March 22nd, 2015
Ars Technical has a series of interesting articles about doxing including an article about how the Islamic State doxes US soldiers, airmen, calls on supporters to kill them . How long before IS starts identifying the Canadian special forces sent to advise in the war in Iraq and Syria. Or … imagine the doxing of drone operators as a form of retaliation.
Doxing and other troll tactics seem to be entering the mainstream. Gabriella Coleman in Hacker, Hoaxer, Whistleblower, Spy writes about Anonymous and their use of various tactics for often admirable causes. She goes further and suggests that trolling may be form of resistance suited to the emerging surveillance state,
Anonymous is emblematic of a particular geography of resistance. Composed of multiple competing groups, short-term power is achievable for brief durations, while long-term dominance by any single group or person is virtually impossible. In such a dynamic landscape, it may be “easy to co-opt, but impossible to be co-opted,” (location 5691 of 8131)
She also sees in Anonymous and trolling the tradition of the trickster. “Trickster tales are not didactic and moralizing but reveal their lessons playfully.” (Location 511 of 8131) It wasn’t long before the tricksters got attacked as the tactics spread. See Dox everywhere: LulzSec under attack from hackers, law enforcement.
The GamerGate controversy showed a much darker side to trolling and how these tactics could be used to bully as much as to resist. The people doxed were mostly women and so-called “social justice warriors” who annoyed certain gamers. Those doxed were hardly the powerful or Big Brother watching us. Now (women) academics who study gaming are being identified. How long before we have to train our graduate students in Anti-doxing strategy as part of preparation for research into games?
March 17th, 2015
Wired and others have stories about how Nintendo Is Finally Bringing Mario to Mobile Phones. They are entering into an alliance with DeNA by buying DeNA stock (and DeNA will buy Nintendo stock.) Iwata (Director and President of Nintendo) and Isao Moriyasu (President and CEO of DeNA) made a joint announcement. You can see a translated version of the presentation on YouTube here.
This is a big change for Nintendo as they have been losing money as the traditional console gaming industry loses market share to casual and mobile platforms. I had heard ex-employees say Nintendo would never make the transition, but stay committed to tight integration of their games and dedicated devices. Obviously things have changed and now Nintendo will be deploying their IP to smartphones, especially to reach a global market. Nintendo stock closed 27.5% up.
My understanding of Iwata’s explanation was that they now see mobile versions as building their fan base and therefore helping sell dedicated devices/content. They are afraid that they will be marginalized globally if they don’t expand the reach of their IP. They have now decided how to use smart devices as a way into dedicated systems.
Because the interfaces are different, they don’t intend to just port existing titles to mobile platforms. Instead they will work with DeNA to create new content specifically for smart devices.
March 17th, 2015
The Japanese Agency for Cultural Affairs has released a first version of their Media Arts database (only in Japanese). This database has, among other things, about 36,000 game titles. I think the games database was developed by the team at the Ritsumeikan Center for Game Studies (RCGS) – they were certainly working on this when I visited.
You can read an announcement from Anime News Network here.
March 17th, 2015
Is it Research or is it Spying? Thinking-Through Ethics in Big Data AI and Other Knowledge Sciences has just been published online. It was written with Bettina Berendt and Marco Büchler and came out of a Dagschule retreat where a group of us started talking about ethics and big data. Here is the abstract:
How to be a knowledge scientist after the Snowden revelations?” is a question we all have to ask as it becomes clear that our work and our students could be involved in the building of an unprecedented surveillance society. In this essay, we argue that this affects all the knowledge sciences such as AI, computational linguistics and the digital humanities. Asking the question calls for dialogue within and across the disciplines. In this article, we will position ourselves with respect to typical stances towards the relationship between (computer) technology and its uses in a surveillance society, and we will look at what we can learn from other fields. We will propose ways of addressing the question in teaching and in research, and conclude with a call to action.
A PDF of our author version is here.
March 15th, 2015
One of the key issues raised by Snowden is whether all this surveillance works. The Washington Post has a story from a year ago reporting that NSA phone record collection does little to prevent terrorist attacks, group says. This story is based on a report:
Read the rest of this entry »
March 14th, 2015
Canadian Journalists for Free Expression and partners have announced and released a searchable Snowden Surveillance Archive. This archive is,
a complete collection of all documents that former NSA contractor Edward Snowden leaked in June 2013 to journalists Laura Poitras, Glenn Greenwald and Ewen MacAskill, and subsequently were published by news media, such as The Guardian, The New York Times, The Washington Post, Der Spiegel, Le Monde, El Mundo and The Intercept.
It is dynamic. As new documents are published they will be added.
You can hear the announcement and Snowden in CBC’s stream of Snowden Live: Canada and the Security State.
One thing I don’t understand is why, in at least one case, the archived document is of lower quality than the one originally released. For example, compare the Snowden Archive of the CSEC Document about Olympia and the version from the Globe and Mail. The Snowden one is both cropped and full of artefacts of compression (or something.)
One of the points that both Snowden and the following speakers made is that the massive SIGINT system set up doesn’t prevent terrorist attacks, it can be used retrospectively to look back at some event and figure out who did it or develop intelligence about a someone targeted. One of the speakers followed up on the implications of retrospective surveillance – what this means for citizens is that things you do now might come back to haunt you.
March 8th, 2015
Michael Geist gives a good talk on Why Watching the Watchers Isn’t Enough. This talk was part of a symposium on Pathways To Privacy.
Geist’s point is that oversight is not enough. Those who now provide oversight have come out to say that they are on the job and that the CSE’s activities are legal. That means that oversight isn’t really working. The surveillance organizations and those tasked with oversight seem to be willfully ignoring the interpretation of experts that the gathering and sharing of metadata is the gathering and sharing of information about Canadians.
He talked about how C-51 affects privacy allowing information sharing way beyond what is needed for counter-terrorism. C-51 puts in place a legal framework for which no amount of oversight will make a difference. C-51 allows information to be shared between agencies about “activities that undermine the security of Canada.” An opinion piece in the Toronto Star by Craig Forcese and Kent Roach of antiterrorlaw.ca suggests that this could be interpreted as license to spy on students protesting tuition fees without municipal permission, eco-activists protesting illegally and so on.
March 4th, 2015
Ars Technica has a good article on Cybergeddon: Why the Internet could be the next “failed state”. The article all the ways the internet is being abused (from porn to the theft of information.) The article starts by reminding us of all the abuse on the internet from revenge porn to the theft of personal information. It then summarizes a paper by Jason Healey, The Five Futures of Cyber Conflict and Cooperation that outlines five possible cyber futures from the unlikely Paradise to Status Quo, Domain (where cyberspace is a domain like any other for conflict), Balkanization, and Cybergeddon.
One wonders what the futures for cyberspace for the academy are. Here are my speculative futures:
- Balkanization: universities create their own internets (intranets?) to keep out the great unwashed. Alumnae get to keep their university email addresses if they behave. The elite universities (like the University of Alberta) then create a ivory tower subnet where only the important hang.
- Cybergeddon: trolls drive academics off the internet as we are all Social Justice Warriors who should be doxxed, swatted, and watched. Risk management takes over and academics are not allowed on the internet without grant-funded insurance.
- Paradise: universities finally succeed is teaching ethics reliably and the world is made a better place. Philosopher rulers are put in charge. The internet becomes the nice safe place it was originally. Microsoft goes out of business, but wills Bob to the internet to be its AI policeperson.
March 2nd, 2015
This Friday and Saturday I was at a lovely two day conference, Press Start: Culture, Industry, and Innovation in Japanese Gaming. The conference was put on by the University of British Columbia Centre for Japanese Research. The conference had excellent involvement from Japanese game companies like Bandai Namco, Sega, Capcom, and DeNA. The industry folk talked about the challenges of the expanding mobile market and how their Vancouver studios are positioned in their larger business.
I gave the opening talk on beginnings (as in Press Start) and kept conference notes here.
February 27th, 2015
Great story about how the Guardian’s destroyed Snowden laptop to feature in major V&A show. This is the laptop that the government forced the Guardian to destroy because they had the Snowden leaked documents on it.