Saturday, June 29, 2013

Too Much Information

Big Data, Big Brother and the struggle to keep them out of your private life

It's hard not to get caught up in the strange and frightening world evoked by recent disclosures of secret government surveillance of our private lives. It has sent many citizens searching for answers as to what information is in fact being collected, when and how. It's all still very unclear.

A Wikipedia article on covert listening devices tells how with today's technology it's possible that "cell phone microphones can be activated remotely, without any need for physical access," a thought which is sure to arouse paranoia in almost anyone. This New York Times blog post titled "Why Snowden Asked Visitors in Hong Kong to Refrigerate Their Phones," chillingly underscores the claim.

Scary Cold War notions of espionage aside, our Big Brother era has come about mostly from the love of Big Data, which is gathered by sucking information from everywhere possible, and which has blurred the boundaries of the public and private domain. And though Big Data itself is not an evil concept (a seemingly benign and useful tool for architects, designers, coders and researchers, et cetera, working for the greater good), there is a grave need for established rules with its use. The articles below address that notion.

Effective privacy protection in social networks
Republished via Fraunhofer Press.

Researchers are working on new methods to help them gain a better understanding of the usage habits of participants in social networks. The results will be incorporated in the development of userfriendly tools for privacy protection.

In principle, social networks such as Facebook are a good things: users can communicate with other people around the globe, contacting their closest friends in all places and at all times to share experiences with them in real time. Yet many users have problems publishing posts and photos in a way that will protect them from the undesirable side effects to their online identities. To support users’ desire for "interactional privacy" - protection of the user’s private sphere in online dealings with other people - suggested improvements have already been made for networks such as Facebook. In a practical setting, however, these improved means are either too rigid to do justice to users’ multifaceted habits, or they are very complicated to manage because they try to solve a host of different problems all at the same time.

"If we want to develop truly user-friendly tools, we have to understand users better," according to Andreas Poller of the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt. Together with researchers at Goethe University in Frankfurt am Main, for five years, now, he has been working on a project, "Software Design for Interactional Privacy within Online Social Networks," that will create new methods of collecting and evaluating data on usage habits in online social networks ( In contrast to previous studies, researchers not only want to identify the weak spots in privacy management but also want their work to support the design of more effective privacy tools.

Ingenious study design

Initially, researchers focused their attention exclusively on qualitative interviews. Since then, they have begun combining their surveys with analytical software developed at SIT to document Facebook activities by study participants. "To make sure that this tool does not influence user behavior - as would be the case, for instance, if a study participant felt he or she was being monitored by the software - we have intentionally designed it to give study subjects full control over their data," Poller explains. The software runs on the user’s computer, and not on an external server. Content is not recorded - only the technical functions used. A special commentary function provided by the software inserts itself into the Facebook user interface to give users an opportunity to comment directly, "on site," on their usage behavior and experiences. Data are not automatically transmitted; instead study participants must forward them to the researchers. In a form of protocol, they can first review the documentation and modify it wherever they wish.

"Thanks to the close dovetailing of the two research methods, we can interpret technical facts from the user's perspective," Poller points out. While qualitative interviews often reveal interesting aspects and statements of the problem, they cannot be implemented on a one-to-one basis in specific software design. "You also have to know what problems are specifically a result of the technology involved," Poller says. Designs developed purely on the basis of technological expertise, on the other hand, lack any reference to users' habits. A knowledge deficit about the ways in which people and technology interact can also lead to false conclusions – as in the case of the "privacy paradox" in which users indicate that they attach great importance to their privacy but have selected very open settings for their Facebook account. "At first glance, this looks like a contradiction. In fact, though, it may well be that the user has only provided spare information in his or her profile and doesn’t post anything and thus needs no restrictive protective settings at all," Poller explains.

With their work, the researchers want to help improve the design process of software for social networks. The results of the study are regularly presented to the community of researchers, and the analytical tool is available as open source software. In March of last year, the project team was presented with the coveted Google Faculty Research Award for their efforts on behalf of improved privacy protection.


Everyday Anti-drone Fashions

Stealth Wear keeps predators like this away. Via (Wikipedia).
New York artist Adam Harvey has been exploring the possibilities of counter-surveillance fashion. His latest addition is a collection of clothes and accessories called Stealth Wear. It features items that cloak the wearer from being spotted by unmanned aircraft. Hence the anti-drone hoodie and scarf, which are specially designed to thwart the thermal-imaging technology widely used by UAVs. Additionally available is the OFF Pocket, a phone accessory that blocks all incoming and outgoing communication from your phone. Check out the Guardian's write up for more...

Continue to article

Likewise, these smart new anti-facial recognition glasses would be fabulous with an anti-drone hoodie and scarf...


Occupy Google Maps

English: Google Street View Car in Southampton...
English: Google Street View Car. (Image: Wikipedia)
The feds aren't the only ones peddling your deep secrets these days. Due to lack of regulation and weak consumer privacy laws in the US, tech giants like Google are swimming in peoples private data. Google, in particular, seems limitless in this regard.

This compelling piece from Motherboard explores the intriguing world of Google Street View, where, as the author states, "Google’s cars roam city streets like the surreptitious scouts of an advancing army: they spy on buildings, cars, and occasionally people, doing the things people do in the real, physical world. This is the world where you still send mail or read books by walking to the post office or the library." Be prepared for some bizarre findings.
Continue to article


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. All photos by D.A. DeMers via Designer in Exile unless otherwise noted.

Enhanced by Zemanta

1 comment: