Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.
Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.
Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.
Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.
Known for Revealing details of classified United States government surveillance programs
Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.
Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.
Known for Revealing details of classified United States government surveillance programs
Criminal charge Theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person (June 2013)
Born Edward Joseph SnowdenJune 21, 1983 (age 32)Elizabeth City, North Carolina, U.S.
Residence Russia (temporary asylum)Nationality AmericanOccupation System administratorEmployer Booz Allen Hamilton Kunia Camp, Hawaii, U.S.
Known for Revealing details of classified United States government surveillance programs
Criminal charge Theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence to an unauthorized person (June 2013)
Awards Sam Adams Award (2013), Right Livelihood Award (2014), Stuttgart Peace Prize (2014) Source: Wikipedia
Lots of power,
little
accountability
Formed November 4, 1952; 63 years agoPreceding agency Armed Forces Security AgencyHeadquarters Fort Meade, Maryland, U.S.
Motto "Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)
Annual budget Classified (estimated $10.8 billion, 2013)
Source: Wikipedia
The Transportation Security Administration a.k.a. the TSA. The TSA is an agency of the U.S. Department of Homeland Security that has authority over the security of the traveling public in the United States.
Keeping us safe, but
• Boundary issues• Questionable hiring processes• Arbitrary rules and regulations
TSA Meme - imgflip.com
A lovely lady, but
• Boundary issues• Questionable motives • Calls 20+ times a day!• Landline only
Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use
So what is privacy? Privacy is not having my mother-in-law call 20 times a day. But it's more than that. The NY Times columnist David Brooks put it pretty well I think.
"There has to be an interior zone within each person that other people do not see. There has to be a zone where half-formed thoughts and delicate emotions can grow and evolve without being exposed to the harsh glare of public judgement. There has to be a private space where you can share your doubts and secrets and expose your weaknesses with the expectation that you will still be loved and supported." I like that.
From Snowden by Ted Ral - http://www.amazon.com/Snowden-Ted-Rall/dp/1609806352
"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.”
- Eric Schmidt, Executive Chairman of Alphabet Inc.
http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html
Google Exec Considering Internet "Hate-Checker by Day Donaldson Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
“Privacy is dead” – Mark Zuckerberg, founder and CEO, Facebook.
[http://www.theguardian.com/technology/2010/jan/11/facebook-privacy]
Mark Zuckerberg by JD Lasica Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
But hang on, privacy isn’t dead. It’s actually more important than ever before!
Just because you have haven’t done anything wrong doesn’t mean that you want everyone to know everything about you all the time!
NSA staff used spying power to snoop on lovers and spouses
[Reuters http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927]
NSA Inside by Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
TSA saved 35,000 images
[http://www.zdnet.com/article/body-scanner-saved-35000-naked-images/]
- - -
Image from an active millimeter wave body scanner - Transportation Security Administration - http://www.tsa.gov Public Domain
Concerns about privacy are nothing new. They’ve just become much more pronounced with the world wide web. For example…
In the 1960s, Michel Foucault observed that surveillanceis not neutral. it instills discipline by forcing self-regulation…
[https://en.wikipedia.org/wiki/Discipline_and_Punish]
Michel Foucault by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
Until recently in human history discipline focused on the body.
Public executions worked in the sense that the set clear example of the consequences for breaking rules, at the same time Foucault pointed out that these brutal methods were fraught with risk e.g. riots, freeing the prisoner, etc. Too much could go wrong given that the mood of the audience was highly unpredictable.
[https://en.wikipedia.org/wiki/Discipline_and_Punish]
Damiens before his judges - French School, (18th century) - Bibliothèque nationale de France - Public Domain
A shift to “bio-power” changed the focus from the body to the “soul”.Now interior thoughts, emotions, and patterns become the central focus of power over the individual, versus the body.
[https://en.wikipedia.org/wiki/Discipline_and_Punish]
A Clockwork Orange (1971) Warner Bros. – Fair Use
The panopticon became a metaphor for a society based on surveillance-based discipline
[https://en.wikipedia.org/wiki/Discipline_and_Punish]
Presidio Modelo prison by I, Friman, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2410607
We talked about the NSA and its international sister agencies, but there are numerous other threats to our privacy…
/how we deal with my M-I-L
_1 set boundaries
But in order to set boundaries we start using some new tactics and tools.
Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use
The problem with most open source software is that it is just to difficult to use.
For open source tools to hit mainstream, they’ll need some design love.
Wait does this mean that I have to stop using my Mac? Or Slack? Or Photoshop?
No way. But let’s think about sketching out a personal ecosystem that sets boundaries for different kinds of data…
Hovering Art Directors @Markswi http://hoveringartdirectors.tumblr.com/
Digital free zone
Private Zone
Work ZoneMass audience / personal public relations
FinancialMedicalPolitical
Legal
FacebookGoogleInstagramPinterestLinkedin
Corporate or freelance VPN
/how we deal with my M-I-L
_1 set boundaries_2 explain the terms and conditions
Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use
How do we get away from all these intrusions?
_1 set boundaries_2 explain the terms and conditions_3 take breaks and get away
Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use
The internet is much larger than what we generally experience today. There is much to explore…
Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0
/deep web
/surface web
/dark web
Google, Yahoo!, Wikipedia
Academic records Legal recordsMedical recordsSubscription information
TOR-encrypted websitesPrivate communicationsIllegal information
The internet is much larger than what we generally experience today. There is much to explore…
Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0
And sometimes we need to simply unplug for a bit. Whether we realize it or not, we are already cyborgs.
The phone has become an extension of our bodies…
“When you tap your pockets...” - lolworthy.com
How do we get away from all these intrusions?
_1 set boundaries_2 explain the terms and conditions_3 take breaks and get away_4 Get support (it takes a village)
In summary to quote Marshall McLuhan, “We shape our tools and thereafter our tools shape us”
http://www.theguardian.com/technology/2011/jul/24/marshall-mcluhan-media-john-naughton
Rolling Stone magazine. image: http://english.mashkulture.net/2011/05/17/shepard-fairey-the-medium-is-the-massage-cover/ – Fair Use
Image source: http://ilyke.co/modern-amish-or-hipster-god/49080
GrafikJam
Connecting
communication
professionals with OSS
developers
We have resolved our
situation with our
M-I-L
Sometimes you have
to cut the chord
Source: http://dailydot.com
/Photo credits
_1 Banksy by Michael Summers Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_2/7 Edward Snowden - Wired Magazine Cover by Mike Mozart Flickr (CC) Attribution 2.0 Generic (CC BY 2.0)
_3 Unplug Big Brother: NSA Spying T-Shirts - eff.org
_4 GCHQ “Doughnut” – https://en.wikipedia.org Open Government License
_5 FVEY - privacyinternational.org – Fair Use_6 Sputnik I Heart You by Ignas Kukenys- Flickr Attribution 2.0 Generic (CC BY 2.0) _8 Homeland Security Banksy – Photo by Duca di Spinaci Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_9 TSA Meme - imgflip.com
_10 Maureen Lipman as ‘Beattie’ in BT advertisement – Fair Use_11 Original Banksy at Dismaland by Stephen Allport Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_12 Google Exec Considering Internet "Hate-Checker by Day Donaldson Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)_13 Mark Zuckerberg by JD Lasica Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_14 NSA Inside - Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
/Photo credits
_14 NSA Inside - Bruce Sterling Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_14 Change.org
_15 Michel Foucault by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_16 Damiens before his judges - French School, (18th century) - Bibliothèque nationale de France - Public Domain
_17 A Clockwork Orange (1971) Warner Bros. – Fair Use_18 Presidio Modelo prison by I, Friman, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2410607
_19 "Banksy in New York" - carnagenyc Flickr (CC) Attribution 2.0 Generic (CC BY 2.0)
_20 Anonymous Hacker by Brian Klug Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
_30 Automatic face detection with OpenCV - en.wikipedia.org CC BY 3.0
_31 WTF Google Street View Blow Up Doll - http://cdn.smosh.com/
_32 Drones Attack by Thierry Ehrmann Flicker (CC) Attribution 2.0 Generic (CC BY 2.0)
/Photo credits
_33 Delete Cookies by Gegen Den Strich - gegen-den-strich.com/
_34 Pig-Pen by Neijo - deviantart.com
_36 Her (2013) – Warner Bros. – Fair Use
_41 Heavy tank during 8th 'Tank Day' in Military Technical Museum Lešany Adamicz - CC BY-SA 3.0
_54 Sea Explorer Glider Diving by Yannlepage - Flickr CC BY-SA 3.0
_55 Deepwebtechblog posted by Abe http://deepwebtechblog.com/the-deep-web-is-not-all-dark/
_56 https://www.torproject.org/
_66 https://blog.torproject.org/blog/what-tor-supporter-looks-cory-doctorow
_68 Digitaldetox.org
_72-73 https://www.opentech.fund/
/Reference
_2 https://en.wikipedia.org/wiki/Edward_Snowden
_3 https://en.wikipedia.org/wiki/National_Security_Agency
_4 https://en.wikipedia.org/wiki/Government_Communications_Headquarters
_5 https://en.wikipedia.org/wiki/Five_Eyes_11 David Brooks quote from Snowden by Ted Ral - http://www.amazon.com/Snowden-Ted-Rall/dp/1609806352
_12 Google's Schmidt Roasted for Privacy Comments - http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html
_13 Privacy no longer a social norm, says Facebook founder - The Guardian http://www.theguardian.com/technology/2010/jan/11/facebook-privacy
_14 Reuters http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927
_17-20 https://en.wikipedia.org/wiki/Discipline_and_Punish
_24_28 Elizabeth Palermo http://www.tomsguide.com/us/biggest-data-breaches,news-19083.html
/Reference
See also:
http://www.crn.com/slide-shows/security/300077563/the-10-biggest-data-breaches-of-2015-so-far.htm/pgno/0/1
http://www.networkworld.com/article/3011103/security/biggest-data-breaches-of-2015.html
http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2015/
_29 http://www.telegraph.co.uk/technology/apple/11743790/Asking-Siri-to-charge-your-phone-dials-the-police.html
_38-41 In the Beginning…was the Comamand Line by Neal Stephenson - http://www.amazon.com/In-Beginning-was-Command-Line/dp/0380815931
_43 Prism Break website by Peng Zong https://prism-break.org/en/
_52 http://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html?_r=0
_55 Deepwebtechblog posted by Abe http://deepwebtechblog.com/the-deep-web-is-not-all-dark/
/Reference
_56 https://www.torproject.org/
_66 https://blog.torproject.org/blog/what-tor-supporter-looks-cory-doctorow
_68 Digitaldetox.org
_72-73 opentechfund.org
_76 http://www.theguardian.com/technology/2011/jul/24/marshall-mcluhan-media-john-naughton