Computer Network Access/Data Flows
Articles and Resources
Date Fairness.com Resource Read it at: May 25, 2016 State Department email audit faults Hillary Clinton
QUOTE: Hillary Clinton and her team ignored clear guidance from the State Department that her email setup broke federal standards and could leave sensitive material vulnerable to hackers, an independent audit has found. Her aides twice brushed aside concerns, in one case telling technical staff “the matter was not to be discussed further.”
Public Broadcasting Service (PBS) Apr 14, 2016 Investigating the algorithms that govern our lives
QUOTE: Venkatasubramanian is a computer science professor at the University of Utah. He’s someone who thinks about algorithmic fairness, ever since he read a short story by Cory Doctorow published in 2006, called “Human Readable.” The story takes place in a future world, similar to ours, but in which all national infrastructure (traffic, email, the media, etc.) is run by “centralized emergent networks,” modeled after ant colonies. Or in other words: a network of algorithms. The plot revolves around two lovers: a network engineer who is certain the system is incorruptible, and a lawyer who knows it’s already been corrupted. “It got me thinking,” says Venkatasubramanian. “What happens if we live in a world that is totally driven by algorithms?”
Columbia Journalism Review (CJR) Aug 14, 2014 Founder Of One Laptop Per Child: Maybe Net Neutrality Isn’t Such A Good Idea After All
QUOTE: What we need, then, is some kind of middle ground, Negroponte suggests — but he also doesn’t quite suggest where that might be. Instead, he likens available bandwidth to a limited natural physical resource. If it’s immoral to use up all of the air, or water, or oil on frivolous things, is it perhaps also immoral to use up the internet?
Consumerist Jan 17, 2014 Obama Outlines Calibrated Curbs on Phone Spying
QUOTE: in a speech at the Justice Department that seemed more calculated to reassure audiences at home and abroad than to force radical change, Mr. Obama defended the need for the broad surveillance net assembled by the N.S.A. And he turned to Congress and the intelligence agencies themselves to work out the details of any changes.
New York Times Oct 01, 2013 Google Accused of Wiretapping in Gmail Scans
QUOTE: Google, must defend itself against accusations that it is illegally wiretapping in the course of its everyday business — gathering data about Internet users and showing them related ads. The accusations, made over several years in various lawsuits that have been merged into two separate cases, ask whether Google went too far in collecting user data in Gmail and Street View, its mapping project.
New York Times Jul 30, 2013 Now That It’s in the Broadband Game, Google Flip-Flops on Network Neutrality
QUOTE: In a dramatic about-face on a key internet issue yesterday, Google told the FCC that the network neutrality rules Google once championed don’t give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network....So in Google’s version of net neutrality, the FCC was the right to force Apple to let iPhone users connect to their home servers, but the FCC has no right to force Google to let its broadband subscribers run a home server.
Wired Jun 27, 2013 NSA collected US email records in bulk for more than two years under Obama
QUOTE: The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans...under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days"... The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.
Guardian Unlimited May 01, 2013 Google Glass, the beginning of wearable surveillance
QUOTE: imagine that millions of Americans walk around each day wearing the equivalent of a drone on their head: a device capable of capturing video and audio recordings of everything that happens around them. And imagine that these devices upload the data to large-scale commercial enterprises that are able to collect the recordings from each and every American and integrate them together to form a minute-by-minute tracking of the activities of millions....default mode is for all data to be automatically uploaded to cloud servers, where aggregation and back-end analytic capacity resides. So, who owns and what happens to the user's data?
CNN (Cable News Network) Mar 31, 2013 Is A ‘Just Looking’ Fee A Smart Business Decision?
QUOTE: To complicate things even further for brick and mortars, the rise of smartphones has made it easy for consumers to walk into a store, browse the inventory, and comparison shop right from within. Stores risk losing customers to competitors before they’ve even left the store....As of the first of February, this store will be charging people a $5 fee per person for “just looking.”
WebProNews Mar 28, 2013 Cyberattacks Seem Meant to Destroy, Not Just Disrupt
QUOTE: an intensifying campaign of unusually powerful attacks on American financial institutions that began last September and have taken dozens of them offline intermittently, costing millions of dollars....Corporate leaders have long feared online attacks aimed at financial fraud or economic espionage, but now a new threat has taken hold: attackers, possibly with state backing, who seem bent on destruction.
New York Times Mar 16, 2013 The Internet is a surveillance state
QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.
CNN (Cable News Network) Mar 01, 2013 Will the “Six Strikes” Copyright Alert System Hurt Consumers And Small Businesses?
QUOTE: On Monday, the Copyright Alert System, or “Six Strikes”, went into affect across the five biggest ISPs in the U.S. The system hopes to catch those pirating content over P2P networks, and send them a notice detailing their infringement. The hope is that those who are caught will start using legal alternatives. To better understand the CAS, we have to look at what the Center for Copyright Information is doing with it. First, there are three tiers to the CAS that consumers should be aware of with each tier having two levels within it. The three tiers are as follows – educational alerts, acknowledgement alerts and mitigation measures.
WebProNews Jan 23, 2012 MegaUpload: The content cartel strikes back
QUOTE: Like SOPA and PIPA, the bust comes with its own collateral damage. Along with those pirated movies and music, the feds took down noninfringing data from thousands of legit MegaUpload users, who are howling in protest and demanding -- futilely, so far -- the return of their stuff.
InfoWorld Nov 30, 2011 Is your phone telling the carrier everything you do?
QUOTE: the XDA-Developer site noticed that a preinstalled mobile app, named CarrierIQ, was logging all smartphone activities with no way to opt out....Although consumers are buying smartphones — and assume they have ownership — are the handsets theirs to do with as they please, without the carriers or handset makers know what they’re doing?
GigaOM Aug 11, 2011 Court: Clogging email and voicemail systems can be legal: Court ruling means it's OK for protesters to shut down a company's communication systems under certain circumstances
QUOTE: The ruling can be viewed a victory for free speech because it means people can continue to freely launch legitimate protest campaigns against business and politicians alike via email and phone calls. But it also means that groups with questionable aims can engage in similar practices under the guise of fighting for a greater good when, in fact, they're acting out of selfish interests.
InfoWorld Aug 08, 2011 Facebook’s Privacy Issues Are Even Deeper Than We Knew
QUOTE: privacy issues go beyond what the social networking giants themselves do. Now the question includes what they’ve enabled others to do. The research also neuters the conventional retort, “you can opt out,” because the results are based on public information.
Forbes Aug 02, 2011 Car hacks loom as autos go wireless: Tomorrow's vehicles will communicate wirelessly to reduce accidents, and experts are working to ensure hackers can't abuse the technology
QUOTE: The experts involved believe that 83 percent of unimpaired vehicle-related fatalities (those not connected to drugs, alcohol, and so on) might be avoided by boosting vehicular intelligence. Still, any technology capable of transmitting personal data -- in this case, auto-related information -- and controlling our cars could be abused by hackers.
InfoWorld May 12, 2011 Why gadget makers wield a 'kill switch'
QUOTE: When you buy a video game from Best Buy, you don't give the retailer the right to barge into your house whenever it wants. So why do we give that permission to software companies? Most popular smartphone operating systems and other electronic gadgets include what security researchers refer to as a kill switch. This capability enables the company that makes the operating software to send a command over the Web or wireless networks that alters or removes certain applications from devices.
CNN (Cable News Network) Mar 29, 2011 Amazon Introduces a Digital Music Locker
QUOTE: Though some companies let people upload their music and listen to it elsewhere without any outcry from the labels, others, like MP3tunes, have been sued by music labels. Another issue: it is impossible for Web companies to tell whether a song was bought legally or downloaded illegally.
New York Times Mar 28, 2011 Dispute Over Time Warner Cable’s Streaming to iPad Bursts Into the Open
QUOTE: Time Warner Cable started streaming several dozen TV channels to customers’ iPads. Immediately, channel owners like Viacom and Scripps Networks seized on the streaming capability as a contract violation — in part because they want cable companies to pay them more for the privilege to stream.
New York Times Feb 16, 2011 Rhapsody: Apple has gone too far
QUOTE: Rhapsody's issue: Apple wants 30% of all sales generated through its platform. And now, publishers can no longer provide links in their apps to let customers buy content outside of the app.
CNN (Cable News Network) Dec 21, 2010 F.C.C. Approves Net Rules and Braces for Fight (Media Decoder)
QUOTE: The new rules [approved by the FCC-- Ed.] are, at best, net semi-neutrality. They ban any outright blocking and any “unreasonable discrimination” of Web sites or applications by fixed-line broadband providers, but they afford more wiggle room to wireless providers like AT&T and Verizon.
New York Times Jun 02, 2010 Heaviest Users of Phone Data Will Pay More
QUOTE: The trouble for AT&T was that a fraction of users — fewer than 2 percent — made such heavy use of the network that they slowed it down for everyone else. Starting on Monday, AT&T will offer tiered pricing. People will pay based on what they use, which the company says is fairer to everyone.
New York Times May 18, 2010 The cloud's conflict of interest over interoperability: It's time for cloud customers to vote with their dollars to get the openness and portability they've been promised
QUOTE: The core motivation behind the lack of cloud interoperability is based on a simpler rationale: greed. Cloud providers have a clear conflict of interesting in support interoperability, as it deprives them of the ability to lock in customers.
InfoWorld May 10, 2010 Social networking raises legal, regulatory issues for businesses: Companies are finding...too valuable as sales-lead generation and marketing to block
QUOTE: many businesses are attempting to simply block all access to social networking sites for employees who would fall under regulatory scrutiny, such as broker-dealers and sales and marketing representatives, even though these employee are finding the sites invaluable.
InfoWorld May 02, 2010 Web’s Users Against Its Gatekeepers
QUOTE: With the majority of Internet traffic expected to shift to congestion-prone mobile networks, there is growing debate on both sides of the Atlantic about whether operators of the networks should be allowed to treat Web users differently, based on the users’ consumption.
New York Times Apr 22, 2010 Is Google the new Rome? Cloud computing may be leading to a federation-like worldview on data management, but national laws will be a major obstacle
QUOTE: Google's Rome-like worldview extends to how it will treat the location of customer data. Google is not offering U.S. businesses any specific assurance that their data will be stored in a U.S.-based data center.
InfoWorld Apr 04, 2010 The latest Facebook fracas: Your privacy vs. its profit
QUOTE: maybe Facebook's executives are correct in assuming that people don't want as much privacy online, as founder Mark Zuckerberg said in January. (He did not say that privacy was dead, nor does he seem to think that....But even if all of those theories are true, changing the rules to share people's information without advance permission crosses a line.
Washington Post Mar 12, 2010 Apple’s Spat With Google Is Getting Personal
QUOTE: Google and Apple had worked together to bring Google’s search and mapping services to the iPhone...Mr. Jobs, Mr. Schmidt and their companies are now engaged in a gritty battle royale over the future and shape of mobile computing and cellphones, with implications that are reverberating across the digital landscape.
New York Times Dec 01, 2009 Sprint fed customer GPS data to cops over 8 million times
QUOTE: Christopher Soghoian... has made public an audio recording of Sprint/Nextel's Electronic Surveillance Manager describing how his company has provided GPS location data about its wireless customers to law enforcement over 8 million times.
Ars Technica Oct 22, 2009 To protect your privacy, hand over your data
QUOTE: [some experts believe] our digital identities will be more secure if they rest on reams of data on our everyday life culled from cellphones, online transactions and the like.
New Scientist Oct 19, 2009 Exclusive: U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets (Danger Room)
QUOTE: In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using ”open source intelligence” — information that’s publicly available...
Wired Oct 17, 2009 When 2+2 Equals a Privacy Question (Slipstream)
QUOTE: So, what might your movie picks and your medical records have in common? How about a potentially false sense of control over who can see your user history?
New York Times Oct 09, 2009 FCC to investigate "gating" role of middle-mile access lines
QUOTE: As DSL or cable customers, consumers usually pay directly for that last-mile access. But large businesses and other ISPs shell out humongous sums for middle and secondary transport services to connect their networks or cell towers with the Internet backbone.
Ars Technica Oct 09, 2009 Against Transparency: The perils of openness in government.
QUOTE: More information,[from greater government transparency]" as [Archon] Fung and his colleagues put it, "does not always produce markets that are more efficient." Instead, "responses to information are inseparable from their interests, desires, resources, cognitive capacities, and social contexts..."
New Republic, The (TNR) Oct 09, 2009 Epicenter The Business of Tech The Empire Strikes Back: FCC Probes Google Voice (Updated) (Epicenter)
QUOTE: AT&T has just given Google a taste of its own mandated openness medicine, successfully goading federal regulators into officially looking into why Google’s Voice service blocks phone calls to certain rural numbers.
Wired Oct 08, 2009 File-hosting site up in arms over Firefox plug-in
QUOTE: One of the latest incidents in the ongoing battle over advertising involves file-hosting sites, which support the service by showing ads to users as they download files. One of these sites, MediaFire, is bothered by a Firefox plugin called SkipScreen which automates the user straight past the ads.
Ars Technica Oct 08, 2009 Cuba bloggers test government limits
QUOTE: [Cuban] Bloggers - many of whom were born after the 1959 revolution - are trying to move debate away from the established official doctrine to exploring social and economic issues
British Broadcasting Corporation (BBC) Sep 22, 2009 Netflix Prize 2: (Privacy) Apocalypse Now?
QUOTE: security researchers found a way to link the anonymous movie recommendations with data from other sites in order to identify individual Netflix users.
Ars Technica Sep 17, 2009 To friend or not to friend? College admissions in the age of Facebook
QUOTE: How colleges can employ social networking sites and the possible conflicts that can arise from their use are hot topics among admissions officials...
USA TODAY Sep 13, 2009 FTC forces Sears, Kmart out of the spyware business
QUOTE: The Federal Trade Commission (FTC) has busted a strange set of spyware purveyors—US retailing giants Sears and Kmart.
Ars Technica Sep 10, 2009 War of technologies in California speeding case: Parents of a teen driver use data from a GPS vehicular tracking device to fight a speeding charge based on radar guns.
QUOTE: A California speeding ticket case to be decided in coming weeks puts a new twist on the age-old cops versus drivers battle, pitting police radar against personal GPS tracking devices.
Christian Science Monitor Sep 02, 2009 Movie studios again demand HDTV disabling powers from FCC
QUOTE: "The vast majority of consumers would not have to purchase new devices to receive the new, high-value content contemplated by MPAA's" request, the group [MPAA] assures the FCC.
Ars Technica Aug 31, 2009 A Few Good Kids? How the No Child Left Behind Act allowed military recruiters to collect info on millions of unsuspecting teens.
QUOTE: In the past few years, the military has mounted a virtual invasion into the lives of young Americans. Using data mining, stealth websites, career tests, and sophisticated marketing software, the Pentagon is harvesting and analyzing information on everything from high school students' GPAs and SAT scores to which video games they play.
Mother Jones Aug 31, 2009 How we’re losing our privacy online
QUOTE: As we slip further into the Internet era, they [computer experts] argue that we are every day surrendering more of the private us to the public domain
Christian Science Monitor Aug 29, 2009 Social Networks Leaking Users Data To Tracking Sites: Browsing profile linked to unique identifier
QUOTE: Many popular social networking sites typically make personal information available to companies that track users' browsing habits...
WebProNews Aug 28, 2009 FCC launches far-reaching investigation of cellular industry: The FCC has launched an investigation of the wireless industry that takes the agency into new, and for some, uncomfortable terrain.
QUOTE: the three Notices of Inquiry that the agency [Federal communications Commission] announced at its Open Commission meeting notably and perhaps even radically expand the array of questions that it usually asks of the wireless service sector.
Ars Technica Aug 27, 2009 Italian Regulators Investigating Google
QUOTE: Italian competition authorities said Thursday that they were investigating Google, following complaints from publishers that the company was abusing its dominant position on the Internet to deny them a fair share of online advertising revenue.
New York Times Aug 25, 2009 Threat Level Privacy, Crime and Security Online Federal Courts Wary of Document-Sharing Plugin
QUOTE: The federal court system doesn’t seem to like Harlan Yu, or his fellow merry pranksters, who made a tool to free court documents from an unwieldy computer system that has a nasty habit of charging 8 cents a page for public documents.
Wired Aug 25, 2009 Unchain the Office Computers! Why corporate IT should let us browse any way we want.
QUOTE: So why not lock down workplace computers? Here's why: The restrictions infantilize workers—they foster resentment, reduce morale, lock people into inefficient routines, and, worst of all, they kill our incentives to work productively.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!