PowellThe hack and leak of Colin Powell’s emails have brought with them a national conversation about journalistic ethics. At stake are the competing responsibilities for journalists to respect privacy on the one hand, and to inform the public of relevant ongoings on the other.

Powell’s emails, ostensibly hacked and leaked by Russian government forces, revealed incendiary comments about both Donald Trump and Hillary Clinton. Known for maintaining a reserved and diplomatic approach, the indiscreet tone of Powell’s emails had the appeal of an unearthed and long suspected truth.

The news media responded to the leaked emails by plastering their content on talk shows and websites, accompanied by expert commentary and in depth political analyses. Line by line, readers, viewers, and listeners learned, with a sense of excitement and validation, what Colin Powell “really thinks.” more...

DroneNick Bilton’s neighbor flew a drone outside the window of Bilton’s home office. It skeeved him out for a minute, but he got over it. His wife was more skeeved out. She may or may not have gotten over it (but probably not). Bilton wrote about the incident for The New York Times, where he works as a columnist. Ultimately, Bilton’s story concludes that drone watching is no big deal, analogous to peeping-via-binoculars, and that the best response is to simply ignore drone-watchers until they fly their devices away. With all of this, I disagree.

Drone privacy is a fraught issue, one of the many in which slow legislative processes have been outpaced by technological developments. While there remains a paucity of personal-drone laws, the case precedent trends towards punishing those who damage other people’s drones, while protecting the drone owners who fly their devices into airspace around private homes. Through legal precedent, then, privacy takes a backseat to property.

Bilton spends the majority of his article parsing this legal landscape, and tying the extant legal battles to his own experience of being watched. He begins with an account of looking out his window to see a buzzing drone hovering outside. He is both amused and disturbed, as the drone intrusion took place while he was already writing an article about drones. He reports feeling first violated and intruded upon, but this feeling quickly fades, morphing into quite the opposite. He says:   more...

u22
Blacked out Twitter image from my post last week

Netiquette. I seriously hate that word. BUT an issue of internet-based-etiquette (blogger etiquette, specifically) recently came to my attention, and I’m interested in others’ practices and thoughts.

As a blogger, I often analyze content from Facebook and Twitter. In doing so, I usually post images of actual tweets, comments, and status updates. These are forms of data, and are useful in delineating the public tenor with regard to a particular issue, the arguments on opposing sides of a debate, and the ‘voice’ with which people articulate their relevant thoughts and sentiments.

As a common practice, I black out all identifying information when reposting this content. Last week, I posted some tweets with the names and images redacted. A reader commented on my post to ask why I did so, given that the tweets were public. We had a quick discussion, but, as I mentioned in that discussion, this issue deserves independent treatment. more...

Can a gift be a data breach? Lots of Apple product users think so, as evidenced by the strong reaction against the company for their unsolicited syncing of U2’s latest album songs of innocence to 500 million iCloud accounts. Although part of the negative reaction stems from differences of musical taste, what Apple shared with customers seems less important than the fact that they put content on user accounts at all.

u2-apple-eventWith a proverbial expectant smile, Apple gifted the album’s 11 songs to unsuspecting users. A promotional move, this was timed with the launch of the iPhone6 and Apple iWatch. And much like teenagers who find that their parents spent the day reorganizing their bedrooms, some customers found the move invasive rather than generous.

Sarah Wanenchack has done some great work on this blog with regards to device ownership—or more precisely, our increasing lack of ownership over the devices that we buy. That Apple can, without user permission, add content to our devices, highlights this lack of ownership. Music is personal. Devices are personal. And they should be. We bought them with our own money. And yet, these devices remain accessible to the company from which they came; they remain alterable; they remain—despite a monetary transaction that generally implies buyer ownership—nonetheless shared. And this, for some people, is offensive.   more...

fb-privacy-checkup

Today, Facebook announced some significant changes in its approach to privacy: New users now start with “friends only” as their default share setting and a new “Privacy Checkup” will remind users to select audiences for their posts (if they don’t, it will also default to “friends only”).

This announcement is significant in that it is the first time that Facebook has ever stepped back its privacy settings to be less open by default. This appears to contradict a widely held assumption that Facebook is on a linear trajectory to encourage ever more sharing with ever more people. Media reports have pitched this as a victory for users, who are supposed to have forced the company to “respond to business pressures and longstanding concerns” or “bow to pressure.” more...


ZunZuneo was named for the slang term used to describe a Cuban Hummingbird’s tweet

The Internet seems both excited and generally confused by the U.S. government’s failed entre into Cuban Social media via its version of a bare-bones Twitter, called ZunZuneo. The confusion is not unwarranted, as the operation includes the United States government, two separate for-profit contractors, (and eventually, a management team who didn’t know they were part of an International government sponsored ruse), key players and various bases of operation which span the globe, from Spain to the UK to the Cayman Islands and Nicaragua, and, of course, tens of thousands of Cuban citizens who gratefully began using a new mysterious messaging service that made instantaneous text-based mobile communications financially accessible in 2010, and then inexplicably disappeared in September 2012.

This long form article from the Washington Post does a nice job disentangling the ins and outs of the story, based on documents leaked to the Associated Press. I highly suggest you take the time to read the piece, but in very short summation, the United States Agency for International Development (USAID) collaborated with Creative Associates and eventually, Mobile Accord, to distribute a Twitter-like service (ZunZeneo) to Cuban citizens, with the hope of eventually utilizing the service to incite political mobilization against communist regimes. Mostly, though, the operation never went beyond gaining users through shared news stories and sports commentary. They ran out of money in 2012, Cuban users lost the service, and no revolutions were incited. It’s all general buffoon-like and harmless (except, of course, for all of the money), begging for cynical commentary and smart jokes about a deeply ineffective U.S. government. Except, something very serious happened in the process, something that should make us all—both Cubans and Americans—pretty ticked off. more...

Three articles came out this week that help me develop my concept of droning as a general type of surveilance that differs in important ways from the more traditional concept of “the gaze” or, more academically, “panopticism.” There’s Molly Crabapple’s post on Rizome, the NYTimes article about consumer surveillance, and my colleague Gordon Hull’s post about the recent NSA legal rulings over on NewAPPS. Thinking with and through these three articles helps me clarify a few things about the difference between droning and gazing: (1) droning is more like visualization than like “the gaze”–that is, droning “watches” patterns and relationships among individual “gazes,” patterns that are emergent properties of algorithmic number-crunching; and (2) though the metaphor of “the gaze” works because the micro- and macro-levels are parallel/homologous, droning exists only at the macro-level; individual people can run droning processes, but only if they’re plugged into crowds (data streams or sets aggregating multiple micro- or individual perspectives).

more...

A longer, more academic version of this post appears at Its Her Factory.

This post follows up on my earlier post about a culture of moderation. Here I want to consider one aspect of this contemporary focus on moderation: the idea of “balance.” We talk about work/life balance, the “balance” between individual freedom and national security, and, as Jenny notes, the “balance” between tech use and abstention.

more...

 Blurred and Cropped Version of "Grabbing 100+ Boobs at Burning Man 2013"

Like many Burners (and non-Burners), I was outraged when, yesterday, an image with variations of the title “Grabbing 100+ Boobs at Burning Man 2013” went viral. In light of the public distribution of these photos, I think it’s imperative for the public in general, and Burners in particular, to have a focused conversation about a range of important social issues including the meaning of consent, rape culture, and slut shaming.

I do not know what each woman in the photos consented to and what problems may arise if they are recognized by people they know from contexts other than Burning Man, so I am reluctant to link to or share the image. However, because it is difficult to discuss the issues in question here without making specific references to the content of the photographs and because most of the harm from distributing the image has probably already been done, I have cropped and anonymized a small portion of the long gridded image here.

more...

bad

The philosopher Michel Foucault taught that sexual repression and taboos aren’t so much the repression of sex but instead evidence of obsession. I’m reminded of this lesson after reading about a terrible story wherein a Georgia high-school decides to make a presentation to hundreds of students and parents on what not to do on social media. In doing so, they project a photo of one student in her bikini, an image taken from her Facebook page [she says shared with ‘friends of friends’] without her permission. Her face is not blurred; in fact, her full name is printed below the image. Her photo, indeed, her body itself, is being projected to all these people as ‘what not to do’, her image and body construed as a problem, how one should not present themselves in 2013. Humiliated by the school’s disrespectful and irresponsible behavior, the woman is suing. In trying to warn students of the dangers of posting online, the Georgia high-school acted in exactly the dangerous way students—everyone—shouldn’t act. more...