1. The final chapter in our privacy/security study, looking at government level stuff: deep packet inspection, deals with telecom and dotcom companies, cable splicing, TEMPEST, Great Firewall of China, biometrics, and data mining
2. Moral/political question: social value of privacy, allowance for privacy technologies
3. Tour of stateled
surveillance projects: NSA, SCS, GCH, DSD, etc
CRAP test- Currency, Reliability, Authority, Purpose/POV
"I fear for the future of the Internet as a useful source of credible news, medical advice, financial information, educational resources, scholarly and scientific research. Some critics argue that a tsunami of hogwash has already rendered the Web useless. I disagree. We are indeed inundated by online noise pollution, but the problem is soluble. The good stuff is out there if you know how to find and verify it. Basic information literacy, widely distributed, is the best protection for the knowledge commons: A sufficient portion of critical consumers among the online population can become a strong defense against the noise-death of the Internet"
A creator, such as an artist, musician, photographer, craftsperson, performer, animator, designer, videomaker, or author - in other words, anyone producing works of art - needs to acquire only 1,000 True Fans to make a living. A True Fan is defined as someone who will purchase anything and everything you produce. They will drive 200 miles to see you sing. They will buy the super deluxe re-issued hi-res box set of your stuff even though they have the low-res version. They have a Google Alert set for your name. They bookmark the eBay page where your out-of-print editions show up. They come to your openings. They have you sign their copies. They buy the t-shirt, and the mug, and the hat. They can't wait till you issue your next work. They are true fans. The NSA (National Security Agency) has become the largest, most covert, and potentially most intrusive intelligence agency ever.But "this is more than just a data center," says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. A binary transmission system, developed in the 1830s, for getting messages over lossy channels- That is you could only have electrical pulses, and silence, so you talk Iin dots and dashes, long and short pulses: ...---...
Samuel Morse did letter frequency analysis of English: we use letters in different quantities. E and T get used the most, J, X, Q, and Z the least. So, in Morse code, E is the shortest signal (.), then T (-)
"In my work, I've argued that these databases will grow to
connect every individual to at least one closely guarded secret. This might be a secret about a medical condition, family history, or personal preference. It is a secret that, if revealed, would cause more than embarrassment or shame; it would lead to serious, concrete, devastating harm. And these
companies are combining their data stores, which will give rise to a single, massive database. I call this the Database of Ruin. Once we have created this database, it is unlikely we will ever be able to tear it apart."-Paul Ohm
1998; This is where legal scholar and activist Larry Lessig comes in, because he points out it's not just about law.
Lessig is a law professor, but he makes the major point that
when talk about things like copyright, we're talking about
four different kinds of forces at work:
• One: there's architecture or technology: what your
tools make it easy, difficult, or impossible for you to do.
And the DMCA wanted to change the technology.
The drafters of the DMCA wanted to create "technological
protection measures" for their copyrighted content, to fight
filesharing. The advocates of the DMCA had the law on
their side, and they had the norms, sort of — there was a
vague consensus that it was bad to pirate media, at that
time — and some of the market, though that was slipping.
But they didn't have the technology under control, at all.
The technology made it amazingly easy to copy, modify,
and perform their stuff.
The protection measures are things like Digital Rights
Management, uncopy-able files, songs that expire after
"three days or three plays," e-book files that are locked to
a specific device, and so on.