I’ve got a suspicion that 2013 could very well go down as a fulcrum point in contemporary history, as well as in my own meager part in it. Julian Assange’s pinprick has now become Edward Snowden’s stab to the jugular vein, and meanwhile, I’ve had to provisionally decide how I’m going to steer the imminent deluge.
Here’s my thought process, and I’ll put it frankly to my audience: we should all be expecting in the near future the replacement of the GWOT (Global War on Terrorism) with the GWOH (Global War on Hacking). Consider: all it would take would be one massive power grid failure or some other similar immense infrastructural disruption, and then a logical but ultimately evidence-independent speculation (“we have reason to believe hackers were behind it”) to roll out new Patriot Act-like powers that effectively render criminal any technological attempt to maintain individual or collective privacy, much less to peer into the secrets of power.
The idea is not strictly-speaking mine. I heard it mumbled about in some quarters at the recent OHM2013 convention. However, other than an obscure comment to a 2011 editorial (copied in the post-script of this post), there’s nothing about in on the public web. So, let me spell it out a bit here, and then explain my own position, which I hope is moderate. And if not moderate, then at least independent…
Continue reading “The coming Global War on Hacking?”
So, this post is regarding the Prism program, and the phenomenon of mass-level metadata accumulation and pattern analysis that it represents. ProPublic has published an extremely useful timeline about how the United States intelligence community has developed to this point (such as we can know on the outside, given the high amount of top secret classification). Meanwhile, my colleague Joshua Foust (who has testified before Senate about over-classification and other problems in the intelligence industry — among other things, that it’s an industry), has published nine points about Prism that the public should think about. The most important are points #3, 7, and 8.
Joshua’s remarks border on the cynical, but nonetheless he is onto something. With respect to his last point, my job here is to explain about why this shouldn’t be a temporary outcry. And the explanatory methodology is simple (and I would say, spiritual). The consequences, however, are complex. (I) On the one hand, the citizen and the spy need to put themselves into each other’s shoes; and (II) on the other hand, the citizen needs to really understand what is being asked of him/her by the spy, but also why the spy shouldn’t be asking this of the citizen, either.
Continue reading “Looking through a prism darkly: citizen-spy epistemology”