Photography, Linux, MySQL, Python, WordPress, Book Geek
7079 stories
·
6 followers

My MidAmeriCon II badge was just suspended. That is awesome. This is why.

1 Share

I am so proud of MidAmeriCon II and their safety staff. Why? Because I violated the Code of Conduct and they held me accountable. It would have been really easy for them to give me a pass because I’m “Someone” and to say, “Oh, it doesn’t really matter” for me. Even though it was stressful for them, they followed their procedures and it was a great, very respectful process.

In fact, that’s why I’m writing this post. I asked if there was anything that I could do to help mitigate the damage I’d done – not as a bargaining point, but because I’d screwed up. What we agreed on was that Codes of Conduct are really important, and that part of making sure that they are robust is knowing that everyone is held accountable at the same levels.

So what happened? I served scotch while I was on a panel. It’s something I’ve done before, but in this case, it violates the code of conduct because it potentially jeopardizes the con’s relationship with the venue. It’s something I didn’t think about.

The fact that my violation was accidental doesn’t matter.

As I said, I’m so proud of MidAmeriCon II for the way they handled this. I finished the panel. Two members of the concom took me to a private room where we could do an incident report. I told them what happened and… according to the policies and procedures, this means that they need to ask me to leave for the remainder of the day. It’s not a revocation of membership, or anything,  just a one-day suspension sorta like a time-out.

Again, it would have been easier for them to ignore it. I had a panel that I was moderating afterwards and that means they then had to restaff that. I have a fairly big footprint on social media so there was the fear that I might have thrown a fit and caused a firestorm. The violation was accidental – and… and all of those reasons have been used to excuse inappropriate behavior in the past.

In order to have robust and functional harassment policy – in order to make sure people feel safe, it is so, so important that a Code of Conduct is administrated evenly regardless of a person’s status.

I’m really sorry to have added to their stress and so proud of them and our community.

The post My MidAmeriCon II badge was just suspended. That is awesome. This is why. appeared first on Mary Robinette Kowal.

Read the whole story
Manzabar
11 hours ago
reply
Cedar Rapids
Share this story
Delete

How the New York Public Library made ebooks open, and thus one trillion times better

1 Share

Leonard Richardson isn't just the author of Constellation Games, one of the best debut novels I ever read and certainly one of the best books I read in 2013; he's also an extremely talented free/open source server-software developer who has been working for the New York Public Library on a software project that liberates every part of the electronic book lending system from any kind of proprietary lock-in, and, in the process, made reading library ebooks one trillion times better. (more…)

Read the whole story
Manzabar
12 hours ago
reply
Cedar Rapids
Share this story
Delete

"Translucent" statues haunt British forest

1 Share

HnAj0tk

Created by Rob Mulholland, the photon fairies await your presence in the wilds of Scotland. Just remember: if it bleeds, you can kill it—but these don't bleed. [via r/creepy]

W6hwCf8

03xGHOV

Read the whole story
Manzabar
12 hours ago
reply
Cedar Rapids
Share this story
Delete

Jeff Williams will quietly become NASA’s most experienced flier

1 Share

Enlarge / Jeff Williams works aboard the Space Station in April. (credit: NASA)

During his nearly year-long mission aboard the International Space Station, former NASA astronaut Scott Kelly garnered a large measure of attention for his Ironman feats, including setting a US record for the cumulative amount of time in space—520 days. Jeff Williams may be less well-known, but he will quietly become NASA’s new spaceflight Ironman on Wednesday morning.

Williams has reached 520 days after a Space Shuttle mission in 2000, two previous increments on the Space Station in 2006 and 2009, and he’s now nearing the end of his third mission to the Space Station. When he lands on September 6, Williams will have spent a cumulative 534 days in space, two weeks longer than Kelly’s total. (No NASA astronaut can equal the duration records of Russian cosmonauts. The all-time leader, Gennady Padalka, has spent 879 days in space over five missions).

In many ways, Williams' tenure at NASA has paralleled the development of the Space Station. After a decorated career as a test pilot, Williams was selected to become an astronaut in 1996, a time when the United States and Russia were in the formative stages of planning and developing the station as an international project. His first spaceflight, in May 2000, was just the third shuttle flight devoted to station construction. It helped pave the way for the first crews to live aboard the station, beginning in November, 2000. Williams is also the first NASA astronaut to spend three separate increments aboard the orbiting laboratory.

Read 2 remaining paragraphs | Comments

Read the whole story
Manzabar
12 hours ago
reply
Cedar Rapids
Share this story
Delete

Persistent Surveillance Systems has been watching Baltimore for months [Updated]

1 Share

(credit: Persistent Surveillance Systems)

A company that sends Cessna aircraft to surveil cities from 25,000 feet 25 miles up in an effort to fight crime has been watching Baltimore for months now with zero public notification, according to a new report from Bloomberg Businessweek.

The firm, Persistent Surveillance Systems(PSS), has been actively trying to get new contracts with large cities nationwide. When Ars profiledthe company in 2014, company CEO Ross McNutt said PSS was trying to work with Chicago after having controversially flown for nine days over Compton, California—adjacent to Los Angeles—in 2012.

PSS has evidently now succeeded in Baltimore. As  the Businessweekreported, the Baltimore project was funded by two Texan philanthropists, John and Laura Arnold, who said that if the company could find a city to partner with, they would fund it.

Read 16 6 remaining paragraphs | Comments

Read the whole story
Manzabar
12 hours ago
reply
Cedar Rapids
Share this story
Delete

Word Games: What the NSA Means by “Targeted” Surveillance Under Section 702

1 Share

We all know that the NSA uses word games to hide and downplay its activities. Words like "collect," "conversations," "communications" and even "surveillance" have suffered tortured definitions that create confusion rather than clarity.

There’s another one to watch: "targeted" v. "mass" surveillance.

Since 2008, the NSA has seized tens of billions of Internet communications. It uses the Upstream and PRISM programs—which the government claims are authorized under Section 702 of the FISA Amendments Act—to collect hundreds of millions of those communications each year. The scope is breathtaking, including the ongoing seizure and searching of communications flowing through key Internet backbone junctures,[1]the searching of communications held by service providers like Google and Facebook, and, according to the government's own investigators, the retention of significantly more than 250 million Internet communications per year.[2]

Yet somehow, the NSA and its defenders still try to pass 702 surveillance off as "targeted surveillance," asserting that it is incorrect when EFF and many others call it "mass surveillance."

Our answer: if "mass surveillance" includes the collection of the content of hundreds of millions of communications annually and the real-time search of billions more, then the PRISM and Upstream programs under Section 702 fully satisfy that definition.

This word game is important because Section 702 is set to expire in December 2017. EFF and our colleagues who banded together to stop the Section 215 telephone records surveillance are gathering our strength for this next step in reining in the NSA. At the same time, the government spin doctors are trying to avoid careful examination by convincing Congress and the American people that this is just "targeted" surveillance and doesn’t impact innocent people.

Section 702 Surveillance: PRISM and Upstream

PRISM and Upstream surveillance are two types of surveillance that the government admits that it conducts under Section 702 of the FISA Amendments Act, passed in 2008. Each kind of surveillance gives the U.S. government access to vast quantities of Internet communications.[3]

Upstream gives the NSA access to communications flowing through the fiber-optic Internet backbone cables within the United States.[4] This happens because the NSA, with the help of telecommunications companies like AT&T, makes wholesale copies of the communications streams passing through certain fiber-optic backbone cables. Upstream is at issue in EFF’s Jewel v. NSA case.

PRISM gives the government access to communications in the possession of third-party Internet service providers, such as Google, Yahoo, or Facebook. Less is known about how PRISM actually works, something Congress should shine some light on between now and December 2017.[5]

Note that those two programs existed prior to 2008—they were just done under a shifting set of legal theories and authorities.[6] EFF has had evidence of the Upstream program from whistleblower Mark Klein since 2006, and we have been suing to stop it ever since.

Why PRISM and Upstream are "Mass," Not "Targeted," Surveillance

Despite government claims to the contrary, here’s why PRISM and Upstream are "mass surveillance":

(1) Breadth of acquisition:  First, the scope of collection under both PRISM and Upstream surveillance is exceedingly broad. The NSA acquires hundreds of millions, if not billions, of communications under these programs annually.[7] Although, in the U.S. government’s view, the programs are nominally "targeted," that targeting sweeps so broadly that the communications of innocent third parties are inevitably and intentionally vacuumed up in the process. For example, a review of a "large cache of intercepted conversations" provided by Edward Snowden and analyzed by the Washington Post revealed that 9 out of 10 account holders "were not the intended surveillance targets but were caught in a net the agency had cast for somebody else."[8] The material reviewed by the Post consisted of 160,000 intercepted e-mail and instant message conversations, 7,900 documents (including "medical records sent from one family member to another, resumes from job hunters and academic transcripts of schoolchildren"), and more than 5,000 private photos.[9] In all, the cache revealed the "daily lives of more than 10,000 account holders who were not targeted [but were] catalogued and recorded nevertheless."[10] The Post estimated that, at the U.S. government’s annual rate of "targeting," collection under Section 702 would encompass more than 900,000 user accounts annually. By any definition, this is "mass surveillance."

(2) Indiscriminate full-content searching.  Second, in the course of accomplishing its so-called "targeted" Upstream surveillance, the U.S. government, in part through its agent AT&T, indiscriminately searches the contents of billions of Internet communications as they flow through the nation’s domestic, fiber-optic Internet backbone. This type of surveillance, known as "about surveillance," involves the NSA's retention of communications that are neither to nor from a target of surveillance; rather, it authorizes the NSA to obtain any communications "about" the target.[11] Even if the acquisition of communications containing information "about" a surveillance target could, somehow, still be considered "targeted," the method for accomplishing that surveillance cannot be: "about" surveillance entails a content search of all, or substantially all, international Internet communications transiting the United States.[12]Again, by any definition, Upstream surveillance is "mass surveillance."  For PRISM, while less is known, it seems the government is able to search through—or require the companies like Google and Facebook to search through—all the customer data stored by the corporations for communications to or from its targets.

Seizure: Fourth Amendment and the Wiretap Act

To accomplish Upstream surveillance, the NSA copies (or has its agents like AT&T copy) Internet traffic as it flows through the fiber-optic backbone. This copying, even if the messages are only retained briefly, matters under the law. Under U.S. constitutional law, when the federal government "meaningfully interferes" with an individual’s protected communications, those communications have been "seized" for purposes of the U.S. Constitution’s Fourth Amendment. Thus, when the U.S. government copies (or has copied) communications wholesale and diverts them for searching, it has "seized" those communications under the Fourth Amendment.

Similarly, U.S. wiretapping law triggers a wiretap at the point of "interception by a device," which occurs when the Upstream mechanisms gain access to our communications.[13]

Why does the government insist that it’s targeted?  For Upstream, it may be because the initial collection and searching of the communications—done by service providers like AT&T on the government’s behalf—is really, really fast and much of the information initially collected is then quickly disposed of. In this way the Upstream collection is unlike the telephone records collection where the NSA kept all of the records it seized for years. Yet this difference should not change the conclusion that the surveillance is "mass surveillance." First, all communications flowing through the collection points upstream are seized and searched, including content and metadata. Second, as noted above, the amount of information retained—over 250 million Internet communications per year—is astonishing.

Thus, regardless of the time spent, the seizure and search are comprehensive and invasive. Using advanced computers, the NSA and its agents can do a full-text, content search within a blink of an eye through billions, if not trillions of your communications, including emails, social media, and web searches. Second, as demonstrated above, the government retains a huge amount of the communications—far more about innocent people than about its targets—so even based on what is retained the surveillance is better described as "mass" rather than "targeted."

Yes, it is Mass Surveillance

So it is completely correct to characterize Section 702 as mass surveillance. It stems from the confluence of: (1) the method NSA employs to accomplish its surveillance, particularly Upstream, and (2) the breadth of that surveillance.

Next time you see the government or its supporters claim that PRISM and Upstream are "targeted" surveillance programs, you’ll know better. 

[1] See, e.g., Charlie Savage, NSA Said to Search Content of Messages to and From U.S., N.Y. Times (Aug 8, 2013) (“The National Security Agency is searching the contents of vast amounts of Americans’ e-mail and text communications into and out of the country[.]”). This article describes an NSA practice known as “about surveillance”—a practice that involves searching the contents of communications as they flow through the nation’s fiber-optic Internet backbone. 

[2] FISA Court Opinion by Judge Bates entitled [Caption Redacted], at 29 (“NSA acquires more than two hundred fifty million Internet communications each year pursuant to Section 702”), https://www.eff.org/document/october-3-2011-fisc-opinion-holding-nsa-surveillance-unconstitutional (Hereinafter, “Bates Opinion”). According to the PCLOB report, the “current number is significantly higher” than 250 million communications. PCLOB Report on 702 at 116.

[3] Bates Opinion at 29; PCLOB at 116.

[4] Id. at 35.

[5] PCLOB at 33-34

[6] First,  the Bush Administration Administration’s relied solely on broad claims of Executive power, written grounded in secret legal interpretations written by legal interpretations by the Department of Justice. Many of those interpretations were subsequently abandoned by later Bush Administration officials.  Beginning in 2006, DOJ was able to turn to the Foreign Intelligence Surveillance Court to sign off on its it surveillance programs. In 2007, Congress finally stepped into the game, passing the Protect America Act; which, a year later, was substantially overhauled and passed again as the FISA Amendments Act. While neither of those statutes mention the breadth of the surveillance and it was not discussed publicly during the Congressional processes, both have been cited by the government as authorizing it.

[7] See note 1.

[8] Barton Gellman, Julie Tate, and Ashkan Soltani, In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are, Washington Post (July 5, 2014),

[9] Id.

[10] Id.

[11] Bates Opinion at 15.

[12] PCLOB report at 119-120.

[13] See 18 U.S.C § 2511(1)(a); U.S. v. Councilman, 418 F.3d 67, 70-71, 79 (1st Cir. 2005) (en banc).



Read the whole story
Manzabar
13 hours ago
reply
Cedar Rapids
Share this story
Delete
Next Page of Stories