security

Microchip Implants and Prisoner Monitoring

Here is an open petition to the Scottish Parliament from the Howard League in 2009. Below this petition is a paper by Professor Mike Nellis, Professor of Criminal and Community Justice, Glasgow School of Social Work, University of Strathclyde. I am embarrassed to say that I had not come across the work of Nellis till now, and only as a direct result of his book chapter published last year which I found while searching for the term uberveillance on another matter altogether. 

Nellis has written a book chapter titled: "Implant Technology and the Electronic Monitoring of Offenders: Old and New Questions about Compliance, Control and Legitimacy", in Legitimacy and Compliance in Criminal Justice edited by Adam Crawford and Anthea Hucklesby. See for example, books.google.com/books?isbn=0415671558.

Now who said these things were not possible? If we are writing petitions against implantation of prisoners, then we are getting close to instituting this practice. From wearable bracelets to implantables...

Inspiration for my prisoner tracking scenario in my TEDx talk, came from research I conducted with Kirsty Johnston in 2005. We set up an online survey with a pre-test | education | post-test structure. The results were very interesting. Of exactly 100 responses, the vast majority said they did not wish to be chipped for control, care on convenience solutions. But when it came to controlling prisoners using implants, it was obvious that that scenario seemed acceptable to most. Again, only 100 responses, and small-scale survey, and online, but it revealed some interesting preliminary findings.

More on that study here presented at ICMB 2007 by MG Michael. The full honours project is available here. For statistics on the acceptance of the tracking of crime suspects see p. 56 of the project.

Source: http://archive.scottish.parliament.uk/s3/committees/petitions/petitionsubmissions/sub-09/09-PE1251C.pdf

Source: http://archive.scottish.parliament.uk/s3/committees/petitions/petitionsubmissions/sub-09/09-PE1251C.pdf

Can You Imagine Remote Admin Tools Targetting Digital Glass

An article that should make most of us think about Digital Glass. We all think it won't happen to u because we are too computer savvy, but think again!

Good on you Nate Anderson for writing this piece. It is revealing in every sense of the word!

If you intend to be a Digital Glass user, don't think this stuff is not possible in the wearable space... it's just a matter of time.

More here.

""See! That shit keeps popping up on my fucking computer!" says a blond woman as she leans back on a couch, bottle-feeding a baby on her lap.
The woman is visible from thousands of miles away on a hacker's computer. The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman's screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun. He enters a series of shock and pornographic websites and watches them appear on the woman's computer.
The woman is startled. "Did it scare you?" she asks someone off camera. A young man steps into the webcam frame. "Yes," he says. Both stare at the computer in horrified fascination. A picture of old naked men appears in their Web browser, then vanishes as a McAfee security product blocks a "dangerous site."
"I think someone hacked into our computer," says the young man."

Courtesy: ArsTechnica

Courtesy: ArsTechnica

Courtesy: ArsTechnica

Courtesy: ArsTechnica

Identity Awareness Of Research Data

"...The research landscape is fast changing, presenting challenges for researchers in the domains of the veillances and associated social computing as they move to a model of open access and reuse of data.

This paper identifies how legal capacity, technical expertise, research capability and strategic policy enables re-use of research data in the domains of the veillances and associated social computing. Identity awareness addresses the required connectivity between research data and other elements in research ecosystems in order to make the data available and reusable beyond the initial research.

These connections include relations between the data, researchers, publications and research grants. In this paper correlations are drawn between veillances, social computing and best practice principles of identity awareness of research data in the domain of eScience.

A number of dataset cases articulate the challenges that face researchers as they seek to expose data created as a result of veillance or social computing research activities.

Read more