The NYT's "Room for Debate" section asked a variety of people for positions on the UK's Great Firewall of Cameron -- a new rule whereby ISPs must slap an "adult content" filter on every Internet connection in the land, which is meant to stop everything from porn to gambling sites to "esoteric material" (whatever that is). I wrote one of the pieces, as did many others.
The companies that supply networked censorware turn a profit selling to dictatorships, like the United Arab Emirates, where network filters from American companies were used to suppress footage of a member of the royal family torturing a man and then running him over with a luxury car (the software also handily compiled a list of everyone who was trying to look at that video, which must have been useful for the secret police, whose boss was, coincidentally, the royal torturer caught in the video).
The companies repackage this software for use by Fortune 100 companies, libraries and schools, which must censor according to the terms of the Communications Decency Act – and now, for use by all of Britain's Internet service providers. In practice, the British law means shipping the nation's Internet traffic offshore for processing and surveillance by criminal regimes and their allies.
No one seriously pretends that this will stop kids who want to look at porn from finding it. But a regime of total, national surveillance in the name of protecting children serves an important political purpose. It satisfies the security syllogism: “Something must be done! I have done something. There now, something has been done.”
Can Free Speech and Internet Filters Co-Exist?
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
danah boyd writes, “Yesterday, a group of us at Data & Society put out six essays on ‘media, technology, politics.’ Taken together, these pieces address different facets of the current public conversation surrounding propaganda, hate speech, and the US election. Although we only allude to specifics, we have been witnessing mis/disinformation campaigns for quite some […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]
One of the best ways to progress a career in project management is through earning recognized certifications. These certifications carry significant clout and don’t require expensive tuition or student loans. This Ultimate Project Management Certification Bundle is a great example of an affordable way to get ahead. It includes training for 9 certifications including PMP, […]