Tag Archives: corporate privacy

Code Is Not Speech

code is speech

Brief version Advocates understand the idea that “code is speech” to create an impenetrable legal shield around anything built of programming code. When they do this they misunderstand, or misrepresent, free speech law (and rights law in general), which rarely creates such impenetrable shields, the principles that underlie that law, and the ways those principles […]

Posted in cyberlibertarianism, rhetoric of computation | Also tagged , , , , , , , , , , , , , , , , , | 2 Responses

Talk: ‘Cyberlibertarianism: The Extremist Foundations of ‘Digital Freedom”

lib soc fed

Talk delivered at Clemson University, September 5, 2013 Full paper: Cyberlibertarianism: The Extremist Foundations of ‘Digital Freedom’ Abstract Cyberlibertarianism has rapidly become the dominant mode of political thought of our time. Especially in the US, but also around the world, the view that might be summed in the slogan “computerization will set you free” has […]

Posted in "hacking", cyberlibertarianism, materality of computation, revolution, rhetoric of computation, theory | Also tagged , , , , , , , , , , , , , , , , , , , , , , , , , | 3 Responses

Opt-Out Citizenship: End-to-End Encryption and Constitutional Governance

Silk Road

Among the digital elite, one of the more common reactions to the recent shocking disclosures about intelligence surveillance programs has been to suggest that the way to prevent government snooping is to encrypt all of our communications. While I think encryption might be an important part of a solution to the total surveillance problem, it […]

Posted in cyberlibertarianism, privacy, rhetoric of computation, surveillance, what are computers for | Also tagged , , , , , , , , , , , , , | 2 Responses

IBM, Now Serving Precrime (We Are Building Big Brother #2)

From Jeffrey Warren via nettime-l CHICAGO–(BUSINESS WIRE)–SPSS, an IBM (NYSE: IBM) Company, today announced that the Florida State Department of Juvenile Justice selected IBM predictive analytics software to reduce recidivism by determining which juveniles are likely to reoffend. Identified at-risk youth can then be placed in programs specific to the best course of treatment to […]

Posted in surveillance, we are building big brother, what are computers for | Also tagged , , , , , , | Leave a comment

Fuchs on “The Empire of Economic Surveillance”

The brilliant Christian Fuchs reflects on Google buzz in a posting distributed today on nettime-l and [idc] titled “Google Buzz: Economic Surveillance – Buzz Off! The Problem of Online Surveillance and the Need for an Alternative Internet.” Among the more interesting observations including what is becoming for me one of many indications that Eric Schmidt […]

Posted in "social media", google, privacy, surveillance, we are building big brother | Also tagged , , , , , | Leave a comment

Facebook Intelligence Agency

Via John Haltiwanger, posting on nettime-l Twitterati and other netizens should already know that their Internet musings are public and could potentially become fodder for intelligence analysts. But now U.S. spy agencies have officially invested in a software firm that monitors social media and half a million web 2.0 sites daily. Wired has the breakdown […]

Posted in "social media", cyberlibertarianism, surveillance, we are building big brother | Also tagged , , , , , , | Leave a comment