The recent revelations on X-Keyscore come at a time when the English speaking world is putting the final nails in the coffin of individual rights, the basis of civil society. While the latest surveillance system raises more questions as to the nature of its implementation and infrastructure, its existence is proof of the absolute contempt for citizens' rights that the "Free World" once prided itself on.
This is not an isolated trend. From the US to even New Zealand, politicians are eager to justify increasingly unpopular spying. Part of me wonders if the rush of these bills are not intended for future implementation, but rather post-hoc justification for questionable activities that have been going on for some time. Given the communication between the 'Five Eyes' intelligence agencies (especially in the post-9/11 chaos), this may not be totally out of the question.
However, an interesting dynamic remains. What if the public were given access directly to these tools? Not merely knowledge of their existence (as Snowden and other whistleblowers had provided), but allowed to view politicians and their own requests/demands for information? Imagine a bill allowing public recognition of an administration's information demands, requests, and the like disclosed after they leave office. Of course, the statue of legal limitations regarding certain crimes would definitely be a point of contention. The surveillance infrastructure exists (and can break common types of encryption), so why not allow taxpayers to turn it against the would be kleptocrats that currently control it?
A mad scientist covers disruptive technologies, subversive methods, and how things go wrong.
Showing posts with label surveillance. Show all posts
Showing posts with label surveillance. Show all posts
Thursday, 1 August 2013
Thursday, 20 June 2013
Rise of the Mesh
While I could harp for
hours on the spying scandals, others cover that with far greater skill and
depth than I am capable of. The economic consequences for
the US result in foreign clients moving outside the spied upon American cloud
to greener pastures elsewhere. In addition, technologies are evolving in a
direction that is extremely difficult for centralized institutions to control. Automated
manufacture, crypto-currencies, basement biochem labs, and solar power is only
one aspect. Another is the very nature of the Internet and computer networks
themselves. Project Meshnet project aims to create an open source, nearly
impossible to shut down, censorship resistant alternatives to conventional
internet service providers.
The basic premise is a P2P
network built from scratch, easy to deploy with little overhead. Interestingly,
Google has investigated the concept of using stratellites, balloons covering a
region in wi-fi. Little overhead (no pun intended) is required, save a balloon
and specialized wireless router. Their Loon project aims to bring internet to
the Southern Hemisphere, recently launching from New Zealand. As one balloon
leaves an area of coverage, another arrives. As patents expire and competitors
appear, I imagine others will try the same (or a similar) strategy.
Such efforts would be
difficult to accomplish, short of blasting the balloons out of the sky (which
in itself is no mean technical feat). The primary technical battles of the
coming century, I believe, will be the battle of decentralized, autonomous
networks against the corrupted husks of nation-states (with rent-seeking
kleptocrats behind them). In short, a fight between the T-1000 and Dracula. Already,
criminal and non-state groups have deployed conventional communications infrastructure
outside government control. Darknets already exist, and further revelations
will only drive them on more.
Thursday, 13 June 2013
Fun With Surveillance
In light of the recent surveillance revelations, supervillainy abounds. While I'm sure the status quo is well aware of my identity, I'd like to put a few things in comparison. First, the main issue with warrantless surveillance is that is a rather poor tactic as far as far as terrorism prevention goes. Secondly, it puts a lot of private information at the hands of government and corporate entities which may target certain individuals or groups in the future (even if not today). Third, it violates the principles of due process enshrined in centuries of law, and likewise makes transparency of Big Brother much harder.
Much of PRISM operated in a legal black hole, outside of the regular checks and balances. However, as Robert Heinlein said, "Privacy laws make the bugs smaller." Even if this program is shut down, future projects may well continue. While the cypherpunks are trying to hide and encrypt themselves, the status quo will try to break their codes. However, the symbolic resistance of encryption is still a method of self defense available to most people. While it might not totally prevent government spying, it still can make it harder for hackers and identity thieves from stealing your information.
Much of PRISM operated in a legal black hole, outside of the regular checks and balances. However, as Robert Heinlein said, "Privacy laws make the bugs smaller." Even if this program is shut down, future projects may well continue. While the cypherpunks are trying to hide and encrypt themselves, the status quo will try to break their codes. However, the symbolic resistance of encryption is still a method of self defense available to most people. While it might not totally prevent government spying, it still can make it harder for hackers and identity thieves from stealing your information.
Subscribe to:
Posts (Atom)