Wednesday, December 1, 2010

Week 13 notes

1) No place to hide site: http://www.noplacetohide.net/%20
This site was interesting and extremely relevant because we are constantly monitored.  I think about that sometimes -- it seems like nothing is private.  But on the other hand, when there is a shooting or terrorism plot, it always seems like they had some type of blog or digital trail that would have given clues.  (Like the LA Fitness shootings in Pittsburgh in the summer of 2009 -- he has a blog in which he made suspicious comments.  Or Richard Poplawski, charged with killing three Pittsburgh police officers in spring 2009 -- he made comments about killing cops on Internet radio.)  Why aren't these nipped in the bud earlier if they are so closely monitored?  I just think there is so much information, its impossible to mine it all -- making most of it useless.

2) TIA and data mining http://www.epic.org/privacy/profiling/tia/
It would be nice to get an update on this project, as most of the site was five years old or older.  But this gave a good introduction and background of TIA.  This would address some of my concerns from the above post:  That there is so much being monitored, it's hard to determine what is useful in detecting threats.  This is aside from the argument of whether it is ethical/moral to monitor so much ("Big Brother!"), which is a different debate.  I can tell from this site that they are against much of this monitoring.

3) http://www.youtube.com/watch?v=hS8ywG5M_NQ
I got an error message saying this video had been removed because of a copyright claim by Viacom.


Kristen Huth

2 comments:

  1. The Technology Privacy Advisory Committee studied TIA and concluded that “data mining is a vital tool in the fight against the terrorism” (excerpt from article), but agreed that it raises the privacy issues concerns. It was also noted that the false-positive results should be handled appropriately and action must be taken immediately to resolve issues and avoid future mishaps as well as to improve data mining. In the summary, it was stated that employed tools provide means of privacy protections and control of individual’s identity. https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=75+U.+Chi.+L.+Rev.+261&srctype=smi&srcid=3B15&key=0f62fb7e6ac9859001f1610a86b86ec9

    ReplyDelete
  2. That's a good point about tracking criminals through online activity. It seems we want our privacy ... unless it puts bad people behind bars. I guess we can't have it both ways. I like the idea of a safer world, but when that safety comes at a cost, it can be sobering.

    ReplyDelete