Michel Bauwens: Cloud Computing as Virtual Prison

IO Impotency
Michel Bauwens
Michel Bauwens

Cloud Computing as Enclosure

15th January 2013

Republished from David Bollier:

“As more and more computing moves off our PCs and into “the Cloud,” Internet users are gaining access to a wealth of new software-based services that can exploit vast computing capacity and memory storage. That’s wonderful. But what about our freedom to create and share things as we wish, free from corporate or government surveillance or over-reaching copyright enforcement? The real danger of the Cloud is its potential to limit how we may create and share what we want, on our terms.

There are already signs that large corporations like Google, Facebook, Twitter and all the rest will quietly warp the design architecture of the Internet to serve their business interests first. A terrific overview of the troubling issues raised by the Cloud can be found in the essay, “The Cloud: Boundless Digital Potential or Enclosure 3.0,” by David Lametti, a law professor at McGill University, and published by the Virginia Journal of Law & Technology. An earlier version is available at the SSRN website.

Lametti states his thesis simply: “I argue that the Cloud, unless monitored and possibly directed, has the potential to go beyond undermining copyright and the public domain – Enclosure 2.0 – and to go beyond weakening privacy. This round, which I call “Enclosure 3.0”, has the potential to disempower Internet users and conversely empower a very small group of gatekeepers. Put bluntly, it has the potential to relegate Internet users to the status of digital sheep.”

Continue reading “Michel Bauwens: Cloud Computing as Virtual Prison”

NIGHTWATCH: French Advance, Islamic Militant Tourism Up, Touaregs Discover Government Better than Islamists

Cultural Intelligence, IO Deeds of War, IO Impotency

Mali: On the fourth day of the French military action in Mali, Islamist rebels seized another town in southern Mali, but were driven out of Konna. French officials said Diabaly, 400km (250 miles) from the capital, Bamako, was taken in a counter-attack. French aircraft continued to bomb rebel gathering areas in the north and northeast.

Comment: Diabaly is in territory considered government-held. Apparently the Islamist rebels attacked from Mauritania with a daunting force of five pickup trucks carrying rebel fighters. The Malian garrison at Diabaly claims to have fought for 10 hours, but appears to have run away. Hmmm.

Mali's Touareg rebels, meanwhile, announced they are prepared to assist French military forces in Mali by confronting jihadist groups on the ground in the country's northern region, a senior Tuareg official said on 14 January.

Continue reading “NIGHTWATCH: French Advance, Islamic Militant Tourism Up, Touaregs Discover Government Better than Islamists”

Berto Jongman: 80% of Anonymous Bloggers Identified by Stylometric Analysis?

07 Other Atrocities, Government, IO Impotency
Berto Jongman
Berto Jongman

Stylometric analysis to track anonymous users in the underground

paganinip

Security Affairs, January 10th, 2013

EXTRACT

According an interesting study presented by researcher Sadia Afroz at last edition of Chaos Communication Congress in Germany, the 29C3, up to 80 percent of certain anonymous underground forum users can be identified using linguistics, a data that is stunning in my opinion. Sadia is member of the The Drexel and George Mason universities research team composed of Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, and Damon McCoy.

Read full article.

Continue reading “Berto Jongman: 80% of Anonymous Bloggers Identified by Stylometric Analysis?”

Berto Jongman: US Government Warns Over Vulnerable Control Systems Exactly Nighteen Years After Air War College, Winn Schwartau & Others Write to White House

07 Other Atrocities, Government, IO Impotency
Berto Jongman
Berto Jongman

US government warns over vulnerable control systems

The US government has told thousands of companies to beef up protection of computers which oversee power plants and other utilities.

The action comes after a survey revealed that thousands of these systems can be found online.

The survey was carried out via a publicly available search engine that pinpointed computers controlling critical infrastructure.

In total, the survey uncovered more than 500,000 potential targets.

Read rest of article.

Continue reading “Berto Jongman: US Government Warns Over Vulnerable Control Systems Exactly Nighteen Years After Air War College, Winn Schwartau & Others Write to White House”

Mongoose: BIll Clinton Wrong on Mass Shootings

IO Impotency
Mongoose
Mongoose

Clinton says 50% since ban expired. Wrong. Try 20%.

Bill Clinton’s over-the-top ‘fact’ on mass shootings

at 06:02 AM ET, 01/11/2013

“Half of all mass killings in the United States have occurred since the assault weapons ban expired in 2005, half of all of them in the history of the country.”

— Former president Bill Clinton, at the Consumer Electronics Show in Las Vegas, Jan. 9, 2013

A colleague spotted this eye-popping statistic by the former president and wondered if it was correct.

President Clinton signed the assault weapons ban into law in 1994, but it expired after 10 years and was not renewed. Even supporters have said it was riddled with loopholes, limiting its effectiveness. But the rash of mass shootings in recent years, including the Newtown tragedy, have provided new impetus for a renewed ban.

So let’s dig into the data and see what we find.

Read full article.

Continue reading “Mongoose: BIll Clinton Wrong on Mass Shootings”

Berto Jongman: “National Information Power” Old Think

IO Impotency
Berto Jongman
Berto Jongman

SOME OBSERVATIONS ALONG THE ROAD TO “NATIONAL INFORMATION POWER”

WILLIAM GRAVELL*

I. INTRODUCTION

When examining the technologies associated with information in its many forms, America has truly been blessed—or cursed, depending on your point of view—with an abundance of energy and inventiveness. Through the genius of Bell and Edison, and more recently, the products of RCA, Bell Laboratories, Microsoft, Intel and others, America has consistently held the lead in the invention and application of information technology. The practical advantages of this position have been frequent, numerous and profound. At present, American-designed and manufactured microprocessors, the subatomic particles of computer technology, dominate the global market, at a time when virtually every aspect of life on Earth is hurtling headlong toward expression in informational form. Beyond that, the operating systems and software applications—the rules that cause things to actually happen inside computers—are also totally dominated not just by the ubiquitous Microsoft Corporation,1 but by America as a whole.

Read PDF 26 Pages Online

Phi Beta Iota: Down the rabbit hole.

See Also:

21st Century Intelligence Core References 2.9

Yoda: South Korea Slams Google Evil in Privacy Violations

Commerce, Corruption, IO Impotency
Got Crowd? BE the Force!
Got Crowd? BE the Force!

Korean DPA Faults Google's TOS Changes: Global Privacy Implications?

By  Graham Greenleaf, Whon-il Park (Privacy Laws & Business International Report, Issue 119: 22-25, October 2012)

Abstract:

The first decision of Korea’s Personal Information Protection Commission (PIPC) has borne out the perception that Korea’s new Personal Information Protection Act (PIP Act) is ‘Asia’s toughest data privacy law’ (Greenleaf and Park, Privacy Laws & Business International Report, Issue 117: 1, available at http://ssrn.com/abstract=2120983). The PIPC has decided that Google’s changes to the Terms of Service (TOS) of over 60 of its services, unifying them in a single TOS, may be in breach of various provisions of the Act.

Google’s TOS changes are considered by the Commission to likely to breach these laws in three ways: (i) they do not specify the purpose of collection clearly enough, and cannot comply with the requirement that personal information may only be collected and used to the minimum extent necessary for the purpose for which it is collected; (ii) they do not comply with the requirement that where personal information is to be used for purposes other than the purpose for which it was collected, it is necessary to obtain additional consents for such uses; and (iii) they do not specify that that personal information will be erased immediately upon the expiration of its retention period or on request from a data subject.

This article analyses this decision, considering the PIPC’s reasoning, and the terms of the Korean legislation, in order to determine whether the PIPC’s findings (and the potential remedial action) are a result of features which are unique to the Korean law, or are they features which are common to at least some other countries’ data privacy laws.

Read full paper.

Continue reading “Yoda: South Korea Slams Google Evil in Privacy Violations”

noble gold