We are developing the social individualist meta-context for the future. From the very serious to the extremely frivolous... lets see what is on the mind of the Samizdata people.
Samizdata, derived from Samizdat /n. - a system of clandestine publication of banned literature in the USSR [Russ.,= self-publishing house]
|
There are several disturbing features of this panoptican state in which we will soon be living not the least of which is the sheer breakneck pace of its assembly.
It seems like only yesterday that speed cameras suddenly appeared on every lamppost but even they are so much old hat now:
Automatic Number Plate Recognition systems are set to be deployed by police forces throughout the UK as a major plank of a campaign of “denying criminals the use of the roads.” The system will link up to the DVLA, Police National Computer and a National Insurance Database, with these links alone giving it the capability of identifying untaxed, unroadworthy and uninsured vehicles, but they’ll also facilitate police surveillance operations, the swapping of data on “prolific offenders” between forces and, well, other stuff… Take this, for instance:
“Eventually the database will link to most CCTV systems in town centres, meaning that all vehicles filmed on one of the many cameras protecting Bedford High Street, for instance, can be checked against the database and the movements of wanted cars traced to help with serious crime investigations.”
As far as the drivers are concerned, well, that just about wraps it up, folks.
But truly one hardly has time to digest one horror before the next one comes galloping over the horizon. Dr.Sean Gabb has suggested that our rulers our ‘drunk with the technology’ but I am not so sure. More like they are stone-cold sober and determined to get the whole country locked down before the public realises exactly what has been done to them.
David Sucher has another post on ubiquitous computing. He quotes from the sales puff for one manifestation of this stuff:
IntelliBadgeTM: Towards Providing Location-Aware Value-Added Services at Academic Conferences … The major characteristic of this project is the fusion of RFID technology, database management, data mining, real-time information visualization, and interactive web application technologies into an operational integrated system deployed at a major public conference. The developed system tracks conference attendees …
Sounds like another one for Natalie’s list.
David Sucher has news of a conference, and reckons that White Rose ought to be monitoring what was being talked about.
Says David:
“Ubiquitous Computing” means “computing technology that migrates beyond our desktops onto our hands, heads and clothing, and becomes increasingly embedded in a wide variety of other objects, such as walls, cars and appliances.”
More from today’s New York Times, this time about a high tech company which makes its mega-bucks by betting that future security/Patriot Act legislation will be more intrusive than it is now. This is the Security-Industrial Complex getting into its stride, and its vested interests getting dug in.
This company makes X-ray snooping kit. There must be hundreds more doing similar stuff which we aren’t necessarily ever going to hear about.
This Guardian article, which basically starts out as an extremely optimistic take on the domestic possibilities of new computer and camera and screen technology, has White Rose Relevance.
Nanotechnology – science at a billionth of a metre – and mobile technology could together turn the house of the future into something out of science fiction, according to scientists at the British Association science festival yesterday.
Which is not very White Rose Relevant at all. But gradually this changes.
“There are all sorts of things that can happen, from simple lighting through computing, security labelling, getting rid of bar codes and checkouts in supermarkets – just wheel your trolley through a gate, it will be scanned and the cost will be deducted from your bank account – electronic noses, maybe, sitting in your fridge and telling you if anything is off, and so on.
Getting a bit nearer to our territory.
Long before the walls of the house became sentient, the objects within it would be in touch through mobile technology. Nigel Linge of the University of Salford told the conference that he and colleagues were already working with the Greater Manchester police on a potential project called Crimespot.
Crimespot. Now it’s getting a bit creepier.
“We are therefore creating a future in which your mobile device knows everything about you, including your current location to within a few metres, and what you are presently doing,” he went on.
“Does this bring back memories of George Orwell’s Nineteen Eighty-Four, where Big Brother kept careful watch over everyone and, if you stepped out of line, whisked you off to room 101?”
Room 101. Bloody hell.
In fact, the watchful house could keep an eye on people who needed extra care.
Extra care. That’s how it spreads. What makes all this potentially so scary is that it is potentially so helpful. If it was nothing but scary, it wouldn’t be scary, because it would never catch on. As it is, you can see the genuinely security-driven private sector setting all this stuff up, and then the government moving in and demanding to have access to everyone’s mega hard drive. So that it can care for us all even better.
If you use Barclays online banking, beware.
There’s a spam email going round claiming to be from them. It says that due to a systems update you should log in to Barclays and reactivate your account.
The link enclosed looks genuine but will take you to the spammer’s site. The objective is to steal your password.
There’re lots of clues that the email is a fake, including strange headers and bad English. However it’s very easy just to click, hence this warning.
This is not a hoax warning about a non-existent virus! I received this evil email myself this morning. Barclays have been informed.
Why is this White Rose Relevant? Because it shows once again that the weakest part of any security system is the human factor. Over-reliance on technical “solutions” gives people a false sense of security and can make them more vulnerable.
Partly cross-posted from An It Harm None.
Much of the push towards compulsory ID cards, and, in general, towards huge nationally co-ordinated databases of information of every imaginable sort about individual citizens, is based on the wholly fallacious belief among those with no direct knowledge of how these things work that the information in all these databases is automatically going to be correct. Not even a terrorist with million dollar back-up will be able to diddle his way around, say, a policeman demanding to see his “papers”.
It follows, then, that any newspaper story which reports that any such databases might be repositories not of truth but also of falsehood is, to use a favourite phrase of mine here, “White Rose Relevant”. In fact I may start calling it just “WRR” for short.
This story, then, from the New York Times, is very WRR indeed:
WASHINGTON, Sept. 3 — About 3.3 million American consumers discovered within the last year that their personal information had been used to open fraudulent bank, credit card or utility accounts, or to commit other crimes, according to the Federal Trade Commission’s first national survey on identity theft.
The commission, in a report issued today, said these cases had collectively cost businesses $32.9 billion and consumers $3.8 billion.
In addition, 6.6 million people fell victim to account theft in the last year. Unlike identity theft, in which the criminal uses personal information to open and use accounts that are in the victim’s name, account theft entails using stolen credit or A.T.M. cards, or financial records, to steal from the victim’s existing accounts.
Such account-theft cases, the survey found, caused $14 billion in business losses and $1.1 billion in consumer losses. The vast majority of these cases, almost 80 percent, involved credit card fraud.
Though account theft and identity theft are often lumped together in popular perception, data from the survey showed that the consequences of identity theft were more severe. In identity theft, which accounted for nearly 10 million of the 27 million cases of both types in the last five years, the financial losses were greater, and it took victims longer to resolve the cases.
It is not just the fact of falsehood here. It is the scale of it. (Note the number of uses of the words “million” and “billion” in the above paragraphs.) Clearly, for certain sorts of people with certain sorts of friends, this kind of thing is not hard to do.
Recent internet ructions involving … “viruspam”? – is that the word, do you think? – have prompted understandable calls for greater government oversite of the internet:
The teenager accused of creating a version of the Blaster worm that infected computer systems across the world last week has been arrested. SoBig.F, an e-mail virus unleashed on the Internet just as Blaster was being stamped out, is expected to expire next week.
But all is far from quiet on the electronic frontier. Security experts are already preparing for SoBig.G. Another worm may already be squirming through newly discovered flaws in computer operating systems. And in the moments between epidemics, the Internet’s more run-of-the-mill annoyances — spam, scams and spyware — can be counted on to keep users on edge.
The Internet has become a vital part of commerce and culture, but it is still a free-for-all when it comes to facing computer meltdowns. As America’s 156 million Internet users brace for the next round of digital vandalism, some experts say that it is time for the government to bolster a basic sense of stability in cyberspace that societies expect from their critical public resources.
The problem being, of course, that catching the miscreants who do these dirty internet deeds is the devil of a job and could, once the effort is put firmly in place with a huge George W. Bush type mega-budget, result in a whole new raft of excuses for spying on all of us, because how else do you catch these damn people?
The basic problem of “viruspam” is that you do, after a fashion, consent to accept it, same as you agree to accept junk mail of the old-fashioned sort. That makes it damn near impossible to detect – detect in the policeman sense of catching the bastards. Detectable crime usually involves an unwilling victim, and often an unwilling victim who registers the fact of the crime having been committed pretty much at the moment it happens. “Cybercrime”, if crime it be, is not like that. Not only is it infuriating and destructive in and of itself, it is doubly destructive because of the measures “needed” to put a stop to it.
Microchips buried inside your vehicle could soon be tipping off the authorities about your driving misdeamenors, says Jason Barlow in the Telegraph.
Reports this week indicate that the Government is working on a scheme that will lead to every car in the country being fitted with a personalised microchip, enabling the powers-that-be to identify and prosecute motorists who break the law.
Electronic vehicle identification (EVI) allows the chip buried within your car to collude with the existing network of roadside sensors to provide a host of information about the individual behind the wheel, as well as monitoring exactly how vigorous their progress is on any given journey. An in-car informer, in other words, to go with the mobile phone, the Switch and credit cards, and the army of CCTV cameras already tracking our every move.
The police and the DVLA claim there are obvious benefits. Stolen cars could be traced more effectively, and uninsured vehicles more efficiently identified, reducing premiums among middle England’s most law-abiding citizens. EVI could also eliminate potentially dangerous cars without valid MoTs. The Treasury stands to recoup an estimated £185 million in unpaid vehicle excise duty.
But the truth of the matter is that it is merely another way – the most pernicious yet – of squeezing revenue out of the poor, beleaguered motorist. Motorists already supply a tenth of all government revenue – that’s £38 billion – and because we value our freedom so highly, a freedom typified by our desire to travel by car, we reluctantly continue to stump up even in the face of over-regulation and exorbitant fuel prices.
It could be worse. And, in five years, it will be – you’ll be fined for doing an illegal U-turn in the middle of nowhere at three in the morning, while someone burgles your house and gets away with it. Cue calls for everyone on the planet to be fitted with a microchip. After all, the innocent will have nothing to fear.
Truer words have rarely been spoken…
Tesco has ended a trial of new technology that tracked customers buying Gillette razor blades. The retailer denied that the technology was being used for security reasons, but shoppers considered it to be an invasion of their privacy.
After Tesco’s use of radio frequency identification (RFID) chips was revealed, protests were held outside the store and consumers wrote to Gillette demanding that plans to use the chips be shelved.
Gillette has reportedly backed away from introducing RFID chips into individual products on a wider scale, despite being an enthusiastic supporter of the technology. The company is heavily involved in the Auto-ID consortium, which is looking at ways of developing RFID for shops, but it says that chips may not be used to monitor individual products for at least 10 years.
Tesco said its Cambridge trial had finished as planned; it was only meant to be in place for six months from January, and decisions had not been affected by the protests. The company has now moved to its next phase in testing RFID, by placing chips in DVDs at its store in Sandhurst, Berkshire.
Barry Hugill, of the civil rights group Liberty, was concerned at “function creep”, in other words, information recorded for one purpose being used for another.
We want clear legal guidelines as to what information companies, government agencies, local authorities are allowed to glean [and] what they can do with it.
CNET News.com reports that the labs at RSA Security on Wednesday outlined plans for a technology they call blocker tags, which are similar in size and cost to radio frequency identification (RFID) tags but disrupt the transmission of information to scanning devices and thwart the collection of data.
According to Ari Juels, a principal research scientist with RSA Laboratories. Blocker and RFID tags are about the size of a grain of sand and cost around 10 cents.
RFID technology uses microchips to wirelessly transmit product serial numbers to a scanner without the need for human intervention. While the technology is potentially useful in improving supply chain management and preventing theft in stores, consumer privacy groups have voiced concerns about possible abuses of the technology if product-tracking tags are allowed to follow people from stores into their homes. Many retailers view RFID as an eventual successor to the barcode inventory tracking system, because it promises to cut distribution costs for manufacturers and improve retailing margins.
RSA’s technique would address the needs of all parties involved, according to Juels. Other options, such as a kill feature embedded in RFID tags, also are available, but with blocker tags, consumers and companies would still be able to use the RFID tags without sacrificing privacy.
There’s an interesting White Rose relevant posting at 2 Blowhards just now. 2 Blowhards? Mostly culture in the paintings-movies-literature sense, but often they wander towards culture in the Brian’s Culture Blog sense (where culture means whatever I want it to mean). Anyway, Blowhard “Friedrich” put a piece up yesterday called They Know Two Much, which is about targetted marketing, in this case at the extremely rich. It’s surveillance in its way. As Friedrich says, of the people he’s writing about, the “geodemographic segmentation” merchants:
Well, the next time you get some direct mail or other advertising that seems to know exactly who you are and where you live and how much tread life remains on your right rear tire, you know who to thank – or blame.
Which makes the point nicely that these people will surely be getting into bed with the CCTV minders if they haven’t already. Which would supply the CCTV people with lots of money and motivation.
“Looks like a worn tyre there – give me the number would you? Make? Owner? Address? Phone? Thank you.” Then: call one from the police about driving with a worn tyre, and call two from the tyre salesman offering immediate delivery and fitting.
Ah, brave new world.
|
Who Are We? The Samizdata people are a bunch of sinister and heavily armed globalist illuminati who seek to infect the entire world with the values of personal liberty and several property. Amongst our many crimes is a sense of humour and the intermittent use of British spelling.
We are also a varied group made up of social individualists, classical liberals, whigs, libertarians, extropians, futurists, ‘Porcupines’, Karl Popper fetishists, recovering neo-conservatives, crazed Ayn Rand worshipers, over-caffeinated Virginia Postrel devotees, witty Frédéric Bastiat wannabes, cypherpunks, minarchists, kritarchists and wild-eyed anarcho-capitalists from Britain, North America, Australia and Europe.
|