lent

Hiding the Talent




lent

The Start of Great Lent

The feast of the fast




lent

Great . . . Lent

What do we do when Lent gets off to a lousy start? That's right; we keep working out our salvation one mommy moment at a time!




lent

Helping Our Kids “Lent”

Now that Lent is in full swing, how can we help our kids stay the course?




lent

Lenten Short

Here are two quick new book reviews. Think of them as tools for your Lenten tool box. :)




lent

The Sundays of Great Lent

Let's talk about the Sundays of Great Lent and how they help us on the journey.




lent

Keeping Your Top Talent Engaged

Keeping high performers engaged at work not only maximizes productivity, but also drives revenue up. I won't bore you with the research, but studies show that a single top achiever can deliver as much productivity as up to four average employees. In the heart of every small business, there are standout stars – the true ... Read more

The post Keeping Your Top Talent Engaged appeared first on Chris Lema.




lent

'Outstanding skill' - French scores excellent try in Wigan win

Bevan French scores a brilliant solo try for Wigan in their 38-0 win over Leigh in the Super League play-off semi-final.




lent

Rees-Zammit has talent but lots to learn, says NFL boss

The former Wales international has had a bumpy start as he transitions to playing American football.




lent

Wales coach Cunningham quits after turbulent 2024

Ioan Cunningham has left his role as Wales women head coach after a troubled year on and off the pitch.




lent

Glentoran reach County Antrim Shield final

Last year's runners up Glentoran advance to the final of the County Antrim Shield after a 2-0 victory over Ballymena United at the Oval.




lent

'Silent trauma' of miscarriage for women and partners

A woman and her husband talk about the traumatising effect of five miscarriages.




lent

Using Technology in Gifted and Talented Education Classrooms: The Teachers’ Perspective

Technology skills are assumed to be a necessity for college and career success, but technology is constantly evolving. Thus, development of students’ technology skills is an on-going and persistent issue. Standards from the Partnership for 21st Century Skills and the International Society for Technology in Education encourage educators to teach skills that help students adapt to changing working environments. These skills resemble the National Association for Gifted Children’s program and teacher preparation standards. Descriptive research about what is already occurring in classrooms has been done, but the information is frequently limited to a list of activities. A qualitative multi-case phenomenological study of six Alabama teachers of the gifted examined how they use and shape technology experiences with students, and promote student learning of 21st century skills. The teachers were chosen for the case study due to their reputation as teachers skilled in using technology with students. Lesson plans, interviews, and observations were used to discover themes between the teachers. Findings from the research indicate that educational technology use with students is shaped by factors such as teacher attitudes and expertise, available equipment and support, pedagogical decisions related to working with technology, and the particular student group participating in the technology use.




lent

The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students




lent

Talent development for the knowledge economy

The world's economies are attempting to transform themselves to have a greater focus on developing knowledge as a commodity through innovation. Innovation starts with a creative activity that yields an invention but is augmented through a systematic value driven knowledge management system to yield new knowledge that can create a competitive advantage. To succeed in such an economy, organisations must have or develop the talent that can produce and use information effectively, they must have an ambidextrous organisational structure that allows them to innovate and produce simultaneously, and they must have an innovation management system to sustain effective innovation. In this paper we show how to augment existing university courses to simultaneously develop subject matter and innovation skills in students. We also suggest the incorporation of the new Innovations Management System Standard Series ISO 56000 into business curricula to better prepare students to function in the knowledge economy.




lent

Prince Andrew reminded of £3M debt amid claims of plenty money

Prince Andrew has realised genuine concerns amongst stake holders as he resists on giving up the Royal Lodge.

The Duke of York, who insists he will be able to manage the staggering maintenance cost of the Windsor abode, is questioned ‘where is the money...




lent

Meghan Markle planning silent sacrifice for Prince Harry's cold war this Christmas

Meghan Markle planning silent sacrifice for Prince Harry's cold war this Christmas

Insights into what Meghan Markle has planned for the Uk this Christmas have just been brought to light.

Information about this plan has been brought to light by an inside source that is close to...




lent

Analog Equivalent Rights (2/21): The analog, anonymous letter and The Pirate Bay

Privacy: Our parents were taking liberties for granted in their analog world, liberties that are not passed down to our children in the transition to digital — such as the simple right to send an anonymous letter.

Sometimes when speaking, I ask the audience how many would be okay with sites like The Pirate Bay, even if it means that artists are losing money from their operation. (Do note that this assertion is disputed: I’m asking the question on the basis of what-if the assertion is true.) Some people raise their hands, the proportion varying with audience and venue.

The copyright industry asserts that the offline laws don’t apply on the Internet when they want to sue and prosecute people sharing knowledge and culture. They’re right, but not in the way they think. They’re right that copyright law does apply online as well. But privacy laws don’t, and they should.

In the offline world, an analog letter was given a certain level of protection. This was not intended to cover just the physical letter as such, but correspondence in general; it was just that the letter was the only form of such correspondence when these liberties were drafted.

First, the letter was anonymous. It was your prerogative entirely whether you identified yourself as sender of the letter on the outside of the envelope, on the inside of the letter (so not even the postal service knew who sent it, only the recipient), or not at all.

Further, the letter was untracked in transit. The only governments tracking people’s correspondence were those we looked down on with enormous contempt.

Third, the letter was secret. The envelope would never we broken in transit.

Fourth, the carrier was never responsible for the contents, of nothing else for the simple reason they were not allowed to examine the content in the first place. But even if they could, like with a envelopeless postcard, they were never liable for executing their courier duties — this principle, the courier immunity or messenger immunity, is a principle that dates as far back as the Roman Empire.

These principles, the liberties of correspondence, should apply to offline correspondence (the letter) just as it should to online correspondence. But it doesn’t. You don’t have the right to send anything you like to anybody you like online, because it might be a copyright infringement — even though our parents had exactly this right in their offline world.

So the copyright industry is right – sending a copied drawing in a letter is a copyright infringement, and sending a copied piece of music over the net is the same kind of copyright infringement. But offline, there are checks and balances to these laws – even though it’s a copyright infringement, nobody is allowed to open the letter in transit just to see if it violates the law, because the secrecy of private correspondence is considered more important than discovering copyright infringements. This is key. This set of checks and balances has not been carried over into the digital environment.

The only time a letter is opened and prevented is when somebody is under individual and prior suspicion of a serious crime. The words “individual” and “prior” are important here — opening letters just to see if they contain a non-serious crime in progress, like copyright infringement, is simply not permitted in the slightest.

There is no reason for the offline liberties of our parents to not be carried over into the same online liberties for our children, regardless of whether that means somebody doesn’t know how to run a business anymore.

After highlighting these points, I repeat the question whether the audience would be okay with sites like The Pirate Bay, even if it means an artist is losing income. And after making these points, basically everybody raises their hand to say they would be fine with it; they would be fine with our children having the same liberty as our parents, and the checks and balances of the offline world to also apply online.

Next in the series, we’re going to look at a related topic – public anonymous announcements and the important role the city square soapbox filled in shaping liberty.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (3/21): Posting an Anonymous Public Message

Privacy: The liberties of our parents are not being inherited by our children – they are being lost wholesale in the transition to digital. Today, we’ll look at the importance of posting anonymous public messages.

When I was in my teens, before the Internet (yes, really), there was something called BBSes – Bulletin Board Systems. They were digital equivalents of an analog Bulletin Board, which in turn was a glorified sheet of wood intended for posting messages to the public. In a sense, they were an anonymous equivalent of today’s webforum software, but you connected from your home computer directly to the BBS over a phone line, without connecting to the Internet first.

The analog Bulletin Boards are still in existence, of course, but mostly used for concert promotions and the occasional fringe political or religious announcement.

In the early 1990s, weird laws were coming into effect worldwide as a result of lobbying from the copyright industry: the owners of bulletin board systems could be held liable for what other people posted on them. The only way to avoid liability was to take down the post within seven days. Such liability had no analog equivalent at all; it was an outright ridiculous idea that the owner of a piece of land should be held responsible for a poster put up on a tree on that land, or even that the owner of a public piece of cardboard could be sued for the posters other people had glued up on that board.

Let’s take that again: it is extremely weird from a legal standpoint that an electronic hosting provider is in any way, shape, or form liable for the contents hosted on their platform. It has no analog equivalent whatsoever.

Sure, people could put up illegal analog posters on an analog bulletin board. That would be an illegal act. When that happened, it was the problem of law enforcement, and never of the bulletin board owner. The thought is ridiculous and has no place in the digital landscape either.

The proper digital equivalent isn’t to require logging to hand over upload IPs to law enforcement, either. An analog bulletin board owner is under no obligation whatsoever to somehow identify the people using the bulletin board, or even monitor whether it’s being used at all.

The Analog Equivalent Privacy Right for an electronic post hosting provider is for an uploader to be responsible for everything they upload for the public to see, with no liability at all for the hosting provider under any circumstance, including no requirement to log upload data to help law enforcement find an uploader. Such monitoring is not a requirement in the analog world of our parents, nor is there an analog liability for anything posted, and there is no reason to have it otherwise in the digital world of our children just because somebody doesn’t know how to run a business otherwise.

As a side note, the United States would not exist had today’s hosting liability laws in place when it formed. A lot of writing was being circulated at the time arguing for breaking with the British Crown and forming an Independent Republic; from a criminal standpoint, this was inciting and abetting high treason. This writing was commonly nailed to trees and public posts, for the public to read and make up their own minds. Imagine for a moment if the landowners where such trees happened to stand had been charged with high treason for “hosting content” — the thought is as ridiculous in the analog would, as it really is in the digital too. We just need to pull the illusion aside, that the current laws on digital hosting make any kind of sense. These laws really are as ridiculous in the digital world of our children, as they would have been in the analog world of our parents.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (4/21): Our children have lost the Privacy of Location

Privacy: In the analog world of our parents, as an ordinary citizen and not under surveillance because of being a suspect of a crime, it was taken for granted that you could walk around a city without authorities tracking you at the footstep level. Our children don’t have this right anymore in their digital world.

Not even the dystopias of the 1950s — Nineteen Eighty-Four, Brave New World, Colossus, and so on, managed to dream up the horrors of this element: the fact that every citizen is now carrying a governmental tracking device. They’re not just carrying one, they even bought it themselves. Not even Brave New World could have imagined this horror.

It started out innocently, of course. It always does. With the new “portable phones” — which, at this point, meant something like “not chained to the floor” — authorities discovered that people would still call the Emergency Services number (112, 911, et cetera) from their mobile phones, but not always be capable of giving their location themselves, something that the phone network was now capable of doing. So authorities mandated that the phone networks be technically capable of always giving a subscriber’s location, just in case they would call Emergency Services. In the United States, this was known as the E911 regulation (“Enhanced 9-1-1”).

This was in 2005. Things went bad very quickly from there. Imagine that just 12 years ago, we still had the right to roam around freely without authorities being capable of tracking our every footstep – this was no more than just over a decade ago!

Before this point, governments supplied you with services so that you would be able to know your location, as had been the tradition since the naval lighthouse, but not so that they would be able to know your location. There’s a crucial difference here. And as always, the first breach was one of providing citizen services — in this case, emergency medical services — that only the most prescient dystopians would oppose.

What’s happened since?

Entire cities are using wi-fi passive tracking to track people at the individual, realtime, and sub-footstep level in the entire city center.

Train stations and airports, which used to be safe havens of anonymity in the analog world of our parents, have signs saying they employ realtime passive wi-fi and bluetooth tracking of everybody even coming close, and are connecting their tracking to personal identifying data. Correction: they have signs about it in the best case but do it regardless.

People’s location are tracked in at least three different… not ways, but categories of ways:

Active: You carry a sensor of your location (GPS sensor, Glonass receiver, cell tower triangulator, or even visual identifier through the camera). You use the sensors to find your location, at one point in time or continuously. The government takes itself the right to read the contents of your active sensors.

Passive: You take no action, but are still transmitting your location to the government continuously through a third party. In this category, we find cell tower triangulation as well as passive wi-fi and bluetooth tracking that require no action on behalf of a user’s phone other than being on.

Hybrid: The government finds your location in occasional pings through active dragnets and ongoing technical fishing expeditions. This would not only include cellphone-related techniques, but also face recognition connected to urban CCTV networks.

Privacy of location is one of the Seven Privacies, and we can calmly say that without active countermeasures, it’s been completely lost in the transition from analog to digital. Our parents had privacy of location, especially in busy places like airports and train stations. Our children don’t have privacy of location, not in general, and particularly not in places like airports and train stations that were the safest havens of our analog parents.

How do we reinstate Privacy of Location today? It was taken for granted just 12 years ago.




lent

Analog Equivalent Rights (5/21): Where did Freedom of Assembly go?

Privacy: Our analog parents had the right to meet whomever they liked, wherever they liked, and discuss whatever they liked, without the government knowing. Our digital children have lost this, just because they use more modern items.

For a lot of our digital children’s activities, there’s no such thing as privacy anymore, as they naturally take place on the net. For people born 1980 and later, it doesn’t make sense to talk of “offline” or “online” activities. What older people see as “people spending time with their phone or computer”, younger see as socializing using their phone or computer.

This is an important distinction that the older generation tends to not understand.

Perhaps this is best illustrated with an anecdote from the previous generation again: The parents of our parents complained that our parents were talking with the phone, and not to another person using the phone. What our parents saw as socializing (using an old analog landline phone), their parents in turn saw as obsession with a device. There’s nothing new under the sun.

(Note: when I say “digital children” here, I am not referring to children as in young people below majority age; I am referring to the next generation of fully capable adult professionals.)

This digital socializing, however, can be limited, it can be… permissioned. As in, requiring somebody’s permission to socialize in the way you and your friends want, or even to socialize at all. The network effects are strong and create centralizing pressure toward a few platforms where everybody hang out, and as these are private services, they get to set any terms and conditions they like for people assembling and socializing – for the billions of people assembling and socializing there.

Just as one example to illustrate this: Facebook is using American values for socializing, not universal values. Being super-against anything even slightly naked while being comparatively accepting of hate speech is not something inherently global; it is strictly American. If Facebook had been developed in France or Germany instead of the US, any and all nudity would be welcomed as art and free-body culture (Freikörperkultur) and a completely legitimate way of socializing, but the slightest genocide questioning would lead to an insta-kickban and reporting to authorities for criminal prosecution.

Therefore, just using the dominant Facebook as an example, any non-American way of socializing is effectively banned worldwide, and it’s likely that people developing and working with Facebook aren’t even aware of this. But the Freedom of Assembly hasn’t just been limited in the online sphere, but also in the classic analog offline world where our analog parents used to hang out (and still do).

Since people’s locations are tracked, as we saw in the previous post, it is possible to match locations between individuals and figure out who was talking to whom, as well as when and where this happened, even if they were only talking face to face. As I’m looking out my window from the office writing this piece, it just so happens that I’m looking at the old Stasi headquarters across from Alexanderplatz in former East Berlin. It was a little bit like Hotel California; people who checked in there tended to never leave. Stasi also tracked who was talking to whom, but required a ton of people to perform this task manually, just in order to walk behind other people and photograph whom they were talking to — and therefore, there was an economic limit to how many people could be tracked like this at any one time before the national economy couldn’t sustain more surveillance. Today, that limit is completely gone, and everybody is tracked all the time.

Do you really have Freedom of Assembly, when the fact that you’ve associated with a person — indeed, maybe just spent time in their physical proximity — can be held against you?

I’m going to illustrate this with an example. In a major leak recently, it doesn’t matter which one, a distant colleague of mine happened to celebrate a big event with a huge party in near physical proximity to where the documents were being copied at the same time, completely unaware and by sheer coincidence. Months later, this colleague was part of journalistically vetting those leaked documents and verifying their veracity, while at this time still unaware of the source and that they had held a big party very close to the origin of the documents.

The government was very aware of the physical proximity of the leak combined with this person’s journalistic access to the documents, though, and issued not one but two arrest-on-sight warrants for this distant colleague based on that coincidence. They are now living in exile outside of Sweden, and don’t expect to be able to return home anytime soon.

Privacy, including Privacy of Location, remains your own responsibility.




lent

Analog Equivalent Rights (6/21): Everything you do, say, or think today will be used against you in the future

Privacy: “Everything you say or do can and will be used against you, at any point in the far future when the context and agreeableness of what you said or did has changed dramatically.” With the analog surveillance of our parents, everything was caught in the context of its time. The digital surveillance of our children saves everything for later use against them.

It’s a reality for our digital children so horrible, that not even Nineteen Eighty-Four managed to think of it. In the analog surveillance world, where people are put under surveillance only after they’ve been identified as suspects of a crime, everything we said and did was transient. If Winston’s telescreen missed him doing something bad, then it had missed the moment and Winston was safe.

The analog surveillance was transient for two reasons: one, it was assumed that all surveillance was people watching other people, and two, that nobody would have the capacity of instantly finding keywords in the past twenty years of somebody’s conversations. In the analog world of our parents, that would mean somebody would need to actually listen to twenty years’ worth of tape recordings, which would in turn take sixty years (as we only work 8 out of 24 hours). In the digital world of our children, surveillance agencies type a few words to get automatic transcripts of the saved-forever surveillance-of-everybody up on screen in realtime as they type the keywords – not just from one person’s conversation, but from everybody’s. (This isn’t even exaggerating; this was reality in or about 2010 with the GCHQ-NSA XKEYSCORE program.)

In the world of our analog parents, surveillance was only a thing at the specific time it was active, which was when you were under individual and concrete suspicion of a specific, already-committed, and serious crime.

In the world of our digital children, surveillance can be retroactively activated for any reason or no reason, with the net effect that everybody is under surveillance for everything they have ever done or said.

We should tell people as it has become instead; “anything you say or do can be used against you, for any reason or no reason, at any point in the future”.

The current generation has utterly failed to preserve the presumption of innocence, as it applies to surveillance, in the shift from our analog parents to our digital children.

This subtle addition – that everything is recorded for later use against you – amplifies the horrors of the previous aspects of surveillance by orders of magnitude.

Consider somebody asking you where you were on the evening of March 13, 1992. You would, at best, have a vague idea of what you did that year. (“Let’s see… I remember my military service started on March 3 of that year… and the first week was a tough boot camp in freezing winter forest… so I was probably… back at barracks after the first week, having the first military theory class of something? Or maybe that date was a Saturday or Sunday, in which case I’d be on weekend leave?” That’s about the maximum precision your memory can produce for twenty-five years past.)

However, when confronted with hard data on what you did, the people confronting you will have an utter and complete upper hand, because you simply can’t refute it. “You were in this room and said these words, according to our data transcript. These other people were also in the same room. We have to assume what you said was communicated with the intention for them to hear. What do you have to say for yourself?”

It doesn’t have to be 25 years ago. A few months back would be sufficient for most memories to be not very detailed anymore.

To illustrate further: consider that the NSA is known to store copies even of all encrypted correspondence today, on the assumption that even if it’s not breakable today, it will probably be so in the future. Consider what you’re communicating encrypted today — in text, voice, or video — can be used against you in twenty years. You probably don’t even know half of it, because the window of acceptable behavior will have shifted in ways we cannot predict, as it always does. In the 1950s, it was completely socially acceptable to drop disparaging remarks about some minorities in society, which would socially ostracize you today. Other minorities are still okay to disparage, but might not be in the future.

When you’re listening to somebody talking from fifty years ago, they were talking in the context of their time, maybe even with the best of intentions by today’s standards. Yet, we could judge them harshly for their words interpreted by today’s context — today’s completely different context.

Our digital children will face exactly this scenario, because everything they do and say can and will be used against them, at any point in the future. It should not be this way. They should have every right to enjoy Analog Equivalent Privacy Rights.




lent

Analog Equivalent Rights (7/21): Analog Libraries Were Private Searches for Information

When our analog parents searched for information, that activity took place in libraries, and that was one of the most safeguarded privacies of all. When our digital children search for information, their innermost thoughts are instead harvested wholesale for marketing. How did this happen?

If you’re looking at one particular profession of the analog world that was absolutely obsessed with the privacy of its patrons, it was the librarians. Libraries were where people could search for their darkest secrets, were it literature, science, shopping, or something else. The secrecy of libraries were downright legendary.

As bomb recipes started appearing on the proto-Internet in the 1980s — on so-called BBSes — and some politicians tried to play on moral panics, many of common sense were quick to point out, that these “text files with bomb recipes” were no different than what you would find in the chemistry section of a mediocre-or-better library — and libraries were sacred. There was no moral panic to play on as soon as you pointed out that this was already available in every public library, for the public to access anonymously

So private were libraries, in fact, that librarians were in collective outrage when the FBI started asking libraries for records of who had borrowed what book – and that’s how the infamous warrant canaries were invented. Yup, by a librarian, protecting the patrons of the library. Librarians have always been the profession defending privacy rights the hardest – in the analog as well as the digital.

In the analog world of our parents, their Freedom of Information was sacramount: their innermost thirst for learning, knowledge, and understanding. In the digital world of our children, their corresponding innermost thoughts are instead harvested wholesale and sold off to market trinkets into their faces.

It’s not just what our digital children successfully studied that’s up for grabs. In the terms of our analog parents, it’s what they ever went to the library for. It’s what they ever considered going to the library for. In the world of our digital children, everything they searched for is recorded — and everything they thought of searching for but didn’t.

Think about that for a moment: something that was so sacred for our analog parents that entire classes of professions would go on strike to preserve it, is now casually used for wholesale marketing in the world of our digital children.

Combine this with the previous article about everything you do, say, and think being recorded for later use against you, and we’re going to need a major change in thinking on this very soon.

There is no reason our children should have less Freedom of Information just because they happen to live in a digital environment, as compared to the analog environment of our parents. There is no reason our digital children shouldn’t enjoy Analog Equivalent Privacy Rights.

Of course, it can be argued that the Internet search engines are private services who are free to offer whatever services they like on whatever terms they like. But there were private libraries in the analog world of our parents, too. We’ll be returning to this “it’s private so you don’t have a say” concept a little later in this series.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (8/21): Using Third-Party Services Should Not Void Expectation of Privacy

Privacy: Ross Ulbricht handed in his appeal to the U.S. Supreme Court last week, highlighting an important Analog Equivalent Privacy Right in the process: Just because you’re using equipment that makes a third party aware of your circumstances, does that really nullify any expectation of privacy?

In most constitutions, there’s a protection of privacy of some kind. In the European Charter of Human Rights, this is specified as having the right to private and family life, home, and correspondence. In the U.S. Constitution, it’s framed slightly differently, but with the same outcome: it’s a ban for the government to invade privacy without good cause (“unreasonable search and seizure”).

U.S. Courts have long held, that if you have voluntarily given up some part of your digitally-stored privacy to a third party, then you can no longer expect to have privacy in that area. When looking at analog equivalence for privacy rights, this doctrine is atrocious, and in order to understand just how atrocious, we need to go back to the dawn of the manual telephone switchboards.

At the beginning of the telephone age, switchboards were fully manual. When you requested a telephone call, a manual switchboard operator would manually connect the wire from your telephone to the wire of the receiver’s telephone, and crank a mechanism that would make that telephone ring. The operators could hear every call if they wanted and knew who had been talking to whom and when.

Did you give up your privacy to a third party when using this manual telephone service? Yes, arguably, you did. Under the digital doctrine applied now, phonecalls would have no privacy at all, under any circumstance. But as we know, phonecalls are private. In fact, the phonecall operators were oathsworn to never utter the smallest part of what they learned on the job about people’s private dealings — so seriously was privacy considered, even by the companies running the switchboards.

Interestingly enough, this “third-party surrender of privacy” doctrine seems to have appeared the moment the last switchboard operator left their job for today’s automated phone-circuit switches. This was as late as 1983, just at the dawn of digital consumer-level technology such as the Commodore 64.

This false equivalence alone should be sufficient to scuttle the doctrine of “voluntarily” surrendering privacy to a third party in the digital world, and therefore giving up expectation of privacy: the equivalence in the analog world was the direct opposite.

But there’s more to the analog equivalent of third-party-service privacy. Somewhere in this concept is the notion that you’re voluntarily choosing to give up your privacy, as an active informed act — in particular, an act that stands out of the ordinary, since the Constitutions of the world are very clear that the ordinary default case is that you have an expectation of privacy.

In other words, since people’s everyday lives are covered by expectations of privacy, there must be something outside of the ordinary that a government can claim gives it the right to take away somebody’s privacy. And this “outside the ordinary” has been that the people in question were carrying a cellphone, and so “voluntarily” gave up their right to privacy, as the cellphone gives away their location to the network operator by contacting cellphone towers.

But carrying a cellphone is expected behavior today. It is completely within the boundaries of “ordinary”. In terms of expectations, this doesn’t differ much from wearing jeans or a jacket. This leads us to the question; in the thought experiment that yesterday’s jeans manufacturers had been able to pinpoint your location, had it been reasonable for the government to argue that you give up any expectation of privacy when you’re wearing jeans?

No. No, of course it hadn’t.

It’s not like you’re carrying a wilderness tracking device for the express purpose of rescue services to find you during a dangerous hike. In such a circumstance, it could be argued that you’re voluntarily carrying a locator device. But not when carrying something that everybody is expected to carry — indeed, something that everybody must carry in order to even function in today’s society.

When the only alternative to having your Constitutionally-guaranteed privacy is exile from modern society, a government should have a really thin case. Especially when the analog equivalent — analog phone switchboards — was never fair game in any case.

People deserve Analog Equivalent Privacy Rights.

Until a government recognizes this and voluntarily surrenders a power it has taken itself, which isn’t something people should hold their breath over, privacy remains your own responsibility.




lent

Analog Equivalent Rights (9/21): When the government knows what news you read, in what order, and for how long

Privacy: Our analog parents had the ability to read news anonymously, however they wanted, wherever they wanted, and whenever they wanted. For our digital children, a government agent might as well be looking over their shoulder: the government knows what news sources they read, what articles, for how long, and in what order.

For our analog parents, reading the news was an affair the government had no part of, or indeed had any business being part of. Our analog parents bought a morning newspaper with a few coins on the street corner, brought it somewhere quiet where they had a few minutes to spare, and started reading without anybody interfering.

When our digital children read the news, the government doesn’t just know what news source they choose to read, but also what specific articles they read from that news source, in what order, and for how long. So do several commercial actors. There are at least three grave issues with this.

The first is that since the government has this data, it will attempt to use this data. More specifically, it will attempt to use the data against the individual concerned, possibly in some sort of pre-crime scheme. We know this that since all data collected by a government will eventually be used against the people concerned, with mathematical certainty.

In an attention economy, data about what we pay attention to, how much, and for how long, are absolutely crucial predictive behaviors. And in the hands of a government which makes the crucial mistake of using it to predict pre-crime, the results can be disastrous for the individual and plain wrong for the government.

Of course, the instant the government uses this data in any way imaginable, positive or negative, it will become Heisenberg Metrics — the act of using the data will shape the data itself. For example, if somebody in government decides that reading about frugality probably is an indicator of poverty, and so makes people more eligible for government handouts, then such a policy will immediately shape people’s behavior to read more about frugality. Heisenberg Metrics is when a metric can’t be measured without making it invalid in the process.

(The phenomenon is named after the Heisenberg Uncertainty Principle, which is traditionally confused with the Observer Effect, which states you can’t measure some things without changing them in the process. The Heisenberg Uncertainty Principle is actually something else entirely; it states that you can’t measure precise momentum and position of a subatomic particle at the same time, and does not apply at all to Heisenberg Metrics.)

The second issue is that not only government, but also other commercial actors, will seek to act on these metrics, Heisenberg Metrics as they may be. Maybe somebody thinks that reading fanzines about motorcycle acrobatics should have an effect on your health and traffic insurance premiums?

The third issue is subtle and devious, but far more grave: the government doesn’t just know what articles you read and in what order, but as a corollary to that, knows what the last article you read was, and what you did right after reading it. In other words, it knows very precisely what piece of information leads you to stop reading and instead take a specific action. This is far more dangerous information than being aware of your general information feed patterns and preferences.

Being able to predict somebody’s actions with a high degree of certainty is a far more dangerous ability than being vaguely aware of somebody’s entertainment preferences.

Our analog parents had the privacy right of choosing their information source anonymously with nobody permitted (or able) to say what articles they read, in what order, or for what reason. It’s not unreasonable that our digital children should have the same privacy right, the analog equivalent privacy right.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (10/21): Analog journalism was protected; digital journalism isn’t

Privacy: In the analog world of our parents, leaks to the press were heavily protected in both ends – both for the leaker and for the reporter receiving the leak. In the digital world of our children, this has been unceremoniously thrown out the window while discussing something unrelated entirely. Why aren’t our digital children afforded the same checks and balances?

Another area where privacy rights have not been carried over from the analog to the digital concerns journalism, an umbrella of different activities we consider to be an important set of checks-and-balances on power in society. When somebody handed over physical documents to a reporter, that was an analog action that was protected by federal and state laws, and sometimes even by constitutions. When somebody is handing over digital access to the same information to the same type of reporter, reflecting the way we work today and the way our children will work in the future, that is instead prosecutable at both ends.

Let us illustrate this with an example from the real world.

In the 2006 election in Sweden, there was an outcry of disastrous information hygiene on behalf of the ruling party at the time (yes, the same ruling party that later administered the worst governmental leak ever). A username and password circulated that gave full access to the innermost file servers of the Social Democratic party administration from anywhere. The username belonged to a Stig-Olof Friberg, who was using his nickname “sigge” as username, and the same “sigge” as password, and who accessed the innermost files over the Social Democratic office’s unencrypted, open, wireless network.

Calling this “bad opsec” doesn’t begin to describe it. Make a careful note to remember that these were, and still are, the institutions and people we rely on to make policy for good safeguarding of sensitive citizen data.

However, in the shadow of this, there was also the more important detail that some political reporters were well aware of the login credentials, such as one of Sweden’s most (in)famous political reporters Niklas Svensson, who had been using the credentials as a journalistic tool to gain insight into the ruling party’s workings.

This is where it gets interesting, because in the analog world, that reporter would have received leaks in the form of copied documents, physically handed over to him, and leaking to the press in this analog manner was (and still is) an extremely protected activity under law and indeed some constitutions — in Sweden, as this concerns, you can even go to prison for casually speculating over coffee at work who might have been behind a leak to the press. It is taken extremely seriously.

However, in this case, the reporter wasn’t leaked the documents, but was leaked a key for access to the digital documents — the ridiculously insecure credentials “sigge/sigge” — and was convicted in criminal court for electronic trespassing as a result, despite doing journalistic work with a clear analog protected equivalent.

It’s interesting to look at history to see how much critically important events would never have been uncovered, if this prosecution of digital journalism had been applied to analog journalism.

For one example, let’s take the COINTELPRO leak, when activists copied files from an FBI office to uncover a covert and highly illegal operation by law enforcement to discredit political organizations based solely on their political opinion. (This is not what law enforcement should be doing, speaking in general terms.) This leak happened when activists put up a note on the FBI office door on March 8, 1971 saying “Please do not lock this door tonight”, came back in the middle of the night when nobody was there, found the door unlocked as requested, and took (stole) about 1,000 classified files that revealed the illegal practices.

These were then mailed to various press outlets. The theft resulted in the exposure of some of the FBI’s most self-incriminating documents, including several documents detailing the FBI’s use of postal workers, switchboard operators, etc., in order to spy on black college students and various non-violent black activist groups, according to Wikipedia. And here’s the kicker in the context: while the people stealing the documents could and would have been indicted for doing so, it was unthinkable to charge the reporters receiving them with anything.

This is no longer the case.

Our digital children have lost the right to leak information to reporters in the way the world works today, an activity that was taken for granted — indeed, seen as crucially important to the balance of power — in the world of our digital parents. Our digital children who work as reporters can no longer safely receive leaks showing abuse of power. It is entirely reasonable that our digital children should have at least the same set of civil liberties in their digital world, as our parents had in their analog world.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (11/21): Our parents used anonymous cash

Privacy: The anonymous cash of our analog parents is fast disappearing, and in its wake comes trackable and permissioned debit cards to our children. While convenient, it’s a wolf in sheep’s clothing.

In the last article, we looked at how our analog parents could anonymously buy a newspaper on the street corner with some coins, and read their news of choice without anybody knowing about it. This observation extends to far more than just newspapers, of course.

This ability of our parents – the ability to conduct decentralized, secure transactions anonymously – has been all but lost in a landscape that keeps pushing card payments for convenience. The convenience of not paying upfront, with credit cards; the convenience of always paying an exact amount, with debit cards; the convenience of not needing to carry and find exact amounts with every purchase. Some could even argue that having every transaction listed on a bank statement is a convenience of accounting.

But with accounting comes tracking. With tracking comes predictability and unwanted accountability.

It’s been said that a VISA executive can predict a divorce one year ahead of the parties involved, based on changes in purchase patterns. Infamously, a Target store was targeting a high school-aged woman with maternity advertising, which at first made her father furious: but as things turned out, the young woman was indeed pregnant. Target knew, and her own father didn’t.

This is because when we’re no longer using anonymous cash, every single purchase is tracked and recorded with the express intent on using it against us — whether for influencing us to make a choice to deplete our resources (“buy more”) or for punishing us for buying something we shouldn’t have, in a wide variety of conceivable ways.

China is taking the concept one step further, as has been written here before, and in what must have been the inspiration for a Black Mirror episode, is weighting its citizens’ Obedience Scores based on whether they buy useful or lavish items — useful in the views of the regime, of course.

It’s not just the fact that transactions of our digital children are logged for later use against them, in ways our analog parents could never conceive of.

It’s also that the transactions of our digital children are permissioned. When our digital children buy a bottle of water with a debit card, a transaction clears somewhere in the background. But that also means that somebody can decide to have the transaction not clear; somebody has the right to arbitrarily decide what people get to buy and not buy, if this trend continues for our digital children. That is a horrifying thought.

Our parents were using decentralized, censorship resistant, anonymous transactions in using plain cash. There is no reason our digital children should have anything less. It’s a matter of liberty and self-determination.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (12/21): Our parents bought things untracked, their footsteps in store weren’t recorded

Privacy: In the last article, we focused on how people are tracked today when using credit cards instead of cash. But few pay attention to the fact that we’re tracked when using cash today, too.

Few people pay attention to the little sign on the revolving door on Schiphol Airport in Amsterdam, Netherlands. It says that wi-fi and bluetooth tracking of every single individual is taking place in the airport.

What sets Schiphol Airport apart isn’t that they track individual people’s movements to the sub-footstep level in a commercial area. (It’s for commercial purposes, not security purposes.) No, what sets Schiphol apart is that they bother to tell people about it. (The Netherlands tend to take privacy seriously, as does Germany, and for the same reason.)

Locator beacons are practically a standard in bigger commercial areas now. They ping your phone using wi-fi and bluetooth, and using signal strength triangulation, a grid of locator beacons is able to show how every single individual is moving in realtime at the sub-footstep level. This is used to “optimize marketing” — in other words, find ways to trick people’s brains to spend resources they otherwise wouldn’t have. Our own loss of privacy is being turned against us, as it always is.

Where do people stop for a while, what catches their attention, what doesn’t catch their attention, what’s a roadblock for more sales?

These are legitimate questions. However, taking away people’s privacy in order to answer those questions is not a legitimate method to answer them.

This kind of mass individual tracking has even been deployed at city levels, which happened in complete silence until the Privacy Oversight Board of a remote government sounded the alarms. The city of Västerås got the green light to continue tracking once some formal criteria were met.

Yes, this kind of people tracking is documented to have been already rolled out citywide in at least one small city in a remote part of the world (Västerås, Sweden). With the government’s Privacy Oversight Board having shrugged and said “fine, whatever”, don’t expect this to stay in the small town of Västerås. Correction, wrong tense: don’t expect it to have stayed in just Västerås, where it was greenlit three years ago.

Our analog parents had the ability to walk around untracked in the city and street of their choice, without it being used or held against them. It’s not unreasonable that our digital children should have the same ability.

There’s one other way to buy things with cash which avoids this kind of tracking, and that’s paying cash-on-delivery when ordering something online or over the phone to your door — in which case your purchase is also logged and recorded, just in another type of system.

This isn’t only used against the ordinary citizen for marketing purposes, of course. It’s used against the ordinary citizen for every conceivable purpose. But we’ll be returning to that in a later article in the series.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (13/21): Our digital children are tracked not just in everything they buy, but in what they DON’T buy

Privacy: We’ve seen how our digital children’s privacy is violated in everything they buy with cash or credit, in a way our analog parents would have balked at. But even worse: our digital children’s privacy is also violated by tracking what they don’t buy — either actively decline or just plain walk away from.

Amazon just opened its first “Amazon Go” store, where you just pick things into a bag and leave, without ever going through a checkout process. As part of the introduction of this concept, Amazon points out that you can pick something off the shelves, at which point it’ll register in your purchase — and change your mind and put it back, at which point you’ll be registered and logged as having not purchased the item.

Sure, you’re not paying for something you changed your mind about, which is the point of the video presentation. But it’s not just about the deduction from your total amount to pay: Amazon also knows you considered buying it and eventually didn’t, and will be using that data.

Our digital children are tracked this way on a daily basis, if not an hourly basis. Our analog parents never were.

When we’re shopping for anything online, there are even simple plugins for the most common merchant solutions with the business terms “funnel analysis” — where in the so-called “purchase funnel” our digital children choose to leave the process of purchasing something — or “cart abandonment analysis”.

We can’t even simply walk away from something anymore without it being recorded, logged, and cataloged for later use against us.

But so-called “cart abandonment” is only one part of the bigger issue of tracking what we’re interested in in the age of our digital children, but didn’t buy. There is no shortage of people today who would swear they were just discussing a very specific type of product with their phone present (say, “black leather skirts”) and all of a sudden, advertising for that very specific type of product would pop up all over Facebook and/or Amazon ads. Is this really due to some company listening for keywords through the phone? Maybe, maybe not. All we know since Snowden is that if it’s technically possible to invade privacy, it is already happening.

(We have to assume here these people still need to learn how to install a simple adblocker. But still.)

At the worst ad-dense places, like (but not limited to) airports, there are eyeball trackers to find out which ads you look at. They don’t yet change to match your interests, as per Minority Report, but that’s already present on your phone and on your desktop, and so wouldn’t be foreign to see in public soon, either.

In the world of our analog parents, we weren’t registered and tracked when we bought something.

In the world of our digital children, we’re registered and tracked even when we don’t buy something.




lent

Analog Equivalent Rights (14/21): Our analog parents’ dating preferences weren’t tracked, recorded, and cataloged

Privacy: Our analog parents’ dating preferences were considered a most private of matters. For our digital children, their dating preferences is a wholesale harvesting opportunity for marketing purposes. How did this terrifying shift come to be?

I believe the first big harvester of dating preferences was the innocent-looking site hotornot.com 18 years ago, a site that more seemed like the after-hours side work of a frustrated highschooler than a clever marketing ploy. It simply allowed people to rate their subjective perceived attractiveness of a photograph, and to upload photographs for such rating. (The two founders of this alleged highschool side project netted $10 million each for it when the site was sold.)

Then the scene exploded, with both user-funded and advertising-funded dating sites, all of which cataloged people’s dating preferences to the smallest detail.

Large-scale pornography sites, like PornHub, also started cataloging people’s porn preferences, and contiously make interesting infographics about geographical differences in preferences. (The link is safe for work, it’s data and maps in the form of a news story on Inverse, not on Pornhub directly.) It’s particularly interesting, as Pornhub is able to break down preferences quite specifically by age, location, gender, income brackets, and so on.

Do you know anyone who told Pornhub any of that data? No, I don’t either. And still, they are able to pinpoint who likes what with quite some precision, precision that comes from somewhere.

And then, of course, we have the social networks (which may or may not be responsible for that tracking, by the way).

It’s been reported that Facebook can tell if you’re gay or not with as little as three likes. Three. And they don’t have to be related to dating preferences or lifestyle preferences — they can be any random selections that just map up well with bigger patterns.

This is bad enough in itself, on the basis that it’s private data. At a very minimum, our digital childrens’ preferences should be their own, just like their favorite ice cream.

But a dating preferences are not just a preference like choosing your flavor of ice cream, is it? It should be, but it isn’t at this moment in time. It could also be something you’re born with. Something that people even get killed for if they’re born with the wrong preference.

It is still illegal to be born homosexual in 73 out of 192 countries, and out of these 73, eleven prescribe the death penalty for being born this way. A mere 23 out of 192 countries have full marriage equality.

Further, although the policy direction is quite one-way toward more tolerance, acceptance, and inclusion at this point in time, that doesn’t mean the policy trend can’t reverse for a number of reasons, most of them very bad. People who felt comfortable in expressing themselves can again become persecuted.

Genocide is almost always based on public data collected with benevolent intent.

This is why privacy is the last line of defense, not the first. And this last line of defense, which held fast for our analog parents, has been breached for our digital children. That matter isn’t taken nearly seriously enough.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (15/21): Our digital children’s conversations are muted on a per-topic basis

Privacy: At worst, our analog parents could be prevented from meeting each other. Our digital children are prevented from talking about particular subjects, once the conversation is already happening. This is a horrifying development.

When our digital children are posting a link to The Pirate Bay somewhere on Facebook, a small window sometimes pops up saying “you have posted a link with potentially harmful content. Please refrain from posting such links.”

Yes, even in private conversations. Especially in private conversations.

This may seem like a small thing, but it is downright egregious. Our digital children are not prevented from having a conversation, per se, but are monitored for bad topics that the regime doesn’t like being discussed, and are prevented from discussing those topics. This is far worse than preventing certain people from just meeting.

The analog equivalent would be if our parents were holding an analog phone conversation, and a menacing third voice popped into the conversation with a slow voice speaking just softly enough to be perceived as threatening: “You have mentioned a prohibited subject. Please refrain from discussing prohibited subjects in the future.”

Our parents would have been horrified if this happened — and rightly so!

But in the digital world of our children, the same phenomenon is instead cheered on by the same people who would abhor it if it happened in their world, to themselves.

In this case, of course, it is any and all links to The Pirate Bay that are considered forbidden topics, under the assumption — assumption! — that they lead to manufacturing of copies that would be found in breach of the copyright monopoly in a court of law.

When I first saw the Facebook window above telling me to not discuss forbidden subjects, I was trying to distribute political material I had created myself, and used The Pirate Bay to distribute. It happens to be a very efficient way to distribute large files, which is exactly why it is being used by a lot of people for that purpose (gee, who would have thought?), including people like myself who wanted to distribute large collections of political material.

There are private communications channels, but far too few use them, and the politicians at large (yes, this includes our analog parents) are still cheering on this development, because “terrorism” and other bogeymen.

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (16/21): Retroactive surveillance of all our children

Privacy: In the analog world of our parents, it was absolutely unthinkable that the government would demand to know every footstep you took, every phonecall you made, and every message you wrote, just as a routine matter. For our digital children, government officials keep insisting on this as though it were perfectly reasonable, because terrorism, and also, our digital children may be listening to music together or watching TV together, which is illegal in the way they like to do it, because of mail-order legislation from Hollywood. To make things even worse, the surveillance is retroactive — it is logged, recorded, and kept until somebody wants all of it.

About ten years ago, a colleague of mine moved from Europe to China. He noted that among many differences, the postal service was much more tightly controlled — as in, every letter sent was written by hand onto a line in a log book, kept by the postmaster at each post office. Letter from, to whom, and the date.

At the time, three things struck me: one, how natural this was to the Chinese population, not really knowing anything else; two, how horrified and denouncing our analog parents would have been at this concept; three, and despite that, that this is exactly what our lawmaker analog parents are doing to all our digital children right now.

Or trying to do, anyway; the courts are fighting back hard.

Yes, I’m talking about Telecommunications Data Retention.

There is a saying, which mirrors the Chinese feeling of normality about this quite well: “The bullshit this generation puts up with as a temporary nuisance from deranged politicians will seem perfectly ordinary to the next generation.”

Every piece of surveillance so far in this series is amplified by several orders of magnitude by the notion that it you’re not only being watched, but that everything you do is recorded for later use against you.

This is a concept so bad, not even Nineteen-Eighty Four got it: If Winston’s telescreen missed him doing something that the regime didn’t want him to do, Winston would have been safe, because there was no recording happening; only surveillance in the moment.

If Winston Smith had had today’s surveillance regime, with recording and data retention, the regime could and would have gone back and re-examined every earlier piece of action for what they might have missed.

This horror is reality now, and it applies to every piece in this series. Our digital children aren’t just without privacy in the moment, they’re retroactively without privacy in the past, too.

(Well, this horror is a reality that comes and goes, as legislators and courts are in a tug of war. In the European Union, Data Retention was mandated in 2005 by the European Parliament, was un-mandated in 2014 by the European Court of Justice, and prohibited in 2016 by the same Court. Other jurisdictions are playing out similar games; a UK court just dealt a blow to the Data Retention there, for example.)

Privacy remains your own responsibility.




lent

Analog Equivalent Rights (17/21): The Previous Inviolability of Diaries

Privacy: For our analog parents, a diary or a personal letter could rarely be touched by authorities, not even by law enforcement searching for evidence of a crime. Objects such as these had protection over and above the constitutional privacy safeguards. For our digital children, however, the equivalent diaries and letters aren’t even considered worthy of basic constitutional privacy.

In most jurisdictions, there is a constitutional right to privacy. Law enforcement in such countries can’t just walk in and read somebody’s mail, wiretap their phonecalls, or track their IP addresses. They need a prior court order to do so, which in turn is based on a concrete suspicion of a serious crime: the general case is that you have a right to privacy, and violations of this rule are the exception, not the norm.

However, there’s usually a layer of protection over and above this: even if and when law enforcement gets permission from a judge to violate somebody’s privacy in the form of a search warrant of their home, there are certain things that may not be touched unless specific and additional permissions are granted by the same type of judge. This class of items includes the most private of the personal: private letters, diaries, and so on.

Of course, this is only true in the analog world of our parents. Even though the letter of the law is the same, this protection doesn’t apply at all to the digital world of our children, to their diaries and letters.

Because the modern diary is kept on a computer. If not on a desktop computer, then certainly on a mobile handheld one — what we’d call a “phone” for historical reasons, but what’s really a handheld computer.

And a computer is a work tool in the analog world of our parents. There are loads of precedent cases that establish any form of electronic device as a work tool, dating back well into the analog world, and law enforcement is falling back on all of them with vigor, even now that our digital devices are holding our diaries, personal letters, and other items far more private than an analog diary was ever capable of.

That’s right: whereas your parents’ diaries were extremely protected under the law of the land, your children’s diaries — no less private to them, than those of your parents were to your parents — are as protected from search and seizure as an ordinary steel wrench in a random workshop.

So the question is how we got from point A to point B here? Why are the Police, who know that they can’t touch an analog diary during a house search, instantly grabbing mobile phones which serve the same purpose for our children?

“Because they can”, is the short answer. “Also because nobody put their foot down” for advanced points on the civics course. It’s because some people saw short term political points in being “tough on crime” and completely erasing hard-won rights in the process.

Encrypt everything.




lent

Analog Equivalent Rights (18/21): Our analog parents had private conversations, both in public and at home

Privacy: Our parents, at least in the Western world, had a right to hold private conversations face-to-face, whether out in public or in the sanctity of their home. This is all but gone for our digital children.

Not long ago, it was the thing of horror books and movies that there would actually be widespread surveillance of what you said inside your own home. Our analog parents literally had this as scary stories worthy of Halloween, mixing the horror with the utter disbelief.

“There was of course no way of knowing whether you were being surveilled at any given moment. How often, or on what system, the Thought Police plugged in on any individual device was guesswork. It was even conceivable that they listened to everybody all the time. But at any rate they could listen to you whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard.” — from Nineteen Eighty-Four

In the West, we prided ourselves on not being the East — the Communist East, specifically — who regarded their own citizens as suspects: suspects who needed to be cleansed of bad thoughts and bad conversations, to the degree that ordinary homes were wiretapped for ordinary conversations.

There were microphones under every café table and in every residence. And even if there weren’t in the literal sense, just there and then, they could still be anywhere, so you had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard.

“Please speak loudly and clearly into the flower pot.” — a common not-joke about the Communist societies during the Cold War

Disregard phonecalls and other remote conversations for now, since we already know them to be wiretapped across most common platforms. Let’s look at conversations in a private home.

We now have Google Echo and Amazon Alexa. And while they might have intended to keep your conversations to themselves, out of the reach of authorities, Amazon has already handed over living room recordings to authorities. In this case, permission became a moot point because the suspect gave permission. In the next case, permission might not be there, and it might happen anyway.

Mobile phones are already listening, all the time. We know because when we say “Ok Google” to an Android phone, it wakes up and listens more intensely. This, at a very minimum, means it’s always listening for the words “Ok Google”. IPhones have a similar mechanism listening for “Hey Siri”. While nominally possible to turn off, it’s one of those things you can never be sure of. And we carry these governmental surveillance microphones with us everywhere we go.

If the Snowden documents showed us anything in the general sense, it was that if a certain form of surveillance is technically possible, it is already happening.

And even if Google and Apple aren’t already listening, the German police got the green light to break into phones and plant Bundestrojaner, the flower-pot equivalent of hidden microphones, anyway. You would think that Germany of all countries has in recent memory what a bad idea this is. It could — maybe even should — be assumed that the police forces of other countries have and are already using similar tools.

For our analog parents, the concept of a private conversations was as self-evident as oxygen in the air. Our digital children may never know what one feels like.

And so we live today — from what started as a habit that has already become instinct — in the assumption that every sound we make is overheard by authorities.




lent

Analog Equivalent Rights (19/21): Telescreens in our Living Rooms

Privacy: The dystopic stories of the 1950s said the government would install cameras in our homes, with the government listening in and watching us at all times. Those stories were all wrong, for we installed the cameras ourselves.

In the analog world of our parents, it was taken for completely granted that the government would not be watching us in our own homes. It’s so important an idea, it’s written into the very constitutions of states pretty much all around the world.

And yet, for our digital children, this rule, this bedrock, this principle is simply… ignored. Just because they their technology is digital, and not the analog technology of our parents.

There are many examples of how this has taken place, despite being utterly verboten. Perhaps the most high-profile one is the OPTIC NERVE program of the British surveillance agency GCHQ, which wiretapped video chats without the people concerned knowing about it.

Yes, this means the government was indeed looking into people’s living rooms remotely. Yes, this means they sometimes saw people in the nude. Quite a lot of “sometimes”, even.

According to summaries in The Guardian, over ten percent of the viewed conversations may have been sexually explicit, and 7.1% contained undesirable nudity.

Taste that term. Speak it out loud, to hear for yourself just how oppressive it really is. “Undesirable nudity”. The way you are described by the government, in a file about you, when looking into your private home without your permission.

When the government writes you down as having “undesirable nudity” in your own home.

There are many other examples, such as the state schools that activate school-issued webcams, or even the US government outright admitting it’ll all your home devices against you.

It’s too hard not to think of the 1984 quote here:

The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized. — From Nineteen Eighty-Four

And of course, this has already happened. The so-called “Smart TVs” from LG, Vizio, Samsung, Sony, and surely others have been found to do just this — spy on its owners. It’s arguable that the data collected only was collected by the TV manufacturer. It’s equally arguable by the police officers knocking on that manufacturer’s door that they don’t have the right to keep such data to themselves, but that the government wants in on the action, too.

There’s absolutely no reason our digital children shouldn’t enjoy the Analog Equivalent Rights of having their own home to their very selves, a right our analog parents took for granted.




lent

Analog Equivalent Rights (20/21): Your analog boss couldn’t read your mail, ever

Europe: Slack has updated its Terms of Service to let your manager read your private conversations in private channels. Our analog parents would have been shocked and horrified at the very idea that their bosses would open packages and read personal messages that were addressed to them. For our digital children, it’s another shrugworthy part of everyday life.

The analog plain old telephone system, sometimes abbreviated POTS, is a good template for how things should be even in the digital world. This is something that lawmakers got mostly right in the old analog world.

When somebody is on a phonecall — an old-fashioned, analog phonecall — we know that the conversation is private by default. It doesn’t matter who owns the phone. It is the person using the phone, right this very minute, that has all the rights to its communication capabilities, right this very minute.

The user has all the usage rights. The owner has no right to intercept or interfere with the communications usage, just based on the property right alone.

Put another way: just because you own a piece of communications equipment, that doesn’t give you any kind of automatic right to listen to private conversations that happen to come across this equipment.

Regrettably, this only applies to the telephone network. Moreover, only the analog part of the telephone network. If anything is even remotely digital, the owner can basically intercept anything they like, for any reason they like.

This particularly extends to the workplace. It can be argued that you have no expectation of privacy for what you do on your employer’s equipment; this is precisely forgetting that such privacy was paramount for the POTS, less than two decades ago, regardless of who owned the equipment.

Some employers even install wildcard digital certificates on their workplace computers with the specific purpose of negating any end-to-end security between the employee’s computer and the outside world, effectively performing a so-called “man-in-the-middle attack”. In a whitewashed term, this practice is called HTTPS Interception instead of “man-in-the-middle attack” when it’s performed by your employer instead of another adversary.

Since we’re looking at difference between analog and digital, and how privacy rights have vanished in the transition to digital, it’s worth looking at the code of law for the oldest of analog correspondences: the analog letter, and whether your boss could open and read it just because it was addressed to you at your workplace.

Analog law differs somewhat between different countries on this issue, but in general, even if your manager or workplace were allowed to open your mail (which is the case in the United States but not in Britain), they are typically never allowed to read it (even in the United States).

In contrast, with electronic mail, your managers don’t just read your entire e-mail, but typically has hired an entire department to read it for them. In Europe, this went as far as the European Court of Human Rights, which ruled that it’s totally fine for an employer to read the most private of correspondence, as long as the employer informs of this fact (thereby negating the default expectation of privacy).

Of course, this principle about somewhat-old-fashioned e-mail applies to any and all electronic communications now, such as Slack.

So for our digital children, the concept of “mail is private and yours, no matter if you receive it at the workplace” appears to have been irrevocably lost. This was a concept our analog parents took so for granted, they didn’t see any need to fight for it.

Today, privacy remains your own responsibility.




lent

Analog Equivalent Rights (21/21): Conclusion, privacy has been all but eliminated from the digital environment

Privacy: In a series of posts on this blog, we have shown how practically everything our parents took for granted with regards to privacy has been completely eliminated for our children, just because they use digital tools instead of analog, and the people interpreting the laws are saying that privacy only applies to the old, analog environment of our parents.

Once you agree with the observation that privacy seems to simply not apply for our children, merely for living in a digitally-powered environment instead of our parents’ analog-powered one, surprise turns to shock turns to anger, and it’s easy to want to assign blame to someone for essentially erasing five generations’ fight for civil liberties while people were looking the other way.

So whose fault is it, then?

It’s more than one actor at work here, but part of the blame must be assigned to the illusion that that nothing has changed, just because our digital children can use old-fashioned and obsolete technology to obtain the rights they should always have by law and constitution, regardless of which method they use to talk to friends and exercise their privacy rights.

We’ve all heard these excuses.

“You still have privacy of correspondence, just use the old analog letter”. As if the Internet generation would. You might as well tell our analog parents that they would need to send a wired telegram to enjoy some basic rights.

“You can still use a library freely.” Well, only an analog one, not a digital one like The Pirate Bay, which differs from an analog library only in efficiency, and not in anything else.

“You can still discuss anything you like.” Yes, but only in the analog streets and squares, not in the digital streets and squares.

“You can still date someone without the government knowing your dating preferences.” Only if I prefer to date like our parents did, in the unsafe analog world, as opposed to the safe digital environment where predators vanish at the click of a “block” button, an option our analog parents didn’t have in shady bars.

The laws aren’t different for the analog and the digital. The law doesn’t make a difference between analog and digital. But no law is above the people who interpret it in the courts, and the way people interpret those laws means the privacy rights always apply to the analog world, but never to the digital world.

It’s not rocket science to demand the same laws to apply offline and online. This includes copyright law, as well as the fact that privacy of correspondence takes precedence over copyright law (in other words, you’re not allowed to open and examine private correspondence for infringements in the analog world, not without prior and individual warrants — our law books are full of these checks and balances; they should apply in the digital too, but don’t today).

Going back to blame, that’s one actor right there: the copyright industry. They have successfully argued that their monopoly laws should apply online just as it does offline, and in doing so, has completely ignored all the checks and balances that apply to the copyright monopoly laws in the analog world. And since copying movies and music has now moved into the same communications channels as we use for private correspondence, the copyright monopoly as such has become fundamentally incompatible with private correspondence at the conceptual level.

The copyright industry has been aware of this conflict and has been continuously pushing for eroded and eliminated privacy to prop up their crumbling and obsolete monopolies, such as pushing for the hated (and now court-axed) Data Retention Directive in Europe. They would use this federal law (or European equivalent thereof) to literally get more powers than the Police themselves in pursuing individual people who were simply sharing music and movies, sharing in the way everybody does.

There are two other major factors at work. The second factor is marketing. The reason we’re tracked at the sub-footstep level in airports and other busy commercial centers is simply to sell us more crap we don’t need. This comes at the expense of privacy that our analog parents took for granted. Don’t even get started on Facebook and Google.

Last but not least are the surveillance hawks — the politicians who want to look “Tough on Crime”, or “Tough on Terrorism”, or whatever the word of choice is this week. These were the ones who pushed the Data Retention Directive into law. The copyright industry were the ones who basically wrote it for them.

These three factors have working together, and they’ve been very busy.

It’s going to be a long uphill battle to win back the liberties that were slowly won by our ancestors over about six generations, and which have been all but abolished in a decade.

It’s not rocket science that our children should have at least the same set of civil liberties in their digital environment, as our parents had in their analog environment. And yet, this is not happening.

Our children are right to demand Analog Equivalent Privacy Rights — the civil liberties our parents not just enjoyed, but took for granted.

I fear the failure to pass on the civil liberties from our parents to our children is going to be seen as the greatest failure of this particular current generation, regardless of all the good we also accomplish. Surveillance societies can be erected in just ten years, but can take centuries to roll back.

Privacy remains your own responsibility today. We all need to take it back merely by exercising our privacy rights, with whatever tools are at our disposal.

Image from the movie “Nineteen-Eighty Four”; used under fair use for political commentary.




lent

Departure of Clark, Reese opens door for new crop of talented women's players

Caitlin Clark and Angel Reese helped bring women's basketball to new heights over the past two years. While there may be a ratings dip from last season's record high, there are plenty of talented players like Paige Bueckers, JuJu Watkins, Deja Kelly and Hannah Hidalgo ready to continue the rise.




lent

I Corinthians 13-Love-The Most Excellent Way

The 1 Corinthians 13 Bible study covers love...the most excellent way. The questions are designed for personal or group inductive style Bible study and discussion.




lent

Parable Of The Ten Talents

The Parable Of The Ten Talents is an online Bible study about using your Spiritual gifts and fruit to glorify God. We interpret this famous parable of Jesus and apply it to the life of a Christian disciple.




lent

BIOTALENT EU Conference: Tackling biodiversity challenges through innovative e-learning

BIOTALENT is a multilingual blended e-learning training programme to gain crucial skills and knowledge in biodiversity. Protecting life on earth in all its forms also involves introducing innovative ways to address pressing environmental issues of today. A strong investment in environmental education and a passion for science is therefore essential to this programme.

This one-day event, Taking place on 18 May 2017, in Brussels, will illustrate the uniqueness of the BIOTALENT project and programme in the way environmental education is brought to the course participant. The various expert speakers that are invited are all very passionate about innovation in education and the new ways in which scientific and environmental education can contribute to conserving biodiversity.  

To register and find out more visit the official announcement.





lent

Not Your Grandma’s Lent

A few months ago I wrote a very personally challenging article about pursuing a life of radical holiness in an extremely unholy world. You can read the full post here. In it I explore a common theme in scripture where God is calling His people to a life set apart from the rest of the world.

Leviticus 20:26 says, “You shall be holy to me, for I the Lord am holy and have separated you from the peoples, that you should be mine.”

Deuteronomy 7:6 says, “For you are a holy people to the LORD your God; the LORD your God has chosen you to be a people for His own possession out of all the peoples who are on the face of the earth.”   

1 Peter 1:14-16 says, As obedient children, do not conform to the evil desires you had when you lived in ignorance. But just as he who called you is holy, so be holy in all you do; for it is written: ‘Be holy, because I am holy’.”

Just to name a few.

But how do we pull off holy living in a culture armed and ready to drag us down at the first opportunity? Well, lucky for us, we don’t serve a God who doles out commands then leaves us on our own to figure it out. He supplies us with plenty of scriptures to give us guidance as we navigate these tricky waters. Scriptures such as . . .

Therefore, since we have these promises, dear friends, let us purify ourselves from everything that contaminates body and spirit, perfecting holiness out of reverence for God.  – 2 Corinthians 7:1

But among you there must not be even a hint of sexual immorality, or of any kind of impurity, or of greed, because these are improper for God’s holy people.  – Ephesians 5:3

Do you not know that your bodies are temples of the Holy Spirit, who is in you, whom you have received from God? You are not your own; you were bought at a price. Therefore honor God with your bodies.  – 1 Corinthians 10:19-20

Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things. – Philippians 4:8

I appeal to you therefore, brothers, by the mercies of God, to present your bodies as a living sacrifice, holy and acceptable to God, which is your spiritual worship. Do not be conformed to this world, but be transformed by the renewal of your mind, that by testing you may discern what is the will of God, what is good and acceptable and perfect. – Romans 12:1-2

“It would appear that we are to do any and everything we can think of to keep our minds, hearts, eyes, ears, and bodies as pure and clean as humanly possible. It seems to be pretty clear too, that this is not something that will happen passively. It will take a proactive, aggressive, and seemingly radical effort on our part to pull it off. The reason being that not only are we called to pursue holiness, but we are called to do it while still going out and making disciples. Sure, you could hole up in some underground bunker with nothing but a supply of food and a Bible in order to avoid all worldly influence. But what good are you down there? 

The Word gives us so many reminders to pursue holiness and instructions on how to do it because in order to further the Kingdom we will be forced to be out among an unholy world – one that is growing more depraved by the minute. And no matter who you are, if you surround yourself with that which is against God, and fail to guard your heart and mind, you will undoubtedly get taken down.” (taken from earlier post)

So where do we draw the line? Many believers hide under the cloak of “staying culturally relevant” to justify their pursuit of worldly desires. And unfortunately for a lot of them, that relevance has become a full-on camouflage, making them almost unrecognizable as a Christ-follower. But how did Jesus do it? How did He manage to maintain his holiness while mixing it up with the worldliest of the worldly? I believe that his motivation is what set him apart. He didn’t hang out with tax collectors and adulterers just to understand their world better. He spent time with them in order to show them a love they’d never encountered before. He invested in them so that they would leave changed, not the other way around. He was able to do this so effectively because of his deep, intimate communion with the Father and his commitment to a bold level of purity. Is it supposed to be any different for us as believers, as spiritual influencers, as leaders in the Church?

If you’ve had time to look at your calendar as it’s flown by, you may have noticed that Lent starts next Wednesday, March 1st. For many churchgoers, this season serves as an opportunity to sort of re-center their spiritual lives by removing something for the 6 weeks leading up to Easter. For many it’s something like caffeine or sweets. For others it’s a worldly pleasure such as television or social media. Whatever it is they choose, the purpose behind eliminating it for those 40 days is to try to emulate the 40 days that Jesus spent in the wilderness before he began his years of earthly ministry. It’s an attempt to make a personal sacrifice so that the ultimate sacrifice Jesus made on the cross weighs a little heavier on their hearts and minds. But then what?

As I was reflecting on past years when I’ve chosen to participate in Lent and am still being challenged by what the Lord spoke to my heart when writing the post I referred to earlier, I began mulling over several questions in my spirit.

Should Lent look different for mature believers as opposed to those younger in their faith?

What about for leaders in the Church?

How could we approach Lent in such a way that the effects are lasting?

Perhaps you’ve observed Lent for as long as you can remember or maybe this is the first year you are considering participating. Whatever the case, I wonder what it would look like for us to prepare for that holy season with a healthier portion of intentionality and purpose. What if, as leaders of God’s people, we decided to amp things up and instead of just choosing something to get rid of for a few weeks, we did a full scale inventory of our lives and began pruning out all of those things that distract us, that are not God-honoring, and that hold us back from pursuing the holiness we are called to? Can you imagine the eternal reverberations that might cause?

Maybe this year we still choose that one thing to eliminate for March 1st – April 16th, but instead of going about our daily lives for those 47 days (did you know that you don’t include Sundays in the day count?) we pray fervently for God to reveal to us those things that just don’t belong in our lives – those things that take up way too much of our time, attention, money, conversation, and preoccupation - and we begin purging and clearing out those hidden places. What a beautiful Easter morning that would be! What a glorious offering! That, my friends, is NOT your grandma’s Lent! That, brothers and sisters, is the makings of a revival!




lent

How certain foods can improve your mood, A decongestant in popular cold medicines doesn’t work at all, Green Coconut Curry Lentil Soup

This week Zorba and Karl discuss how certain foods can improve your mood, and they talk about the FDA claiming a decongestant in popular cold medicines doesn’t work at all. […]




lent

Israel Relentlessly Destroying Hezbollah & Hamas | CBN NewsWatch October 30, 202

Israel says it's reduced Hezbollah's rocket supply by 80%, and warns that if Iran strikes again then Israel could hit more valuable Iranian targets next time, Israel captures hundreds of Hamas terrorists, and Israel responds to international ...




lent

Smoking most prevalent among workers in food service, accommodation: report

Atlanta – Workers in the accommodation and food service industries have the highest prevalence of cigarette smoking, according to research from the Centers for Disease Control and Prevention.




lent

Colorado study shows marijuana use more prevalent among workers in certain ‘safety sensitive’ jobs

Denver — In Colorado, marijuana use among workers in certain jobs “in which workers have responsibility for their own safety or the safety of others” exceeds that of the state’s general workforce, according to a recent study from the Colorado Department of Public Health and Environment.




lent

Insect-repellent, flame-resistant shirt

Offer employees the ultimate flame resistance and insect protection with the men’s 5.8-ounce Tecasafe FR Uniform Shirt.




lent

Top Security Challenge — Talent!

When asked about their biggest challenge in the coming year, security integrators and manufacturers alike often say the same thing: attracting workers.




lent

Weather-repellent jacket

The Dragon Shield Soft Shell Jacket features an improved design that reshaped the sleeves and added shirt-style cuffs with adjustable snap closures, a drop-tail hem and stretchy shock cords with side-lock adjustments.




lent

Safe use of insect repellents

Topical insect repellents containing DEET are popular and have been shown to be effective. The concentration of DEET in a product reflects the period of time it’s expected to be effective.