"The National Data Center and Personal Privacy," an article published in the Atlantic in November, 1967, was eerily prescient in its predictions of the coming data-mining panopticon and the resulting loss of civil liberties. It was written by Arthur Miller, but not the guy who wrote The Crucible.
But such a Data Center poses a grave threat to individual freedom and privacy. With its insatiable appetite for information, its inability to forget anything that has been put into it, a central computer might become the heart of a government surveillance system that would lay bare our finances, our associations, or our mental and physical health to government inquisitors or even to casual observers. Computer technology is moving so rapidly that a sharp line between statistical and intelligence systems is bound to be obliterated. Even the most innocuous of centers could provide the “foot in the door” for the development of an individualized computer-based federal snooping system...
Any increase in the amount of recorded information is certain to increase the risk of errors in reporting and recording and indexing. Information distortion also will be caused by machine malfunctioning. Moreover, people working with the data in Washington or at a distance through remote terminals can misuse the information. As information accumulates, the contents of an individual’s computerized dossier will appear more and more impressive and will impart a heightened sense of reliability to the user, which, coupled with the myth of computer infallibility, will make it less likely that the user will try to verify the recorded data. This will be true despite the “softness” or “imprecision” of much of the data. Our success or failure in life ultimately may turn on what other people decide to put into our files and on the programmer’s ability, or inability, to evaluate, process, and interrelate information. The great bulk of the information likely to find its way into the center will be gathered and processed by relatively unskilled and unimaginative people who lack discrimination and sensitivity. Furthermore, a computerized file has a certain indelible quality – adversities cannot be overcome simply by the passage of time.
In the wake of the Paris attacks, the French National Assembly has declared a state of emergency with sweeping powers, without any substantial debate. Included in the bill are the power to order the nation’s ISPs to block websites without any judicial review or court order, and for authorities to seize and search electronic devices […]
The $825,000 Z Backscatter Vans the NYPD drives around the city look like regular police vans, but are equipped with powerful X-rays that can see through walls and vehicles. US Customs uses these things to scan cars and freight-containers, but only after they’re sure there are no people around.
“The End of the Internet Dream,” cyberlawyer Jennifer Granick’s keynote at Black Hat, was all anyone could talk about at this year’s Defcon — Black Hat being the grown-up, buttoned-down, military-industrial cousin to Defcon’s wild and exuberant anarchy.
The Micro Drone 2.0+ is truly in a league of its own, offering a new perspective on aerial photography, and a world of technological capabilities that make flying ridiculously fun. Simply throw it in the air at any angle and its self-correcting algorithm will stabilize for smooth sailing in no time. You’ll stay entertained with […]
Celebrate Cyber Monday with some brain food. Save on any eLearning deal in the Boing Boing Store today using coupon code: CYBERMONDAY25. Below are a couple of our favorite eLearning offers: eduCBA Tech Training Bundle: Lifetime Subscription:Welcome to your personal online classroom, where you can finally study at your own pace, on your own time (and […]
This minimalist multi-tool will see to it that instead of rocking a tool belt, you’ll carry just one. It’s shaped slightly like a key and weighs less than an ounce, so it plays nice with your keychain. The strong surgical-grade stainless steel blade will last, and is handy for everyday tasks like opening boxes and […]