Some advice for the beleaguered and backward states of Illinois, Massachusetts, et al.: If police are not obliged to ask our permission before recording their public encounters with us, then we should not be obliged to ask their permission before recording our public encounters with them. That states generally dominated by so-called progressives should be so insistent upon asymmetric police powers and special privileges for government’s armed agents is surprising only to those who do not understand the basic but seldom-spoken truth about progressivism: The welfare state is the police state.
Why Illinois Republicans are on board is another matter, bringing up the eternal question that conservatives can expect to be revisiting frequently after January: What, exactly, is the point of the Republican party?
Illinois is attempting to resurrect what the state’s politicians pretend is a privacy-protecting anti-surveillance law; in reality, it is the nearly identical reincarnation of the state’s earlier anti-recording law, the main purpose of which was to charge people who record police encounters with a felony, an obvious and heavy-handed means of discouraging such recording. Illinois’s state supreme court threw the law out on the grounds that police do not have a reasonable expectation of privacy when carrying out their duties, though police and politicians argued the contrary — apparently, some part of the meaning of the phrase “public servants” eludes them. The new/old law is, by design, maddeningly vague, and will leave Illinois residents unsure of which encounters may be legally recorded and which may not.
Here is the solution: Pass a law explicitly recognizing the right of citizens to record police officers. It is important to note that such a law would recognize a right rather than create one: Government has no legitimate power to forbid free people from using cameras, audio-recording devices, or telephones in public to document the business of government employees. The statute would only clarify that Americans — even in Illinois — already are entitled to that right.
Kevin D. Williamson, “Prairie State Police State”, National Review, 2014-12-10.
January 7, 2016
QotD: The right to record police officers
December 4, 2015
QotD: “Dance like nobody’s watching”
I always laugh when I hear the phrase, “Dance like nobody’s watching.” It’s 2015. Everybody’s watching.
Jim Treacher, “Mac & Cheese Dude Is Sorry For Being An [Incredibly Unpleasant Person]”, The Daily Caller, 2015-10-13.
September 10, 2015
Making it easy for governments to monitor texts, emails, and other messages
Megan McArdle explains that while it’s quite understandable why governments want to maintain their technological ability to read private, personal communications … but that’s not sufficient justification to just give in and allow them the full access they claim that they “need”:
Imagine, if you will, a law that said all doors had to be left unlocked so that the police could get in whenever they needed to. Or at the very least, a law mandating that the government have a master key.
That’s essentially what some in the government want for your technology. As companies like Apple and Google have embraced stronger encryption, they’re making it harder for the government to do the kind of easy instant collection that companies were forced into as the government chased terrorists after 9/11.
And how could you oppose that government access? After all, the government keeps us safe from criminals. Do you really want to make it easier for criminals to evade the law?
The analogy with your home doors suggests the flaw in this thinking: The U.S. government is not the only entity capable of using a master key. Criminals can use them too. If you create an easy way to bypass security, criminals — or other governments — are going to start looking for ways to reproduce the keys.
[…]
Law enforcement is going to pursue strategies that maximize the ability to catch criminals or terrorists. These are noble goals. But we have to take care that in the pursuit of these goals, the population they’re trying to protect is not forgotten. Every time we open more doors for our own government, we’re inviting other unwelcome guests to join them inside.
I don’t really blame law enforcement for pushing as hard as possible; rare is the organization in history that has said, “You know, the world would be a better place if I had less power to do my job.” But that makes it more imperative that the rest of us keep an eye on what they’re doing, and force the law to account for tradeoffs, rather than the single-minded pursuit of one goal.
March 6, 2015
Las Vegas, home to “the country’s most developed surveillance state”
Megan McArdle recently visited Las Vegas and her reactions were recorded pretty much everywhere she went:
So this weekend, I went to Las Vegas for the first time. I’m not much of a gambler — I quit playing when they raise the minimums past $5 — but there’s enough of a theme-park aspect to the place that a few friends and I managed to have a terrific time. Two things immediately stand out to the libertarian visitor: In some ways, it has the most liberty of any place in the U.S. — and it also has the country’s most developed surveillance state.
First, the libertarian aspects: All sorts of things that aren’t allowed in normal cities are positively encouraged on the Vegas strip — gambling, obviously, but also things such as drinking and smoking in public. The casinos still allow smoking, and every bar is happy to give you a to-go cup if you don’t want to linger. I’m a little old for all-day drinking, but I did wander around an arcade with a frozen margarita, reveling in my newfound freedom.
[…]
Now for the creepy aspects: There are cameras everywhere. In the casinos, obviously, but also on the streetlights, the walls and every overhang. When I asked the cab driver whether there was much crime on the Strip, he laughed and pointed to the cameras. “No crime,” he said. “No point. Cameras everywhere.”
So I left Vegas with a question: Is the friendly police state the price of the freedom to drink and gamble with abandon? Whatever your position on vice industries, they are heavily associated with crime, even where they are legal. Drinking makes people both violent and vulnerable; gambling presents an almost irresistible temptation to cheating and theft. Las Vegas has Disneyfied libertinism. But to do so, it employs armies of security guards and acres of surveillance cameras that are always and everywhere recording your every move.
This is a question I’ve asked myself before, funnily enough, when arguing with anarcho-capitalists. For those who do not follow the ins and outs of libertarian sectarianism, anarcho-capitalists want to replace the state with private institutions, with insurance companies and private security forces substituting for most current government functions. But when I’ve probed into the actual mechanics of this, I’ve often found that anarcho-capitalists end up describing something unpleasantly like a police state, only not called “the government” — like giving insurance companies and private police forces the ability to perform warrantless at-will searches in order to prosecute crimes. One way or another, society is going to protect itself against theft and violence, rape and murder, and putting those tools in the hands of private parties causes much the same trouble as they do in the hands of the police.
February 15, 2015
“Smart” TV? Oh, no thanks. I prefer mine not to spy on my every word…
At Techdirt, Karl Bode sings the praises of dumb TVs that don’t share your every word with unspecified “third parties” who may or may not have any compunction about further sharing of what happens in your home (within audio range of your TV, anyway):
Samsung has been doing a great job this week illustrating why consumers should want their televisions to be as dumb as technologically possible. The company took heat for much of the week after its privacy policy revealed Samsung smart TVs have been collecting and analyzing user living room conversations in order to improve voice recognition technology. While that’s fairly common for voice recognition tech, the idea of living room gear that spies on you has been something cable operators have been patenting for years. And while Samsung has changed its privacy policy language to more clearly illustrate what it’s doing, the fact that smart TV security is relatively awful has many people quite justly concerned about smart TVs becoming another poorly-guarded repository for consumer data.
But it’s something else stupid that Samsung did this week that got less press attention, but that I actually find far more troubling. Numerous Samsung smart TV users around the world this week stated that the company has started injecting ads into content being watched on third-party devices and services. For example, some users found that when streaming video content from PC to the living room using Plex, they suddenly were faced with a large ad for Pepsi that actually originated from their Samsung TV:
“Reports for the unwelcome ad interruption first surfaced on a Subreddit dedicated to Plex, the media center app that is available on a variety of connected devices, including Samsung smart TVs. Plex users typically use the app to stream local content from their computer or a network-attached storage drive to their TV, which is why many were very surprised to see an online video ad being inserted into their videos. A Plex spokesperson assured me that the company has nothing to do with the ad in question.”
Now Samsung hasn’t responded yet to this particular issue, and you’d have to think that the company accidentally enabled some kind of trial ad injection technology, since anything else would be idiotic brand seppuku (in fact it does appear like it has been working with Yahoo on just this kind of technology). Still, users say the ads have them rushing to disable the smart portion of Samsung TVs, whether that’s by using a third party solution or digging into the bowels of the TV’s settings to refuse Samsung’s end user agreement. And that raises an important point: many consumers (myself included) want their TV to be as slack-jawed, glassy-eyed, dumb and dim-witted as possible.
February 9, 2015
The fantasy that CSE/CSIS oversight will actually protect the privacy of Canadians
Michael Geist on the rather disturbing news that Canadian intelligence agencies are busy watching the uploads of every internet user (including the Canadian users that CSE/CSIS are theoretically banned from tracking by the letter of the law):
… the problem with oversight and accountability as the primary focus is that it leaves the substantive law (in the case of CSE Internet surveillance) or proposed law (as in the case of C-51) largely unaddressed. If we fail to examine the shortcomings within the current law or within Bill C-51, no amount of accountability, oversight, or review will restore the loss of privacy and civil liberties.
First, consider the Snowden revelations that the CSE has been the lead on a surveillance initiative that gathers as many as 15 million uploads and downloads per day from a wide range of hosting sites that even appear to include the Internet Archive. The goal is reputed to be to target terrorist propaganda and training materials and identify who is uploading or downloading the materials. The leaked information shows how once a downloader is identified, intelligence agencies use other databases (including databases on billions of website cookies) to track the specific individual and their Internet use within hours of identified download.
The Levitation program, which removes any doubt about Canada’s role in global Internet surveillance, highlights how seemingly all Internet activity is now tracked by signals intelligence agencies. Note that the sites that host the downloads do not hand over their usage logs. Rather, intelligence agencies are able to track who visits the sites and what they do from the outside. That confirms a massive surveillance architecture of Internet traffic operating on a global scale. Is improved oversight in Canada alone going to change this dynamic that crosses borders and surveillance agencies? It is hard to see how it would.
Moreover, these programs point to the fundamental flaw in Canadian law, where Canadians are re-assured that CSE does not – legally cannot – target Canadians. However, mass surveillance of this nature does not distinguish between nationalities. Mass surveillance of a hundred million downloads every week by definition targets Canadians alongside Internet users from every corner of the globe. To argue that Canadians are not specifically targeted when it is obvious that the personal information of Canadians is indistinguishable from everyone else’s data at the time of collection, is to engage in meaningless distinctions that only succeed in demonstrating the weakness of Canadian law. Better oversight of CSE is needed, but so too is a better law governing CSE activities.
December 23, 2014
Creepy Christmas “traditions” – Elf et Michelf
Published on 14 Dec 2013
Foucault’s take on the elf on the shelf through an imagined conversation by @DrLauraPinto
H/T to Anthony L. Fisher for the video link:
Dr. Laura Elizabeth Pinto, a digital technology professor at the University of Ontario Institute of Technology, thinks Elf on the Shelf poses a criticial ethical dilemma. In a paper for the Canadian Centre for Policy Alternatives, Pinto wonders if the Elf is “preparing a generation of children to accept, not question, increasingly intrusive (albeit whimsically packaged) modes of surveillance.”
Sensing that she might come off as a humorless paranoid crank, Pinto clarified her position to the Washington Post:
“I don’t think the elf is a conspiracy and I realize we’re talking about a toy. It sounds humorous, but we argue that if a kid is okay with this bureaucratic elf spying on them in their home, it normalizes the idea of surveillance and in the future restrictions on our privacy might be more easily accepted.” (Emphasis mine).
One could argue that the millions of adults walking around with NSA-trackable and criminal-hackable smartphones in their pockets are far more influential than a seasonal doll in setting the example to the next generation that surveillance is inevitable and Big Brother is not to be feared. Still, Pinto has a point when she writes:
What The Elf on the Shelf represents and normalizes: anecdotal evidence reveals that children perform an identity that is not only for caretakers, but for an external authority (The Elf on the Shelf), similar to the dynamic between citizen and authority in the context of the surveillance state.
December 17, 2014
Canadian telcos: “there is no need for legally mandated surveillance and interception functionality”
Sounds good, right? Canada’s telecom companies telling the government that there’s no reason to pass laws requiring surveillance capabilities … except that the reason they’re saying this is that “they will be building networks that will feature those capabilities by default“:
After years of failed bills, public debate, and considerable controversy, lawful access legislation received royal assent last week. Public Safety Minister Peter MacKay’s Bill C-13 lumped together measures designed to combat cyberbullying with a series of new warrants to enhance police investigative powers, generating criticism from the Privacy Commissioner of Canada, civil liberties groups, and some prominent victims rights advocates. They argued that the government should have created cyberbullying safeguards without sacrificing privacy.
While the bill would have benefited from some amendments, it remains a far cry from earlier versions that featured mandatory personal information disclosure without court oversight and required Internet providers to install extensive surveillance and interception capabilities within their networks.
The mandatory disclosure of subscriber information rules, which figured prominently in earlier lawful access bills, were gradually reduced in scope and ultimately eliminated altogether. Moreover, a recent Supreme Court ruling raised doubt about the constitutionality of the provisions.
[…]
Perhaps the most notable revelation is that Internet providers have tried to convince the government that they will voluntarily build surveillance capabilities into their networks. A 2013 memorandum prepared for the public safety minister reveals that Canadian telecom companies advised the government that the leading telecom equipment manufacturers, including Cisco, Juniper, and Huawei, all offer products with interception capabilities at a small additional cost.
In light of the standardization of the interception capabilities, the memo notes that the Canadian providers argue that “the telecommunications market will soon shift to a point where interception capability will simply become a standard component of available equipment, and that technical changes in the way communications actually travel on communications networks will make it even easier to intercept communications.”
In other words, Canadian telecom providers are telling the government there is no need for legally mandated surveillance and interception functionality since they will be building networks that will feature those capabilities by default.
The Internet is on Fire | Mikko Hypponen | TEDxBrussels
Published on 6 Dec 2014
This talk was given at a local TEDx event, produced independently of the TED Conferences. The Internet is on Fire
Mikko is a world class cyber criminality expert who has led his team through some of the largest computer virus outbreaks in history. He spoke twice at TEDxBrussels in 2011 and in 2013. Every time his talks move the world and surpass the 1 million viewers. We’ve had a huge amount of requests for Mikko to come back this year. And guess what? He will!
Prepare for what is becoming his ‘yearly’ talk about PRISM and other modern surveillance issues.
November 8, 2014
Republicans and the Patriot Act re-authorization in May 2015
Conor Friedersdorf on the ethical and moral challenge that will face the Republican members of the next Congress soon after they take office:
The Patriot Act substantially expires in May 2015.
When the new Congress takes up its reauthorization, mere months after convening, members will be forced to decide what to do about Section 215 of the law, the provision cited by the NSA to justify logging most every telephone call made by Americans.
With Republicans controlling both the Senate and the House, the GOP faces a stark choice. Is a party that purports to favor constitutional conservatism and limited government going to ratify mass surveillance that makes a mockery of the Fourth Amendment? Will Mitch McConnell endorse a policy wherein the Obama administration logs and stores every telephone number dialed or received by Roger Ailes of Fox News, Wayne LaPierre of the NRA, the Koch brothers, the head of every pro-life organization in America, and every member of the Tea Party? Is the GOP House going to sacrifice the privacy of all its constituents to NSA spying that embodies the generalized warrants so abhorrent to the founders?
The issue divides elected Republicans. Senator Rand Paul and Representative Justin Amash are among those wary of tracking the phone calls of millions of innocent people. Senator Richard Burr favors doing it. Republicans pondering a run for president in 2016 will be trying to figure out how mass surveillance will play in that campaign.
Many would rather not take any stand before May, as if governing — the very job citizens are paying them to do — is some sort of trap. But their preferences don’t matter. This fight is unavoidable.
Sadly, the smart money is betting that they’ll flub it and just re-authorize with little or no changes to the most offensive parts of the legislation. Because 2016.
October 29, 2014
Charles Stross – Communist and post-communist Britain, history that didn’t happen
Charles Stross wanders in a Britain of today in a world where Stalin won World War 2, taking all of western Europe into the control of the Soviet Union in the early 1940s:
Here’s a brief thought-experiment for you: imagine what the UK would look like today if the outcome of the second world war had taken a left turn early in 1940, and the whole of western Europe somehow ended up under Soviet control by 1946. (No nuclear weapons or gas attacks need apply: this speculation is about outcomes, not processes — so discussion of precisely how the British People’s Democratic Republic comes about is left as an exercise for the reader (and is not to be explored in comments)).
Let us further postulate that Stalinism passes with its creator, much as happened in our own experience of history: that the Soviet empire eventually undergoes the same fiscal crisis and collapse (alternative discussion of the same process by a former Soviet minister — you can forget the urban legend that Ronald Reagan did it) much as we remember, except possibly somewhat later — as late as the early 21st century, perhaps.
What interests me, in view of recent revelations about police spying and the extent of the British surveillance state is: How would the practice of internal suppression of dissent and state surveillance have differed in a post-Soviet Britain from what we appear to be living with right now?
“Whereof one cannot speak, thereof one must be silent”: as we have no way of knowing when the regime of the British Democratic People’s Republic fell, or what level of technology was available to them, purely technical aspects of the Communist surveillance state of the British Isles must be excluded.
However, we know the general shape of the ideological envelope within which Warsaw Pact regimes operated (or were allowed to operate, before the Kremlin jerked their choke-chain), and so we can speculate as to the structure and objectives of the British regime under Actually Existing Socialism.
September 24, 2014
QotD: Privacy and cell phones
People who were charged with a crime in England used to be told by the police that they did not have to say anything, but that anything they did say might be taken down and used as evidence against them. I think we should all be given this warning whenever we use a mobile telephone.
Theodore Dalrymple, “Nowhere to Hide”, Taki’s Magazine, 2014-02-23
September 19, 2014
Doctorow – “The time has come to create privacy tools for normal people”
In the Guardian, Cory Doctorow says that we need privacy-enhancing technical tools that can be easily used by everyone, not just the highly technical (or highly paranoid) among us:
You don’t need to be a technical expert to understand privacy risks anymore. From the Snowden revelations to the daily parade of internet security horrors around the world – like Syrian and Egyptian checkpoints where your Facebook logins are required in order to weigh your political allegiances (sometimes with fatal consequences) or celebrities having their most intimate photos splashed all over the web.
The time has come to create privacy tools for normal people – people with a normal level of technical competence. That is, all of us, no matter what our level of technical expertise, need privacy. Some privacy measures do require extraordinary technical competence; if you’re Edward Snowden, with the entire NSA bearing down on your communications, you will need to be a real expert to keep your information secure. But the kind of privacy that makes you immune to mass surveillance and attacks-of-opportunity from voyeurs, identity thieves and other bad guys is attainable by anyone.
I’m a volunteer on the advisory board for a nonprofit that’s aiming to do just that: Simply Secure (which launches Thursday at simplysecure.org) collects together some very bright usability and cryptography experts with the aim of revamping the user interface of the internet’s favorite privacy tools, starting with OTR, the extremely secure chat system whose best-known feature is “perfect forward secrecy” which gives each conversation its own unique keys, so a breach of one conversation’s keys can’t be used to snoop on others.
More importantly, Simply Secure’s process for attaining, testing and refining usability is the main product of its work. This process will be documented and published as a set of best practices for other organisations, whether they are for-profits or non-profits, creating a framework that anyone can use to make secure products easier for everyone.
September 14, 2014
Latest Snowden revelation – NSA and GCHQ have full access to German telecom systems
In The Register, Kelly Fiveash sums up the latest information from Edward Snowden:
An NSA and GCHQ surveillance programme — dubbed Treasure Map — grants US and British spooks access to the networks of German telcos such as Deutsche Telekom, according to a new stash of leaked documents from Edward Snowden.
Der Spiegel published the latest revelations today. However, Deutsche Telekom reportedly said it had found no evidence of such tampering on its system.
“We are looking into every indication of possible manipulations but have not yet found any hint of that in our investigations so far,” a spokesman at the company told Reuters.
He added: “We’re working closely with IT specialists and have also contacted German security authorities. It would be completely unacceptable if a foreign intelligence agency were to gain access to our network.”
The Register sought comment from the telco, but it hadn’t immediately got back to us at time of writing.
The Treasure Map programme was described by Snowden as “a 300,000 foot view of the internet” in a New York Times story published in November last year.
August 5, 2014
New ways to bug a room
MIT, Adobe and Microsoft have developed a technique that allows conversations to be reconstructed based on the almost invisible vibrations of surfaces in the same room:
Researchers at MIT, Microsoft, and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video. In one set of experiments, they were able to recover intelligible speech from the vibrations of a potato-chip bag photographed from 15 feet away through soundproof glass.
In other experiments, they extracted useful audio signals from videos of aluminum foil, the surface of a glass of water, and even the leaves of a potted plant. The researchers will present their findings in a paper at this year’s Siggraph, the premier computer graphics conference.
“When sound hits an object, it causes the object to vibrate,” says Abe Davis, a graduate student in electrical engineering and computer science at MIT and first author on the new paper. “The motion of this vibration creates a very subtle visual signal that’s usually invisible to the naked eye. People didn’t realize that this information was there.”
[…]
Reconstructing audio from video requires that the frequency of the video samples — the number of frames of video captured per second — be higher than the frequency of the audio signal. In some of their experiments, the researchers used a high-speed camera that captured 2,000 to 6,000 frames per second. That’s much faster than the 60 frames per second possible with some smartphones, but well below the frame rates of the best commercial high-speed cameras, which can top 100,000 frames per second.
I was aware that you could “bug” a room by monitoring the vibrations of a non-soundproofed window, at least under certain circumstances, but this is rather more subtle. I wonder how long this development has been known to the guys at the NSA…



