John D Radcliff, Specializing in Interactive Technology & Education!

How secure are cell phones?

        "In internet governance, the term security now encompasses a host of problems, perhaps too many to fit properly under one word.  It includes the fight against spam, viruses, and phishing.  It refers to bugs in protocols and operating systems on computers, mobile phones, and other devices that create opportunities for exploitation by clever programmers (p 159-160, Networks and States)."
       
        With the increased rise and wide use of the cell phone, the risk of information being stolen from these devices raise several questions.  For example, "what is the risk of having our private information stolen from our cell phones?"  Is it safe to perform private transactions, such as online banking or contactless credit card purchases on a cell phone?" 

        According to the "Is it safe to bank by cell phone?" article on MSN money, "Mobile browsers are theoretically susceptible to the same kind of security risks as a home or office computer. In reality, they are probably somewhat safer at the moment because creators of password-pilfering viruses and Trojan horses haven't yet fully focused on the mobile market. Of course, mobile Web users are as susceptible as anyone else to the phishing scams and spoofed Web sites that try to trick users into disclosing passwords and other personal data." 

Phishing-scammer

        The same rules apply with desktop computers as they do with cell phones, which is to use the same level of precaution when accessing online information.  These variants cause the following once the phone is infected: leakage of private data, excessive battery drainage, and the spread or replication by using bluetooth.  The key to being safe from these variants is to avoid fake e-mails which look like they have come from reputable sources and being cautious of what websites are visited.     

        Also, the best solution when performing mobile bank transactions is to use proprietary apps that are designed to work with a bank's security algorithm that are resistant and safer then using a mobile web browser which can be susceptible to phishing scams.  The big downside to this is these programs can store sensitive information on the phone itself.  This can be dangerous if the phone is lost and then ends up in the wrong hands so disabling certain features that this app can offer is essential to maintaining optimal privacy of personal information.

        Another issue with using cell phones for financial transactions is the ability of using a cell phone as a credit/debit card.  This technology is currently being used in Japan and is now being used by select retailers in the United States.  All a person has to do is wave their cell phone in front of the credit card terminal and the cell phone terminal picks up the credit card information from the phone which then processes the payment.  Even though this is a quick way to pay and may be the demise of the wallet, there are some key issues with this new technology.

        Privacy, security, and dispute rights are the main concerns with this new technology as mentioned by a coalition of consumer rights advocates.
The issue of privacy with this technology is that a person's location and profile can be transmitted through this contactless payment card system.  Marketers can use this information for marketing and profiling purposes without the consent of the consumer.  The consumer groups say people using contactless devices should be given clear notice of the potential for privacy intrusion.  According to Takingcharge.com, "consumers should be able to make contactless payments without having their activities tracked except for payment processing and record keeping if that is their desire," the statement says (Contactless payment cards raise security, privacy concerns, consumer groups say, Connie Prater, June 23, 2008).   

Article-cell-phone-contactless-credit-card

        The issue with security is that if someone has an RFID reader, they can intercept the signal and steal the credit card information being transmitted to the payment terminal.  The other concern is the same as mentioned earlier which is the sensitive banking and credit card information stored on the phone.

        Dispute rights are the final issue with these contactless payment systems.  The concern with this is the accuracy and the ability to dispute charges made using this system.  These consumer groups suggest putting a safeguard in place which would allow a daily dollar cap on the amount of transactions processed on these contactless devices. 

       The more mobile our world becomes the issues of privacy and securing of information will still be a big concern.  Using this type of technology comes with great convenience and risks at the same time.  Eventually we may see a new era of mobile devices which will solve all of our needs and be safe at the same time.  Until then, we must be aware of what advantages and disadvantages this new technology brings.

Controlling the Flow of Information in Libya

        “Control is not simply manipulation, but rather modulation.  One does not simply control a device, a situation, or a group of people; rather, “control” is what enables a relation to a device, a situation, or a group.  “People are lines,” Deluze suggests.  As lines, people thread together social, political, and cultural elements (The Exploit by Alexander Galloway and Eugene Thacker, p. 35)."

        The first part of this quote examines how control is not manipulation, rather it is modulation and that we do not directly control an object but rather the connection we make to a particular object.  We can look at how Ghadaffi, Libya's ruler, emulates this example of modulation.   The internet was shutdown in Libya to control the flow of information and cool the political temperature in Libya.  According to AllFacebook.com, "Gaddafi warned against the use of Facebook where groups have formed calling for economic and political reforms.  Gaddfai's security forces have arrested activists who've posted online about the revolution."  This is a perfect example of how the Libyan government is working on controlling the internet in Libya. 

        Yet despite the governments efforts, information about the events in Libya are still getting transmitted to different online venues through the internet.  According to eweek.com, "there are a number of alternatives being shared on Twitter for Libyans to get online, such as a free dial-up account provided by organizations in Europe.  XS4ALL, a "hacker-friendly" Internet service provider based in the Netherlands, opened up its modem lines for free during the previous curfew, but there had been no activity from Libya on the account, XS4ALL’s Niels Huijbregts told eWEEK."
So there are outside resources that are allowing the people inside Libya to connect to the internet so that information about the events in Libya can still get out on the internet. 

Net-traffic

        So Ghadaffi may have stifled or caused the flow of information to be routed but has he completely shut off or disrupted the flow of information?  According to some journalists it looks like cell phone access was still working several weeks ago despite the Libyan government shutting off internet access and owning the two mobile phone operators in the country.  We can also see that this has still not disrupted the "lines" of communication in the network like what Ghadaffi was hoping to accomplish.  He managed to shutdown the main nodes which control internet access and arrested some bloggers posting an anti Ghadaffi message online, yet he has failed to completely take down the network of conversations or people involved.  This is because it is the network of people not the nodes that keep information flowing.

        If Ghadaffi wanted to completely control the flow of information he would need to remove the key people involved in the networking spreading the information on the internet.  The conversation then spreads through the network were other people pickup the conversation and then pass it along.  The Libyan government trying to shut off access or stop the modulating signal of information is one level of control and the people in the network passing the conversation along is another form of modulation or control of the flow of information.  If the information is stopped at one point or a node is destroyed, then information can still pass through other functioning nodes or networks. 

Airstrike-against-CIA-Israeli-mercenaries

        No matter how or who tries to control the flow of information, there are still other ways for information to spread as long as the key ties in the network are still functioning.  This is just like a virus spreading if it affects one place or person it can spread to others instantly even if part of the virus is contained.  For example, if we look at @ShababLibya on Twitter this is a Libyan movement inside and outside of Libya which also has a Facebook Page associated with the movement.  We can see that since predefined connections and sites have been established that the flow of information can still exist.  Other resources can be used and if predefined alternative methods of communication have been established (dial-up, cellular, radio communications, etc.) then information can still get out through these alternative channels. 

        Can the flow of information be stopped even though one area of the network has been shut off?  From what we have seen predefined channels and connections are hard to break or destroy once once they are established.  In the end, even if the flow of information is interrupted or changed, this flow can be rerouted using other channels or resources.

What is considered private?

        Is there privacy for people today or are we always in the public eye?  Are we always connected or being watched even when we think we are not?  The rise and use of cell phones has had an astounding effect on our privacy especially now since all cell phones come standard with a built in camera. 

Samsungi8510-sb_camera_phone

        So is there any privacy rights or laws for people if a person captures another person in an embarrassing or compromising situation then posts it to the internet?  For example, lets say person A captures person B in an embarrassing or compromising situation.  Then person A uploads the video to You tube and it goes viral.  Now person A is out in the public eye and did not consent to having themselves broadcasted online.  Is this an invasion of privacy? 

        Lets take for example the shocking story of Danya Kempson who lost control of her car and died after colliding into some trees.  A first respondent fire fighter captured her death on video using his personal cell phone.  The fire fighter later shared this video with other fire fighters, then an unknown firefighter took the video to a bar and texted it to other patrons.  After that, the video went viral.  Then months after her death, the parents received a copy of the video via e-mail from an ex-brother-in-law. 

        According to the iNews article, "The parents are outraged, and are pleading for the video to be taken out of circulation, and that the firefighter in question be punished. The firefighter has been suspended, until the legality has been established."

There are two questions being asked from this incident:
1. Was it illegal for the video to be taken in the first place and shared with other firefighters?
2. Other videos have been taken out in the field by first-responders of all kinds.  So is this more of a moral then a legal issue?

        The Spalding County Sheriff’s office is looking into whether this violated any internal rules since the taking and distribution of the video did not violate any laws.  The family in this incident believe there should be a law in place to prevent this kind of footage from being taken.  Currently, there are no laws in place in the U.S. to prevent the taking and distribution of video.  There are laws and policies that prevent the distribution of video without a persons consent and most public or private establishments prohibit the taking of video.  Since the firefighter has not been questioned into why he took the video another question arises from this example.  The question is, what if this video was taken by a person passing by and then spread anonymously?  Also, what would drive someone to capture and share a tragic video of another person's death? 
 
        Morally I think the firefighter should have thought twice before sharing the video.  He could have taken it and then thought about it for a couple of days then deleted the video or ask his superiors if it would be appropriate to share.  I think most people react in the moment and want to share events or information with people in their close social circles.  Maybe this is just like the example in the book Connected, were in Rockdale County, Georgia, "a norm among the teenagers that sex – and sex of a particular kind, involving multiple partners – was acceptable," (p. 96).  So since other first respondent people on the scene of accidents have taken videos of accident victims in the past, then it was socially acceptable for this fire fighter to take a video of this young girl who died in a car accident and share it with other fire fighters.

Car_wreck

        This now goes back to the other question being asked, "is this an invasion of privacy?"  The answer to this is it depends on the society and what people in the society deem as socially acceptable.  If  there are rules or signs in place which state "no video taping allowed" then it is very clear that taping a video of something or someone is prohibited.  If it is out in public, like an auto accident, a crime, or brutality against someone, then in most social circles this can be acceptable and controversial at the same time.   Once again the right to the freedom of speech and expression comes into play.  It may be o.k. and a person's right to use a cell phone to video tape an auto accident of two cars colliding as evidence of who was at fault, but it maybe controversial to film a dead person who has died in a car accident. 

        When it comes to privacy, the social network for that particular culture, region or society has to determine if the kind of information being distributed is socially acceptable or an invasion of privacy.

Are your habits and actions being watched?

        Hasan Elahi was stopped and questioned by Homeland Security when flying back to the United States from a Transience Project.  The reason for his detention was "suspicious movement after 9/11." and he was labeled as a suspected terrorist.  Data on Hasan, like his cell phone records, were anonymized which made his whereabouts unknown which is what had him detained by Homeland Security.  Since Hasan has been tracking his own movements for several years now, he could provide records of his whereabouts to the authorities which prompted his release.

B4s_credit1230_100615c
 

        A predictive algorithm, developed from MIT was used on Hasan's data which failed to predict his movements making him fully unpredictable.  So does this mean that suspicious equals unpredictable?  If a person is unpredictable in there movements then is this an accurate way to determine if someone could be a possible terrorist or threat?  In the MIT study 93 percent predictability was found on all of the test subjects and only 7 percent of the time were a person's wereabouts a mystery.  Based on this study, the predictability of a person's movement is preferred, if not then it can lead to problems as in the example of Hasan and his encounter with Homeland security.

        So is monitoring people's cell phone, debit/credit card activity, and traveling activities a more efficient way to profile people?  We are tracked everytime we use these products so our whereabouts are constantly being transmitted.  So if someone does not conform to leaving a digital trail by using a cell phone or debit/credit card does this automatically make a person a terrorist and is this a just assumption?  What about a persons right to privacy or is this necessary in the war against terrorism?

Blazing new digital trail_large

        People have the right to try and keep their life as private as possible.  From Homeland security's reasoning if people and their habits are predictable then they are not considered a terrorist.  We should look closely at people's habits but not to the point of scrutinizing people due to not leaving a digital trail.  For example, if Hasan does not use a cell phone or credit cards to keep his whereabouts unknown, then this should acceptable.  Instead of interrogating the man to find out if he is a terrorist which I think violates his basic rights to life, liberty and the pursuit of happiness. 

        Homeland Securities actions do not surprise me since monitoring strange or no habits on a person is the algorithm that most government agencies use.  The same algorithm works with credit card companies who alert cardholders of unusual spending activity which is compared against a person's normal spending history.  I think Hasan is an important example and shows that Homeland Security made a mistake by analyzing his habits or non habits in the network.  Since he showed up as an anomaly, this was a red flag which triggered Homeland Security to stop and interrogate him.  Obviously he is not a terrorist and at the same time this questions the validity of the predictive algorithm.  It could be that this was an isolated incident since the algorithm shows that only 7 percent of the time is a person's whereabouts a mystery. 

        Liberty and False Comparisons, an online article published by James Joyner reflects these times of change:  "The conservative, torture-friendlyWashington Times, declared that “a balance must be struck between reasonable security measures and the maintenance of a free society.” Abu Ghraib was a fraternity prank, but getting frisked at the airport is a sign of, to quote the Times, “Big Sister’s police state.” (Outside The Beltway, http://www.outsidethebeltway.com/liberty-and-false-comparisons)  If the predictive algorithm was used before people entered an airport, then the need to screen everyone before they enter an airplane could be decreased. 

        The predictive algorithm is an important endeavor for studying people's habits and even though there is a margin of error, the algorithm is still necessary in protecting national security.  It is easier to justify searching or questioning someone who has unusual habits then it is to stop someone based on their race or religion.  This way an entity like Homeland Security can justify stopping, searching and questioning someone based on their habits and avoid backlash since they did not profile someone based on race or religion.  This form of tracking dangerous individuals is a big step forward in keeping people safe and minimizing the violation of people's rights.  There will always be flaws or margins of error which will be hard to account for and it is in the best interest of the nation state to protect its people in the most efficient way possible.

Do we have freedom of speech on the internet?

        My question from all of the readings this week (Habermas on the public sphere, Mark Poster, “Cyberdemocracy”, and Pieter Boeder, “Habermas Heritage: the future of the Public Sphere in the Networked Society”) is do we really have freedom of speech or are we always being watched, judged and assessed?

        People can say what they want and freely express themselves online, but there can be consequences to a person's actions.  Alexandra Wallace, a UCLA student, posted a vblog on YouTube which gained national attention.  Her video gained over 30 thousand views, a corresponding video commenting on her video gained over 2 million views, and the story was covered by Fox News.

        The interesting thing about this video is how a comment on the original posted video gained more views and comments then the original video that was posted.  Interesting how David So, a stand up comedian, used Alexandra's video, which went viral, to gain over 2 million views on his vblog comment.  Even though our discussion is not about how this other individual capitalized on another persons controversial video, it is worth taking note that this comedian used this other person's video to gain viewer ship and popularity as a comedian. 

UCLArant

        The UCLA Chancellor Gene D. Block said "Like many of you, I recoil when someone invokes the right of free expression to demean other individuals or groups," he wrote in a statement posted on the university's website.  Earlier Friday (March 18th, 2011), university officials said they would not discipline Wallace because her video was an exercise of free speech, not hate speech, and it didn't violate the student code of conduct.

        From this incident, she has withdrawn from school due to harassment from her peers.  She wrote "The video has led to the harassment of my family, the publishing of my personal information, death threats and being ostracized from an entire community. Accordingly, for personal safety reasons, I have chosen to no longer attend classes at UCLA. I was trying to produce a humorous YouTube video, but instead offended the UCLA community and the entire Asian culture." 

        This looks like cyberdemocracy at work which by definition is "the use of information technologies and communication technologies and strategies in political and governance processes."  Alexandra has administered a form of self governance and discipline on herself in this situation by withdrawing herself from school.  The other is facing ridicule and embarrasement from online and offline communities.  Even though the Chancelor of the school was looking at wheter her actions violated the school conduct code, and later the school found that her actions were not a violation, the video had spread all over the internet which caused her to be black balled and harrased.

        Lets use a quote from Poster in this situtation at UCLA, "To ask then about the relation of the Internet to democracy is to challenge or to risk challenging our existing theoretical approaches and concepts as they concern these questions" (Poster, 1995).  So lets take the definition of democracy which is a "form of political organization in which all people, through consensus (consensus democracy), direct referendum (direct democracy), or elected representatives (representative democracy) exercise equal control over the matters which affect their interests." 

        The matter that affected our interest in this example was the issue of racism in Alexandra's video which looking at people's comments online a majority of the people found offensive.  With the issue of racism in question, certain actions has stated above were taken by the Chancelor of the school making a public comment and looking into the violation of school code.  The other part of this is the negative publicity she gained and probably embarrassment.  Some of the online bloggers think that this was not enough and others think that this girl has been harrased enough.  I think she has learned her lesson unless she enjoys all of the negative publicity. 

        Everyone has freedom of speech when it comes to the internet and yet out of this girl freely expressing herself online she received backlash from her comments.  So do we really have freedom of speech online or do we have to watch what we say and does this stifle our freedom of speech?  You have the right to say whatever you want as long as it does not cause harm or offend the public.  For example, you are not allowed to shout "fire" in a crowded movie theater since this will cause people to panic and possibly trample each other when trying to get out of the theater. 

        Yet we have the freedom to say anything else which leads me to my point about the freedom of speech arguement as in the example of this UCLA video.  You have the right or free will to say what you want and this right is given freely, except when it offends or possibly could bring harm to other people.  Did she receive just punishment by having to withdraw from school and receiving death threats?  I think democracy or cyberdemocracy fairly decided the verdict for her in this case so far without the cause for legal ramification. 

Egpyt is free, who will lead this country?

        It is interesting how the state of Egypt is still up and running despite the military council taking over.  It is like the mechanisims of the nation state are in place and instilled in all of the people.  The people as a society know what to do when things are out of balance.  No matter who is in power, the human need for freedom and justice is instilled in every human being.  It is the Panopticon at work, were people are governing themselves without the need of the government to watch over the people. 
       
        The penoptigon philosphy is influencing the people to have the state of
egypt come back into balance and return the state back to normalicy.  Now the people are wanting the army to step down and return control of Egypt back over to a civilian led government.

         The military is in agreement with this and know there role.  They want to keep the nation state safe and secure at all costs while trying to avoid any casualties or other costly damages.  Also, the pressure from other world governments has Egypt under watch so it is hard for the army to exert any type of military dominance or perform any acts of violence towards the civilian populous.  This is another form of the Panopticon at work with nations watching other nations and though the philosphy of this theory states that the people in the prisons cannot tell if they are being watched, most nation states do what they want not considering being watched until outside pressures start to come influence the nation state that is under survelliance. 

        We can see this example in a dictatorship country were Hilter and Sadamm Hussein did what they want with other countries not doing anything until events occured that were intolerable.  The modern day nation states are designed to keep order in the world and with the advancement
of digital communications it is easier for everyone in a nation state or country to have a voice.  In the end, the need for nation states to share a common state of balance, freedom and peace is what everyone in the world is seeking.

I know this is only a small part of the whole issue that is going on in Egypt, so I am using this as an example of understanding what we have read in class along with understanding what is going on in th world.  Please post your comments or share your ideas!