dan on Sun, 26 Jan 2014 22:21:11 +0100 (CET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: <nettime> Harassing People for Watching a Movie in a Cinema |
With respect to the (important) story at > http://the-gadgeteer.com/2014/01/20/amc-movie-theater-calls-fbi-to-arrest-a-google-glass-user/ Parallel #1: In his memoir _The Railway Man_, a British POW (of the Japanese) is relentlessly tortured because he made a crystal radio. The torture was not because he was listening to the radio but because the Camp Commandant "knew" that radios were two-way, ergo the Brit must be exfiltrating information via the radio -- which was not the case (and could not be). Parallel #2: My truck is full of burglar tools pretty much all the time by some definition of "burglar tools:" crowbar, folding ladder, battery-powered drill, glass cutter, putty knife, lock picks made from street sweeper bristles, gas-powered nail gun, Clorox, borescope, &c.). My computer is similarly well stocked with penetration tools, many of which have just been made illegal for me to take to another country.[*] Other parallels no doubt can be drawn, but all security tools are dual use. As such, any trend away from giving judicial consideration to mens rea only to concentrate exclusively on actus reus (for which possession alone is sufficient proof), puts us in long-term dangerous terrain. DIY bio and/or drone makers may want to chime in here with their version of this matter. --dan [*] http://oti.newamerica.net/blogposts/2013/international_agreement_reached_controlling_export_of_mass_and_intrusive_surveillance Precis: Two new classes of export prohibited software: Intrusion software "Software" specially designed or modified to avoid detection by 'monitoring tools', or to defeat 'protective countermeasures', of a computer or network capable device, and performing any of the following: a. The extraction of data or information, from a computer or network capable device, or the modification of system or user data; or b. The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. IP network surveillance systems 5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the following: 1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone): a. Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1)); b. Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and c. Indexing of extracted data; and 2. Being specially designed to carry out all of the following: a. Execution of searches on the basis of 'hard selectors'; and b. Mapping of the relational network of an individual or of a group of people. # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime@kein.org