action. Protesters won’t actually slow the Internet down, but will place on their websites animated “Loading” graphics (which organizers call “the proverbial ‘spinning wheel of death’”) to symbolize what the Internet might soon look like. As that wheel spins, the rules about how the internet works are being redrawn. Large Internet service providers, or ISPs, like Comcast, Time Warner, AT&T and Verizon are trying to change the rules that govern your online life.
The fight over these rules is being waged now. These corporate ISPs want to create a two-tiered Internet, where some websites or content providers pay to get preferred access to the public. Large content providers like Netflix, the online streaming movie giant, would pay extra to ensure that their content traveled on the fast lane. But let’s say a startup tried to compete with Netflix. If it couldn’t afford to pay the large ISPs their fees for the fast lane, their service would suffer, and people wouldn’t subscribe.’
‘The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be. As we were reminded again just this week, you can be pulled into the National Security Agency’s database quietly and quickly, and the consequences can be long and enduring. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information.
This kind of data sharing, however, isn’t limited to the latest from Edward Snowden’s NSA files. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors.
The watchlist tracks “known” and “suspected” terrorists and includes both foreigners and Americans. It’s also based on loose standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist.’
‘As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images. But DeFoggi—convicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child porn—must have believed his use of the Tor anonymizing network shielded him from federal investigators.
He’s the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users. But DeFoggi’s conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services.’
‘There was once a young man named Narcissus who was so vain that he fell in love with his own reflection in the water and died. In some versions of the mythological tale from Ancient Greece, Narcissus was transformed into a flower that today carries the name narcissus, or daffodil.
Like the flower, narcissism has continued to flourish in modern culture. “Selfie” was awarded word of the year in 2013 by the Oxford Dictionary. Capturing an image of oneself – once the purview of despondent artists – has become an international pastime. Even politicians rode the trend taking selfies at memorial services. Celebrities continued to be, well, celebrated as well. Miley Cyrus ended 2013 as the most searched person on Google, with Drake and Kim Kardashian coming in at the number two and three spots. Between them they have more “followers” than the population of an average country. And, as both Miley Cyrus’s career trajectory and research findings suggest, the importance of fame is more prominent than ever before.
In recent weeks, we’ve seen the Ice Bucket challenge thrive, but it has been revealed that less than half of people doing the challenge are actually donating. So, for some, is it really about awareness for ALS or self-promotion?’
- W. Keith Campbell, Ph.D.
- The Narcissism Epidemic: Interview with W. Keith Campbell
- The Narcissism Epidemic: Living in the Age of Entitlement (Book)
- Development and Validation of the Single Item Narcissism Scale
- Egos inflating over time: a cross-temporal meta-analysis of the Narcissistic Personality Inventory
- Narcissists use Twitter the most because they crave approval
- How do you spot a narcissist? Just ask them
- Julian Stallabrass: On Selfies
‘A few dozen photographs were taken of me as a child. I remember lining up with my family on the beach as a wealthy uncle tried out a new photographic toy and, bright glare of sun off sand in our eyes, being told to stand completely still so as not to ruin the shot. Film and processing were quite pricey, and being photographed was an event. We were behaving just like everybody else, so there is nothing remarkable about the scene except that I remember it. Such an image world must seem fantastically ancient to those today who are used to being photographed – and taking photographs – every day or many times a day.
‘[...] The way new-era-gadgets are designed is that after just 1-3 years they become obsolete: applications cannot be run or downloaded and everything becomes incompatible. Entire systems demand a periodical overhaul, but even overhauls have time limitation, at some point they cease to ‘be allowed’. And so, eventually, new equipment has to be purchased, and, that happens with increasing frequency.
We all know that this is how the ‘market’ works, that this is how ruthless, self-serving ‘entrepreneurship’ is shagging us. We are all bitching about it, but there seems to be nothing that can be done. We have simply become slaves of those vicious, greedy and twisted capitalist companies. We know that they only care about their profits and nothing about the advancement of society and humanity. They are clearly and determinedly robbing creative people, of both time and resources.’