Archive for the ‘technology’ Category

LAS VEGAS- The (r)evolution of privacy in technology was tweeted tonight at the Develop 4 Privacy awards at the DEFCON 19 hacker conference in Las Vegas.

3rd Place went to Obscuracam (Guardian Project), 2nd place to tiqr (https://tiqr.org/), an open source authenticator, and the 1st prize award to Gibberbot (Guardian Project). The winning applications were developed using the principles of Privacy by Design.  ::MORE HERE::

AND EVEN MORE…

“The Revolution will be Televised… by hackers in their mother’s basements.”

“This might be the first government IT project ever that came in under initial cost estimates. Perhaps the reason is that the states did not want to implement REAL-ID in 2005, so they overstated the costs.


As to fraud reduction — I’m not so sure. As the difficulty of getting a fraudulent ID increases, so does its value. I think we’ll have to wait a while longer and see how criminals adapt.”   Bruce Schneier, Security technology expert 

:::MORE HERE::: 

Related News:

Transcript of DHS Secretary Napolitano’s speech at George Washington University 

Idaho Nullification Effort Delayed, but Not Stopped

c/o InternetCaucusAC

http://www.youtube.com/p/DAFF84EB7B99AE87?hl=en_US&fs=1

VIEW ALL VIDEO HERE

The 7th annual State of the Net conference was held at the Hyatt Regency Washington on Capitol Hill on January 18-19, 2011. Attracting over 500 attendees annually, the State of the Net Conference provides unparalleled opportunities to network and engage on key policy issues. The State of the Net Conference is the largest information technology policy conference in the U.S. and the only one with over 50 percent Congressional staff and government policymakers in attendance. The State of the Net Conference is the only tech policy conference routinely recognized for its balanced blend of academics, consumer groups, industry and government. Over 50% of annual attendees government policy staff.

BTC – Corporations… Government data surveillance; same difference. They both do it.

Here is second life for news that matters.

Mexico starts to use iris scans on ID cards

A National ID Card for Every American c/o Fellowship of The Minds

“In 1998 the Clinton Administration tested such a privately-funded card without the consent or knowledge of Congress. Their card was part of a special healthcare program funded by the Robert Wood Johnson Foundation. The program was initated in five western States and entailed giving women with dependent children free healthcare in the pilot project that actually tested the effectiveness of the biometric cards, which electronically monitored the whereabouts of the cardholder 24 hours a day, 7 days a week by GPS. The test lasted one year. It was deemed to be a success. Our federal government does have the ability, and the desire, to track the whereabouts of its human capital while they work, when they play, and where they sleep. REAL ID, in other words, is REAL Intrusive.”

Trial Begins For Seattle Man Who Refused To Show ID At TSA Checkpoint In Albuquerque

Governor gives voter ID bill emergency status in legislative session

U.S. Cancels “Virtual Fence” with Mexico

USCIS e-Verify still flags eligible employees, says GAO

RE: Corporate Data Surveillance, Watch what you say and text

DIY Government: FTC Comment period on *PRIVACY PRACTICES* extended until 2-18-2011

OTHER RELATED NEWS:

Black Budget in the Red

Facebook suspends personal data-sharing feature

The Companies Who Support Censoring the Internet

How Big Brother is watching you from Israel

FILMS TO GO SEE:

Operation Endgame – Illuminates bureaucracy, comedic lunacy of the underground US Intelligence complex; straight to DVD, comes *highly recommended* for entertainment’s sake.

Smash His Camera –  Classic rivalry of privacy in the face of public living. Example here.

Tron sequel distills the nature of “bad” societal code

BTC – While taking a break this Christmas, I was drawn into and captured 3 times by the world of TRON Legacy (regular, 3D, & 3D IMAX). I found what I believe to be true about the power of cyberidentity staring back at me from the screen.

Disney’s TRON Legacy amazingly demonstrates the drama of gotham’s Big Tech sectors and the ongoing power strains of its inverted political society. The movie is strikingly current, as it opens with disaffected twenty-something & heir-apparent, Sam Flynn, on a mission to carry out an ethical hack to the dismay of estranged corporate board members.   Flynn “Junior” in TRON Legacy is posed as the human 2.0 version of his disappeared father, Kevin Flynn. The Son of Flynn obviates the younger class of tech geniuses who move out wildly popular social networks and web applications. Some have personal loyalties and a robin-hood sense of justice; while others fall in line towards self-service and the status quo. Flynn Jr.’s journey ahead is to adopt responsibility for the deep problems of “the machine” as it currently exists.

Sam follows a prompt by one of the board members to return to his father’s video arcade. Through exploratory events he finds himself dropped onto his father’s dark, tech grid world. He is picked up immediately by a Recognizer for the first offense of being unidentifiable. Later Sam, assumed to be a program, is given an identity disk. He is informed that if he is found without his disk, he may be “derezzed”; which is to be deleted or killed by the system. He survives a sentence to play the Program Games after he is discovered by Tron, a character devoted to the user. He then becomes hunted, known as The Son of Flynn.

If you lose your disk, or fail to follow commands, you’ll be subject to immediate deresolution.

TRON Legacy shows us the drama of a utopian technocracy gone totalitarian; including exile, political imprisonment, a high-level coup and genocide. Kevin Flynn, portrayed immaculately by Jeff Bridges, is an evolved California tech-zen guru who became a prisoner of the game he built. CLU, Kevin Flynn’s digital avatar, operates an absolute rule of technology against the indecisive, imperfect needs of vulnerable users. The Son of Flynn confronts the perils of being on the downside of power amid digital sycophants, tyrants, and innocent victims of his father’s grid world gone rogue. The film exhibits subtleties of human interplay towards singularity; where once useful, companionable relationships with technology turn into a struggle for power over the user base of humanity, power over identity is GOD and anonymity a crime.

TRON Legacy suggests that technology will mimic hidden flaws of human logic and the arcane dangers of perfection we may not be able to escape unless we evolve spiritually. It seems as if our human evolution has yet to break through and ethically catch up to pace of our gadget development. If technology tends to be running your life, with or without you – take a break and go see this film.

ALSO: The “score” on the Tron Legacy Motion Picture picture soundrack 

Special shout to Freedom’s Phoenix for finds on NSTIC.

Here is second life for news that matters.

The latest on “NONSTIC” finds that the proposed identity program is undergoing technical problems and experiencing delays.  Do you think that has anything to do with the fact that so many people don’t trust their government to run identity, or much of anything really for that matter, in cyberspace?

WaPo gives thoughtful consideration to the high concept of US national identity.  Interesting report also trolled up from The Bradley Project here.

Babbage @ The LA Economist experienced his own version of the modern checkpoint society tolerated in California and made some observations about the current status of REAL ID.

Looking on the bright side, officials in Sacramento reckon that if manufacturing the new driving licences is that difficult for professionals, then all those biometric details and security features are going to make it prohibitively expensive for counterfeiters to reproduce. That is no doubt true for the backstreet forgers around MacArthur Park. The worry is that if driving licences become worth thousands of dollars instead of mere hundreds, organised crime could move into the bogus-ID business in a big way.

PRIVACY RIDDLE D’Jour – It’s a head scratcher…
Judge Says TSA Doesn’t Have to Turn Over Body Scan Images to Civil Liberties Group

Bradley Manning and the Rule of Law

Latest and greatest from Papers, Please! : Update on jury trial of Phil Moek who refused identity to fly. The essential guide to PNR or Passenger Name Record database debacle, and an  Interview@AntiWar.com.  Follow Ed Hasbrouck on twitter.

“People aren’t very interested in it any more. It’s done now. It’s more just an easability [sic] thing. You go up, you swipe, you open. Essentially when I take the dog for a walk I don’t have to take the keys with me.”– Mr. Joe Wooler,  an Aussie walking about with an RFID chip embedded in his flesh.

(Did we just BEAT THE CHIP?) 

BTC-  Every now and then the internal chipping market for RFIDs will turn up in a PR piece.  Usually it’s a feature of a hip, young individual adopting an embeddable RFID chip for streamlined convenience and ease of operability.  This spotlight perspective might be that digital privacy is a thing of the past and that “privacy is dead” so why not let technology work for you?

Such is the case of Joe Wooler, Aussie, tech patsy and convenience dupe who made headlines by adding RFID into the folds of his skin and his lifestyle.

You can imagine most everyone else just thought injecting a rice sized microchip into your arm was an oddity until a few underground documentaries, like Zeitgeist,  hitched the internalized RFID to an economics wagon, the panopticon and the dark prospect of global governance.  The US the market for the rice sized chip sunk like a lead Zepplin after Contemporary Christian culture found its placement consistent with “the mark of the beast”.

Mark of the beast?

How about mark of Fluffy or Whiskers? A lot of people inject RFID microchips into their animals so they can be found.  It’s not the greatest prospect for the animals’ health.  They have been linked to cause cancer in dogs.  It may not be the best for human use.

One of the strongest outcriers worldwide against digitizing parts of the human body and of synthetic humanity is an Australian public interest group called We The People Will Not Be Chipped. They released a well researched documentary on IBM’s role in fostering Verichip’s multiple rebrandings and other nefarious prospects on embeddable chips called One Mainframe to Rule Them All.

More people are becoming wise to the mobb of passive electronic tracking available due to the internet and other mobile devices.  Our argument is that our biology hasn’t caught up to our capacity for advanced technology.   Social networking is really pushing boundaries of respectable concealment.   There’s something to be said for the matriarchs and patriarchs of Internet culture using Anonymity masks and pseudonyms.  These are inventive charachters close to the genesis of successive, evolving technologies.  Their wisdom should not be discarded due to government or technological trends.

Plenty of people still may not know or be aware of the dangers they face in losing their privacy c/o RFID technology.

Until then, this blog and hundreds of independent, successive campaigns will sustain a mission to inform the public about the dangers of a comprehensive digital dragnet for the identified person.

BTC –  There’s still an inherent breakdown between what we think is serviceable law and what the federal government believes is good law or even just.. law. Laws which give States money and Gold Stars for Real ID benchmark compliance are still earning scathing public contempt, unless, as Lady Axxiom says, its called anything other than Real ID.

Here is second life for news that matters:

The pathetic new normal includes more TSA search and siezure of your private parts.

CIA’s Darth Panetta to Wikileaks “Send in the probe!”

BAIT & TACKLE: What’s the right use for net neutrality in the Congress? 

Congress prepare for digital privacy showdown

Facebook responds to User ID controversy 

ZOGBY POLL: 93% of Americans want control over their healthcare records

LISTEN:Teleconference with Patient Privacy rights

California Privacy legislation &  Library patron lawsuits arise 

Google privacy logs deleted  @declanm

MAGID: User Friendly Guide to Privacy on Facebook for families out now

 by Jim Babka


Statists constantly tell us that we need a huge government to protect us from business monopolies. But they fail to notice that The State is the biggest, baddest monopoly of them all, as well as a major reason why some companies grow so monstrously large.

Just consider the recent economic crisis. The politicians have raged against the banks, but government bailouts, regulations, and shot-gun mergers, have caused the banking industry to become more concentrated rather than less. This is standard operating procedure. Politicians and bureaucrats constantly speak with a forked tongue . . 

* They claim they’re protecting “the little guy” from “the fat cats,” when in reality . . .

* The State actually works for the fat cats (though in an unreliable Mafia kind of way).

A huge part of the business of politics involves conferring subsidies and special protections on favored companies and industries, making many of them near (or actual) monopolies that also happen to be “too big to fail.” Now here comes the latest example of monopoly creation by The State . . .

The Feds want to monopolize the user names and passwords that you employ on the Internet!


That sounds ominous, and it is. Will you be a “trusted entity,” or a distrusted one?

Of course, the Federal Statists claim that this “strategy” is for your own good. It’s supposed to protect you from identity theft, but it also exempts companies like Microsoft from the burden of creating safe products, while laying yet another brick in the wall of an embryonic police state.

President Bush and the Republicans started this criminal game of monopoly by passing the REAL ID Act, and by tapping all international U.S. phone and Internet communications without a warrant. Now President Obama and the Democrats are giving us NO CHANGE in any of these polices. Instead, they’re working hard to make things worse. This so-called “trusted entities strategy” is the latest example. And here’s more bad news . . .

The “strategy” was unveiled practically on the eve of our 4th of July (ironic), and the deadline for public comment was set for July 19th. You were on holiday. Congress was out of session for half of the comment period as well. This strikes us as a deliberate attempt to avoid scrutiny.

After that deadline Congress will likely defer to the Department of Homeland Security, because of their supposed expertise, and the wheels of bureaucracy will begin to grind you into assimilation. Next stop, one Internet password for you, imposed and controlled by The State. Is this what you want? If not, please act now. Two things are needed . . .

FIRST, we need to make our presence felt at the DHS comments page. Here is what I wrote, on the DHS comments page, under the headline, “NSTIC Should Have a 90 Day Comment Period” . . .
You unveiled the National Strategy for Trusted Identities in Cyberspace scheme practically on the eve of the July 4th holiday, when few would be paying attention, and then set an early deadline of July 19th for public comments. Did you want only a little, or perhaps no public scrutiny of this plan? Were you disinterested in public comments? You can disabuse me of these concerns by immediately extending the comment period to 90 days. At least that much time is required for public review of such a far reaching plan.
Your action is SIMPLEVOTE FOR my statement, and while you’re there . . .  



A) “Like” my statement on your Facebook page and/or Tweet it, and if you can, please . . .




B) Consider leaving a firm, but polite remark in the Comments section, beneath my statement, demonstrating your support.

Registration at their site is required, but you can comment anonymously.

OUR GOAL is to get this comment ranked the highest on the page! 
. . . by a wide margin!   
  
Right now, the favored companies are stuffing the ballot box, and they may even vote our idea down, so we need everyone — we need YOU.


You can borrow from or copy my sample letter . . .
I also object to the DHS scheme called a “National Strategy for Trusted Identities in Cyberspace.” DHS snuck-out this plan right before the July 4th holiday, and then only allowed until the 19th for public comment. Please represent me by calling the DHS and asking them to extend the comment period to 90 days. Creating a monopoly identity system for the Internet is a very serious and frightening thing. It deserves serious scrutiny and time for debate. Please represent me in this matter.
END LETTER

Remember, first vote for my comment the DHS feedback page: http://tinyurl.com/26ow7j8
  
And then, use DownsizeDC.orgs Educate the Powerful System to send a letter to 


Please forward this to others and get them to take action too. Remember, July 19th is Monday!

Jim Babka
President
DownsizeDC.org, Inc.

BTC -For anyone who has not seen Jim Harper’s “live” delivery on anti-Real ID rhetoric.  Airtight.