Wednesday, May 17, 2017

Comey documented 'everything he could remember' after Trump conversations; CNN, May 16, 2017

Pamela Brown, CNN; Comey documented 'everything he could remember' after Trump conversations

[Kip Currier: In my Managing and Leading Information Services course, one week's module is devoted to "Managing Legal Issues". In that module I walk students through the importance of documenting and how to do it well. Former FBI Director James Comey's documenting practices, revealed yesterday, vividly illustrate why documenting is such an important skill set and responsibility. And how documenting can potentially serve as both offensive and defensive evidence for an individual and/or organization.]

"Former FBI Director James Comey wrote in a memo that President Donald Trump asked him to end the investigation of national security adviser Michael Flynn, according to a source familiar with the matter.
Comey was so appalled by the request that he wanted to document it, the source said. Comey shared it with FBI senior officials, according to the source.
Why did he do it?
    Comey would write down everything that happened -- the good and the bad.
    "Everything he could remember," the source said.
    "You realize something momentous has happened and memories fade so he wanted to memorialize it at the earliest time," the source said. The source said it was not common practice for Comey to document conversations with senior officials unless he thought it was significant."

    Trump’s Leaky Fate; New York Times, May 16, 2017

    Frank Bruni, New York Times; 

    Trump’s Leaky Fate


    "This much leaking this soon in an administration is a powerful indication of what kind of president we have. He is so unprepared, shows such bad judgment and has such an erratic temper that he’s not trusted by people who are paid to bolster him and who get the most intimate, unvarnished look at him. Some of them have decided that discretion isn’t always the keeping of secrets, not if it protects bad actors. They’re right. And they give me hope."

    The 25th Amendment Solution to Remove Trump; New York Times, May 16, 2017

    Ross Douthat, New York Times; 

    The 25th Amendment Solution to Remove Trump


    "One does not need to be a Marvel superhero or Nietzschean Übermensch to rise to this responsibility. But one needs some basic attributes: a reasonable level of intellectual curiosity, a certain seriousness of purpose, a basic level of managerial competence, a decent attention span, a functional moral compass, a measure of restraint and self-control. And if a president is deficient in one or more of them, you can be sure it will be exposed.

    Trump is seemingly deficient in them all. Some he perhaps never had, others have presumably atrophied with age. He certainly has political talent — charisma, a raw cunning, an instinct for the jugular, a form of the common touch, a certain creativity that normal politicians lack. He would not have been elected without these qualities. But they are not enough, they cannot fill the void where other, very normal human gifts should be."

    Privacy concerns as China expands DNA database; BBC News, May 17, 2017

    BBC News; 

    Privacy concerns as China expands DNA database


    ""Mass DNA collection by the powerful Chinese police absent effective privacy protections or an independent judicial system is a perfect storm for abuses," Sophie Richardson, China director at Human Rights Watch said in a statement.

    DNA collection can have legitimate policing uses in investigating specific criminal cases, she explains. "But only in a context in which people have meaningful privacy protections."
    "Until that's the case in China, the mass collection of DNA and the expansion of databases needs to stop.""

    Consumer Reports: Your kid's online privacy: Connected toys; Consumer Reports via WSAW, May 16, 2017

    Consumer Reports via WSAW; 

    Consumer Reports: Your kid's online privacy: Connected toys


    "It’s no secret that sharing personal information online comes with risk. But what if toys were also making it possible for hackers to access both you and your children’s information? Consumer Reports has some stern warnings about a new generation of toys."

    Tuesday, May 16, 2017

    More CEOs are getting forced out for ethics violations; Washington Post, May 15, 2017

    Jena McGregor, Washington Post; More CEOs are getting forced out for ethics violations

    "If it seems like more CEOs are getting cast aside amid ethical blunders or corporate scandals, they are. According to a new report on CEO succession from Strategy&, PwC’s strategy consulting business, the percentage of CEOs getting pushed out for questionable behavior — lapses including environmental disasters,  insider trading, résumé fraud, accounting scandals and sexual misconduct — is up over the past five years."

    The experts were right: Trump isn’t fit to be president; Washington Post, May 16, 2017

    Anne Applebaum, Washington Post;

    The experts were right: Trump isn’t fit to be president

    "We live in an age that denigrates knowledge, dislikes expertise and demonizes experts. But now we have proof that experts are sometimes right...

    At the time, Trump dismissed this letter as “nothing more than the failed Washington elite looking to hold onto their power.” But the “elites” were right. The experts were right.  Next time maybe more people will heed them."

    Facebook Gets Slap on the Wrist from 2 European Privacy Regulators; New York Times, May 16, 2017

    Mark Scott, New York Times; 

    Facebook Gets Slap on the Wrist from 2 European Privacy Regulators


    "Facebook suffered a setback on Tuesday over how it uses the reams of information it collects about users worldwide, after two European privacy watchdogs said that the social network’s practices broke their countries’ data protection rules.

    The announcement by Dutch and French authorities was part of a growing pushback across the European Union about how Facebook collects data on the bloc’s roughly 500 million residents. Some European governments, notably in Germany, are considering hefty fines against the company and other social media giants if they fail to crack down on hate speech and misinformation on their networks.

    As part of their separate announcements on Tuesday, the Dutch and French officials said that Facebook had not provided people in their countries with sufficient control over how their details are used. They said that the social network had collected digital information on Facebook users as well as nonusers on third-party websites without their knowledge."

    A Twenty-First Century Framework for Digital Privacy; LAWFARE, May 15, 2017

    Jeffrey Rosen, LAWFARE; 

    A Twenty-First Century Framework for Digital Privacy

    "Editor's note: This is a crosspost from the National Constitution Center's website. Video of the Center's event on digital privacy is available below...

    Advances in technology raise numerous important (and difficult) legal questions:
    • How can we strike the right balance between security and privacy in the digital age?
    • How might we translate Fourth Amendment doctrine in light of technological advances and changing consumer expectations of privacy?
    • What constitutional and statutory protections should there be for data stored in the Cloud, and under what circumstances and with what constraints should the government get access to it?
    • Does the government have to tell consumers when it searches their email accounts or accesses their data?
    • And whose law should govern access to data in our borderless world—a world where data is often stored on servers in other countries and can be transferred across borders at the snap of a finger?
    The National Constitution Center, with the support of Microsoft, has assembled leading scholars and thought leaders to publish a series of five white papers, entitled A Twenty-First Century Framework for Digital Privacy.  We’ve asked these contributors to reflect on the challenges that new technologies pose to existing constitutional doctrine and statutory law and to propose solutions—doctrinal, legislative, and constitutional—that translate the Constitution and federal law in light of new technologies.  The overarching question we asked contributors to address is how best to balance privacy concerns against the need for security in the digital age.  These contributors represent diverse points of view and experiences and their papers reflect the Constitution Center’s commitment to presenting the best arguments on all sides of the constitutional issues at the center of American life."

    Fair Use Too Often Goes Unused; Chronicle of Higher Education, May 10, 2017

    Noah Berlatsky, Chronicle of Higher Education; 

    Fair Use Too Often Goes Unused


    "Only if authors can’t track down permissions holders, [Julia] Round [editor of the journal Studies in Comics] said, does the journal consider printing small images under the legal doctrine of fair use.

    But while publishers want authors to get permission, the law often does not require it. According to Kyle K. Courtney, copyright adviser for Harvard University in its Office for Scholarly Communication, copyright holders have certain rights — for instance, if you hold rights for a comic book, you determine when and by whom it can be reprinted, which is why I can’t just go out and create my own edition of the first Wonder Woman comic. But notwithstanding those rights, fair use gives others the right to reprint materials in certain situations without consulting the author — or even, in some cases, if the author has refused permission...

    Seeking permission may seem safe, but it can have serious ethical and practical downsides."

    Monday, May 15, 2017

    Fox News undermines a free, independent press; Washington Post, May 15, 2017

    Jennifer Rubin, Washington Post; Fox News undermines a free, independent press

    "With the departure of credible centrist and conservative voices and professional journalists (e.g. Megyn Kelly, Greta Van Susteren, George Will, Major Garrett), the alternative-reality programming seen in the Fox evening and afternoon lineup and on “Fox & Friends” now overwhelms the rest of the operation. In the firing of Comey, we see Fox coverage devoted to carrying the false Trump narrative (the idea to fire him came from Deputy Attorney General Rod J. Rosenstein) long after every other network had ferreted out the true story. Fox, in short, now is practically indistinguishable from Breitbart — and in some cases, RT. It has become the purveyor of falsehoods and propaganda, not a member of an independent media tasked with holding elected leaders accountable."

    Under Trump, inconvenient data is being sidelined; Washington Post, May 14, 2017

    Juliet Eilperin, Washington Post; Under Trump, inconvenient data is being sidelined

    "Across the vast breadth of the government, agencies have traditionally provided the public with massive data sets, which can be of great value to companies, researchers and advocacy groups, among others. Three months ago, there were 195,245 public data sets available on www.data.gov, according to Nathan Cortez, the associate dean of research at Southern Methodist University’s Dedman School of Law, who studies the handling of public data. This week it stood at just under 156,000.

    Data experts say the decrease, at least in part, may reflect the consolidation of data sets or the culling of outdated ones, rather than a strategic move to keep information from the public. But the reduction was clearly a conscious decision."

    The World Is Getting Hacked. Why Don’t We Do More to Stop It?; New York Times, May 13, 2017

    Zeynep Tufekci, New York Times; 

    The World Is Getting Hacked. Why Don’t We Do More to Stop It?


    "There is also the thorny problem of finding money and resources to upgrade critical infrastructure without crippling it. Many institutions see information technology as an afterthought and are slow in upgrading and investing. Governments also do not prioritize software security. This is a sure road to disaster.

    As a reminder of what is at stake, ambulances carrying sick children were diverted and heart patients turned away from surgery in Britain by the ransomware attack. Those hospitals may never get their data back. The last big worm like this, Conficker, infected millions of computers in almost 200 countries in 2008. We are much more dependent on software for critical functions today, and there is no guarantee there will be a kill switch next time."

    Can you teach ethics to algorithms?; CIO, May 15, 2017

    James Maclennan, CIO; 

    Can you teach ethics to algorithms?


    "The challenges of privacy

    Addressing bias is a challenge, but most people understand that discrimination and bias are bad. What happens when we get into trickier ethical questions such as privacy?
    Just look at Facebook and Google, two companies that have mountains of information on you. A recent report uncovered that Facebook “can figure out when people as young as 14 feel ‘defeated,’ ‘overwhelmed’ and ‘a failure.’” This information is gathered by a Facebook analysis system, and it is really easy how such information could be abused.
    The fact that the information uncovered by such an algorithm could be so easily abused does not make the algorithm morally wrong. Facebook decided to create the algorithm without considering the ethical implications of manipulating depressed teenagers to buy more stuff, and thus the responsibility falls on Facebook and not the algorithm. 
    Facebook at minimum needs to encourage its own technological staff to think about the ethical consequences of any new algorithm they construct. If Facebook and other technological companies fail to consider protecting user privacy by constructing algorithms, then the government may have to step in to ensure the peoples’ rights are protected."

    Speaker's Corner: Privacy needs better protection; Law Times, May 15, 2017

    Nathaniel Erskine-Smith, Law Times; 

    Speaker's Corner: Privacy needs better protection


    "There are also concerns that our current model of informed consent needs updating. The majority of Canadians admit to not reading privacy policies for mobile apps, and a recent privacy sweep — in which 25 privacy enforcement authorities participated — found that privacy communications of Internet-connected devices are generally poor and fail to inform users about exactly what personal information is being collected and how it will be used. It is difficult to reconcile these facts with the goal of meaningful consent.

    This is especially important as more devices collect more information about our lives. From smart meters that track our energy consumption to fridges that track what we eat, Cisco Systems estimates there will be 50 billion connected devices by 2020. As a consumer, I want convenience and will trade some of my privacy. As a citizen and as a lawyer, I want laws that substantively protect my privacy. 

    In general terms, we should mandate privacy by design. Governments and third parties ought to anonymize our personal information, and our government should follow Australia’s example and make it an offence to re-identify published government data sets. We should also look beyond the law to protect our data. 

    Take Estonia. On the one hand, it has embraced big data through maintaining a national register with a single unique identifier for all citizens and residents. Customer service is improved and information is exchanged more easily. On the other hand, the same system ensures that citizens can correct or remove data easily and can see which officials have viewed their data. 

    In summary, we need to embrace new laws and new technology. We need not sacrifice our privacy."

    Sunday, May 14, 2017

    Bark app helps protect kids from cyberbullying and suicide, while safeguarding their privacy; CNBC, May 13, 2017

    Deborah Findling, CNBC; 

    Bark app helps protect kids from cyberbullying and suicide, while safeguarding their privacy


    "Bark, a mobile safety app created by a startup founded by a Twitter alumnus, is hoping to do just that. The software employs machine learning to detect signs of negative behavior on a teen's phone, including cyberbullying, sexting, depression and suicidal thoughts.
    Parents initially sign up through Bark's website, then get their children to connect their social media accounts. The software will read the accounts, but will not store or share any of the data.
    Founder and CEO Brian Bason got the idea for Bark while still working for Twitter, which had acquired his previous start-up called Niche. With two kids just old enough to have phones, he felt that even though he worked in technology, he didn't know how to keep track of them online.
    "Our view is that there are a lot of tools out there that just expose all of the kids' activity," Bason told CNBC. "This preserves the child's privacy and builds trust."

    Consumers Less Confident About Healthcare, Data Privacy, and Car Safety, New Survey Finds; Consumer Reports, May 11, 2017

    Consumer Reports; Consumers Less Confident About Healthcare, Data Privacy, and Car Safety, New Survey Finds

    "Distrust About Data Privacy

    There was even wider agreement from consumers across political party lines about their concern over digital privacy. An overwhelming majority—92 percent of Americans—say internet companies and websites should be required to get their permission before selling or sharing their data with other companies. And the same percentage believe internet companies and websites should be required to provide consumers with a complete list of the data they’ve collected about them, if asked.
    A full-time worker from the western part of the country made clear the opposing forces at stake online: “Do we want to make money, or look out for the privacy of people?” said the man, 20, who identified himself as independent.
    The survey was conducted a few days after Congress passed a resolution, which Trump signed, undoing the FCC’s new broadband privacy rules that would have limited the ability of internet service providers to profit from using consumers’ personal information."

    Friday, May 12, 2017

    Privacy Awareness Week; Asia Pacific Privacy Authorities (APPA), May 2017

    Privacy Awareness Week

    Privacy Awareness Week (PAW) is an initiative started by APPA back in 2006. Since then, it has been held every year to promote and raise awareness for numerous privacy issues and the importance of protecting personal information. As a part of PAW, members hold a variety of different events and undertake various activities for individuals, businesses and government organisations.
    This year, PAW will be held throughout May. Each APPA member will be nominating a week in May to celebrate PAW.
    To see when your country will be celebrating PAW and to see the different initiatives that will be occurring in your country, contact your local privacy and data protection authority. You can find their PAW information below.

    'Echo Is Not Spying On You,' Amazon Lawyer Declares; Inside Counsel, May 12, 2017

    C. Ryan Barber, Inside Counsel; 

    'Echo Is Not Spying On You,' Amazon Lawyer Declares


    "We designed the Echo devices very intentionally to only listen when spoken to … and also be incredibly conspicuous when it is listening,” [Ryan] McCrate said, referring to the ring of LED lights that flash when Alexa perks up.

    McCrate’s brief remarks on the panel sounded at times like a promotional pitch touting the lengths the company took to protect consumer privacy. The Echo, he said, was inspired by Star Trek—and Amazon knew that its customers would be familiar with a virtual assistant as a science-fiction concept. But the company, he added, also realized there would be “well-founded” concerns about a product like the Echo."

    Thursday, May 11, 2017

    In the world of technology, it all keeps coming back to privacy; CBC News, May 2, 2017

    Ramona Pringle, CBC News; 

    In the world of technology, it all keeps coming back to privacy


    "All about privacy
    I can't call it writer's block, because the problem isn't that I don't have anything to say. The real issue is that it all revolves around one topic: privacy. Or rather, the ever-increasing lack thereof. The troubling reality is that while there are seemingly all sorts of interesting conversations happening in the world of technology, they almost all lead back to that big gaping privacy black hole, the issue that sucks up all the air in most debates about modern technology...

    You see, no matter what the specific story is — a virtual assistant's new features, a company's mind-reading ambitions, or the quest to turn our workforce into cyborgs – a constant theme keeps popping up.
    Privacy is the elephant in the room, unavoidable at every turn, and too big to ignore. And it will keep coming up week after week, especially as the Internet of Things evolves from being a concept to a new reality. As the world's biggest tech companies all race towards the next big thing, maintaining our privacy seems at risk of being bulldozed. 
    Ultimately, we're in the middle of a big cultural negotiation between privacy and convenience. The truth is, it's not a zero-sum game, and it doesn't need to be either or. In theory, we should be able to enjoy all of the features that these new gadgets promise, without giving up our privacy. But in practice, it's a topic we can't ignore, and a battle we need to be willing to address."

    Wednesday, May 10, 2017

    How Privacy Became a Commodity for the Rich and Powerful; New York Times, May 9, 2017

    Amanda Hess, New York Times; How Privacy Became a Commodity for the Rich and Powerful

    [Kip Currier: Excellent article on the growing "Privacy Divide" between the rich and not-rich, as well as philosophical and political Privacy Divides over what "privacy" even means and entails in the digital age. The author also provides a nice "quick and dirty" overview on how notions about privacy have evolved over time].

    "In an 1890 paper called “The Right to Privacy,” Samuel Warren and Louis Brandeis cited “recent inventions and business methods” — including instant photography and tabloid gossip — that they claimed had “invaded the sacred precincts of private and domestic life.” They argued for what they called the right “to be let alone,” but also what they called “the right to one’s personality.”

    Now that our privacy is worth something, every side of it is being monetized. We can either trade it for cheap services or shell out cash to protect it. It is increasingly seen not as a right but as a luxury good. When Congress recently voted to allow internet service providers to sell user data without users’ explicit consent, talk emerged of premium products that people could pay for to protect their browsing habits from sale. And if they couldn’t afford it? As one congressman told a concerned constituent, “Nobody’s got to use the internet.” Practically, though, everybody’s got to...

    How often have you shielded the contents of your screen from a stranger on the subway, or the partner next to you in bed, only to offer up your secrets to the data firm tracking everything you do?"

    Tuesday, May 9, 2017

    John McCain: Why We Must Support Human Rights; New York Times, May 8, 2017

    John McCain, New York Times; 

    John McCain: Why We Must Support Human Rights


    "In a recent address to State Department employees, Secretary of State Rex Tillerson said conditioning our foreign policy too heavily on values creates obstacles to advance our national interests. With those words, Secretary Tillerson sent a message to oppressed people everywhere: Don’t look to the United States for hope. Our values make us sympathetic to your plight, and, when it’s convenient, we might officially express that sympathy. But we make policy to serve our interests, which are not related to our values. So, if you happen to be in the way of our forging relationships with your oppressors that could serve our security and economic interests, good luck to you. You’re on your own...

    In the real world, as lived and experienced by real people, the demand for human rights and dignity, the longing for liberty and justice and opportunity, the hatred of oppression and corruption and cruelty is reality. By denying this experience, we deny the aspirations of billions of people, and invite their enduring resentment...

    We are a country with a conscience. We have long believed moral concerns must be an essential part of our foreign policy, not a departure from it. We are the chief architect and defender of an international order governed by rules derived from our political and economic values. We have grown vastly wealthier and more powerful under those rules. More of humanity than ever before lives in freedom and out of poverty because of those rules.

    Our values are our strength and greatest treasure. We are distinguished from other countries because we are not made from a land or tribe or particular race or creed, but from an ideal that liberty is the inalienable right of mankind and in accord with nature and nature’s Creator."

    Saturday, May 6, 2017

    Unchecked fake news gave rise to an evil empire in Star Wars; Washington Post, May 4, 2017

    Ben Guarino, Washington Post; Unchecked fake news gave rise to an evil empire in Star Wars

    [Kip Currier: In discussing the "media-poor" fictional Star Wars-universe, the Washington Post reporter and cited experts implicate the critical roles of "real world" archives, libraries, the historical record, print and media cultures, education, access to information, data stewardship and analysis, rational "truth"-based discourse, free and independent press, and literate and questioning citizenry, within technology-infused--and increasingly tech-dependent--societies. These implications also raise some persuasive arguments for the relevance and interdependence of humanities-focused practitioners and research disciplines to technology fields and endeavors.]

    "“Fake news in 'Star Wars' is probably their number one problem,” says Ryan Britt, an editor who specializes in science fiction at the website Inverse. Britt, in his 2015 book “Luke Skywalker Can’t Read,” makes a provocative claim: Most “Star Wars” denizens, if they're not illiterate, seem fundamentally disinterested in reading...

    Fake news is a deadly symptom of the media-poor culture displayed in “Star Wars.” Facebook, in a report released at the end of April, defined fake news as a “catch-all” phrase that may include “hoaxes, rumors, memes, online abuse, and factual misstatements by public figures that are reported in otherwise accurate news pieces.” And in “Star Wars,” a few whopping “factual misstatements” by a public figure give rise to an evil empire.

    Near the end of the prequel “Revenge of the Sith,” the elected leader of the Galactic Republic gives a speech. It's a rousing speech, full of carnage and conspiracy. Supreme Chancellor Palpatine spins a wild theory that the powerful elite, the Jedi, wish to subvert the government. It's also total bull...

    “When you take out print, when you legislate against media, what results is some kind of totalitarian state,” says Joseph Hurtgen, an English instructor at Georgia's Young Harris College and an expert in archival theory, the way information is kept and stored. “That’s always where this goes when you undermine print culture.”

    The funny thing about records in “Star Wars,” Hurtgen says, is that they betray an obsession with technology. “The only archive that anybody bothers to keep in 'Star Wars' is technology,” he says. “Nobody’s writing down memos or news.”

    Even those technological archives are devoid of context. The Jedi library contains volumes of star charts but allows no room for questioning their accuracy. “The library is complete garbage,” in Britt's estimation."

    'Risk' Is A Messy, Ambitious Portrait Of WikiLeaks Founder Julian Assange; NPR, May 5, 2017

    John Powers, NPR; 

    'Risk' Is A Messy, Ambitious Portrait Of WikiLeaks Founder Julian Assange


    "Assange clearly believes that the world's power elite maintains control by doing things the public never gets to see. By leaking documents, he thinks, WikiLeaks is revealing how the world actually works — for instance, how Democratic National Committee big shots actually were conspiring to help Hillary Clinton beat Bernie Sanders.

    Yet here's the problem. Just as most of us don't want our government secretly hoarding people's private information, we also don't want the release of sensitive documents to be controlled by a handful of leakers who answer to no one.

    In last year's election, WikiLeaks didn't just leak things to damage Clinton — whom Assange considered a personal threat. The leaks failed to redact personal info about Clinton donors, like credit-card numbers, a violation of privacy called out by Snowden himself, though ignored by Poitras.

    I don't trust Assange or any other unvetted source — and there will be more — to decide which documents from Russian hackers or NSA leakers get put on the web."

    Leave it to the geniuses at Harvard to come up with a solution to fake news; Washington Post, May 6, 2017

    Callum Borchers, Washington Post; Leave it to the geniuses at Harvard to come up with a solution to fake news

    "That’s why the report’s second recommendation — “providing ideologically compatible sources that confirm that particular news is fake” — is actually pretty brilliant.

    Maybe you’re skeptical when The Washington Post attempts to debunk the myth of the paid anti-Trump protester. But maybe you’ll believe Fox News host and Daily Caller co-founder Tucker Carlson when he does the same thing."

    Thursday, May 4, 2017

    A Salute To Filmmaker Jonathan Demme's Early TV Work; NPR, May 3, 2017

    David Bianculli, NPR; 

    A Salute To Filmmaker Jonathan Demme's Early TV Work


    "TV history is rich with old and rare treasures.

    But despite what you may think, not everything is available for streaming, released on DVD or easy to find - or even easy to know of its existence. And even streaming sites, like Netflix or Hulu, aren't permanent archives. They show what they make deals to present, and those deals expire. And some great series, like "St. Elsewhere" and "Brooklyn Bridge" and "The Days And Nights Of Molly Dodd," have never been released on DVD in their entirety. You have to look for them in syndication on local TV stations - if you can find them at all.

    Last year, Turner Classic Movies restored and presented a 50-year-old TV production of "The Glass Menagerie." It's precisely the sort of respectful and thoughtful archiving of TV's past that we need a lot more of in this confusing, cluttered TV present. The great TV, old as well as new, is out there. But it seems to get harder to identify as well as find."

    Parents are told – ‘Kill your gay children or we’ll do it for you’: Terrifying threats made by Chechen police are revealed by victims of country’s ‘concentration camps’ for homosexuals; Daily Mail, May 3, 2017

    Dave Burke, Daily Mail; 

    Parents are told – ‘Kill your gay children or we’ll do it for you’: Terrifying threats made by Chechen police are revealed by victims of country’s ‘concentration camps’ for homosexuals


    "Reports from the Chechen republic claim that homosexuals are being rounded up and killed on the orders of leader Ramzan Kadyrov.

    And last week the British Parliament heard Kadyrov intends to eliminate the gay community by the end of this month.

    Horrifying testimony from survivors from Chechen concentration camps say victims are being tortured and their family summoned to kill them.
    A survivor told France24: 'They tell the parents to kill their child. They say, "Either you do it, or we will". They call it "cleaning your honour with blood".
    'They tortured a man for two weeks [then] they summoned his parents and brothers who all came.
    'The authorities said to them: "Your son is a homosexual – sort it out or we'll do it ourselves.""

    Wednesday, May 3, 2017

    How to Protect Your Privacy as More Apps Harvest Your Data; New York Times, May 1, 2017

    Brian X. Chen, New York Times; How to Protect Your Privacy as More Apps Harvest Your Data

    "Opt out for good

    Deleting your app from your phone or computer often isn’t enough. You’ll remove data from the device itself, but not from the company’s servers.

    If you’ve lost trust in a company, make the cleanest break possible: Delete your account. In the case of an app like Uber, for example, you can submit a request on the company’s website to have your account deleted. Similarly, with Unroll.me, you can log in to the site and click through the settings to delete your account.

    Even after doing that, you will have to reconcile with the idea that the company will probably hold on to the information you have already shared.

    “Data you’ve provided to the service as part of using the service is data that they can store and continue to use,” Ms. Sandvik said. “It falls under the terms of service.”

    Chechnya’s Anti-Gay Pogrom; New York Times, May 3, 2017

    Ekaterina Sokirianskaia, New York Times; 

    Chechnya’s Anti-Gay Pogrom


    "According to the independent Russian newspaper Novaya Gazeta, more than 100 gay men were rounded up by the police and brutalized in secret prisons, and at least three of them were killed. Many remain in detention.

    In fear and desperation, 75 people called in to the Russian LGBT Network’s Chechnya hotline. Of these, 52 said they had been victims of the recent violence, and 30 fled to Moscow where they received help from L.G.B.T. activists...

    “Some think they are sadists and we are simply another social group that they are terrorizing,” a Chechen gay man told me, “but in fact, it is part of their new ideology of a ‘pure nation.’ ”

    By promoting nationalism and traditionalism, Mr. Kadyrov tries to prove to Chechens that their republic now has more autonomy than separatist leaders ever dreamed of; and this justifies his strong pro-Putin position. But his appeal to tradition is self-serving and spurious. Until now, Chechnya never had any record of organized violence against gays."

    Tuesday, May 2, 2017

    Sandy Hook father Lenny Pozner on death threats: ‘I never imagined I’d have to fight for my child’s legacy’; Guardian, May 2, 2017

    Hadley Freeman, Guardian; 

    Sandy Hook father Lenny Pozner on death threats: ‘I never imagined I’d have to fight for my child’s legacy’


    "Pozner realised quickly that there was no point in arguing with these hoaxers, so instead he attacks through copyright law. Every day, he Googles Noah’s name to see if anyone has put up a photo or video of his son without his permission and, if so, he files copyright claims. Thanks to Pozner’s dedication and experience as an IT consultant, he has scrubbed Noah’s search results of toxic-hoaxer content. He has sued other hoaxers for invasion of privacy, and successfully petitioned a Florida university to fire a professor, James Tracy, for hoaxing. (Tracy has sued for wrongful termination.) He also founded the HONR Network, which helps grieving families deal with online abuse, and it lobbies YouTube, Google and Facebook to stop hosting such abuse. "

    Chinese Government and Hollywood Launch Snoop-and-Censor Copyright Filter; Electronic Frontier Foundation (EFF), May 1, 2017

    Jeremy Malcolm, Electronic Frontier Foundation (EFF); 

    Chinese Government and Hollywood Launch Snoop-and Censor Copyright Filter

    "Two weeks ago the Copyright Society of China (also known as the China Copyright Association) launched its new 12426 Copyright Monitoring Center, which is dedicated to scanning the Chinese Internet for evidence of copyright infringement. This frightening panopticon is said to be able to monitor video, music and images found on "mainstream audio and video sites and graphic portals, small and medium vertical websites, community platforms, cloud and P2P sites, SmartTV, external set-top boxes, aggregation apps, and so on."...

    The announcement of China's government-linked 12426 Copyright Monitoring Center is absolutely chilling. It is just as chilling that the governments of the United States and Europe are being lobbied by copyright holders to follow China's lead. Although this call is being heard on both sides of the Atlantic, it has gained the most ground in Europe, where it needs to be urgently stopped in its tracks. Europeans can learn more and speak out against these draconian censorship demands at the Save the Meme campaign website."

    The Internet of Things Needs a Code of Ethics; The Atlantic, May 1, 2017

    Kaveh Waddell, The Atlantic; 

    The Internet of Things Needs a Code of Ethics


    "The Internet of Things, as it’s called, is also lacking a critical ethical framework, argues Francine Berman, a computer-science professor at Rensselaer Polytechnic Institute and a longtime expert on computer infrastructure. Together with Vint Cerf, an engineer considered one of the fathers of the internet, Berman wrote an article in the journal Communications of the Association for Computing Machinery about the need for an ethical system.

    I spoke to her about ethical design, and how to balance individual privacy with the potential for social good of connected devices that share data with one another. A transcript of our conversation, lightly edited for concision and clarity, follows."

    "College Is Hard"; robrogers.com, May 2, 2017

    Rob Rogers, robrogers.com; "College Is Hard"

    "The Rules Are Different Here"; Bizarro, May 2, 2017

    Dan Piraro, Bizarro; "The Rules Are Different Here"

    Monday, May 1, 2017

    A Commencement Address; Reading, Archives and the Academy Blog, May 1, 2017


    Richard Cox, Reading, Archives and the Academy Blog;

    A Commencement Address


    [Kip Currier: Dr. Richard Cox, a colleague in Pitt's Information Culture and Data Stewardship department, gave a stirring call-to-action commencement address yesterday--focused on ethics, technology, and responsibilities of information professionals.]

    "On April 30th I was the speaker at the University of Pittsburgh’s School of Information Sciences commencement ceremony. This was the last commencement of the school, as it becomes the School of Computing and Information on July 1. This was a great honor, and a nice way of marking my own forthcoming retirement on December 31. I was asked to address the topic of the school’s focus on information ethics. Here is the address."