Category Archives: surveillance

Do You Oppose Bad Technology, or Democracy?

facial recognition

Calls to Limit the Use of Bad Technologies Only by Law Enforcement and Governments, Largely Via “Ethics” and Self-Regulation, Exacerbate Rather than Ameliorate the Anti-Democratic Harms of Digital Technology Recently, more of us have started to realize just how destructive digital technologies can be. That’s good. As someone who has been nearly screaming about the […]

Also posted in cyberlibertarianism, privacy, uncomputing | Tagged , , , , , , , | Leave a comment

Please Consider Supporting Our Legal Challenge to Cambridge Analytica’s Role in the Trump Election

Crowd Justice campaign header

Since December of last year, I have been part of a small group of concerned citizens engaged in a series of actions against Cambridge Analytica (CA) and its parent corporation, SCL Group. I am writing this post in the hopes of gathering support (that is, funds) we need to continue this action. You can support […]

Also posted in "social media", materality of computation, privacy, revolution, we are building big brother, what are computers for | Tagged , , , , , , , , , , , | Leave a comment

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Also posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation | Tagged , , , , , , , , , , , | Leave a comment

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Also posted in "hacking", cyberlibertarianism | Tagged , , , , , , , , , , | 1 Response

Encryption and Responsibility: A Note on Symphony

Typically, those of us concerned about the widespread use of encryption and anonymization technologies like Tor are depicted by crypto advocates as “anti-encryption” or “freedom haters” or “mind-murdering censors” or worse. Despite the level of detail these people can bring to technological matters, they often portray the political options as very stark: either “encryption” or […]

Also posted in cyberlibertarianism, materality of computation, privacy | Tagged , , , , , , , , , , , , , , , | 1 Response

All Cybersecurity Technology Is Dual-Use

geer at black hat

Dan Geer is one of the more interesting thinkers about digital security and privacy around. Geer is a sophisticated technologist with an extremely varied and rich background who has also, fairly recently, become a spook of some kind. Geer is currently the Chief Information Security Officer for In-Q-Tel, the technology investment subsidiary of the CIA, […]

Also posted in "hacking", "social media", cyberlibertarianism, materality of computation, privacy, rhetoric of computation | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Social Media as Political Control: The Facebook Study, Acxiom, & NSA

NSA Facebook

Although it didn’t break the major media until last week, around June 2 researchers led by Adam Kramer of Facebook published a study in the Proceedings of the National Academy of Sciences (PNAS) entitled “Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks.” The publication has triggered an flood of complaints and concerns: is Facebook […]

Also posted in "social media", cyberlibertarianism, digital humanities, privacy, we are building big brother | Tagged , , , , , , , , , , , , , , , , , , , , , , , | 1 Response

Glasslinks: Privacy, Glassholes, Panics, & Take-Backs

google glass

A colleague asked if I had any links to writings about Google Glass, so I dug around in my files and found quite a few things. I thought they might come in handy for others doing research on the topic. I have even more, but this is overwhelming enough as it is. The final pair […]

Also posted in cyberlibertarianism, google, materality of computation, privacy, rhetoric of computation, we are building big brother | Tagged , , , , , , , , , , , , | Leave a comment

Opt-Out Citizenship: End-to-End Encryption and Constitutional Governance

Silk Road

Among the digital elite, one of the more common reactions to the recent shocking disclosures about intelligence surveillance programs has been to suggest that the way to prevent government snooping is to encrypt all of our communications. While I think encryption might be an important part of a solution to the total surveillance problem, it […]

Also posted in cyberlibertarianism, privacy, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , | 3 Responses

Completely Different and Exactly the Same

I was flattered to see Nicholas Carr picking up on a blog entry I wrote about the Cartesian dualism underlying most thinking about the Singularity. I was equally pleased to read this comment on Carr’s post from CS Clark, who is otherwise unknown to me: I’m reminded that many tech/law debates depend on the new […]

Also posted in "social media", cyberlibertarianism, google, materality of computation, privacy, rhetoric of computation | Tagged , , , , , , , , , , , | 5 Responses