National security issues arise when IoT reporting reveals information about troop movements and locations.
The accumulation of data points for every person on earth continues at an amazing rate, and from an amazing diversity… Read More
Zuckerberg’s acknowledgement of the need to address issues related to election influence, “fake news,” and social media addiction is a significant step.
As technological advances disrupt existing markets and value networks, change can outpace our ability to adapt.
Cybersecurity expert Yan Shoshitaishvili joins Heather Ross to talk about the cybersecurity and social implications of the FCC’s December 2017… Read More
Australian Aboriginal sovereignty is no longer just about Aboriginal communities retaining rights to their own land. The most brutal types of dispossession are the latest forms of data retention, decreased privacy, and unwarranted use of this personal data as a result of activities being collected, analyzed, and intelligently manipulated by geographically remote entities, all thanks to the Internet.
I’m still looking for a Word file containing the 1995 family history I published. When I find this, it will… Read More
By web evolution I’m not talking Internet 4.0, I’m talking Darwinian survival. In the Darwinian model, evolution requires three things:… Read More
Where did the privacy slippery slope begin? Or perhaps asking the question with more focus, when did we start trading… Read More
We may be passing a tipping point in the area of individualized marketing/advertising. This has surfaced as the U.S. Federal… Read More
Using biometric technology to identify and monitor people raises human rights concerns. In particular, biometrics are often associated with intrusions into privacy.
All web sites such as this, that permit feedback, comments, etc., get some amount of “SPAM” (with apologies to Hormel)… Read More
During the last century a variety of surveillance technologies have arrived, have been deployed, and have had impacts on society,… Read More
This piece briefly outlines the legal implications of surveillance, sousveillance, and “whistle-blowing” in a German human rights context. For the… Read More
Looxcie 2 Video Camera. Source: http://www.flickr.com/photos/54450095@N05/6345166957. The point of view (POV) camera is a compact portable device carried by police… Read More
Aerial drones are increasingly being repurposed for domestic use and legislated for public and commercial purposes around the world. Japan,… Read More
Cyberwar is insidious, invisible to most, and is fought out of sight. It takes place in cyberspace, a location that… Read More
The United States is now debating the wisdom of limits on monitoring by the National Security Agency (NSA). While the… Read More
Kannanshanmugam, Shanmugamstudio, Kollam/Creative Commons Attribution-Share Alike 3.0 Unported The Aadhaar (Unique Identity) project has become the bane of average Indians,… Read More
The Circle. By Dave Eggers. Knopf, 2013. Reviewed by Scott D. Eldridge. Have you taken the plunge and purchased one… Read More