Obfuscation

Home > Other > Obfuscation > Page 15
Obfuscation Page 15

by Finn Brunton


  unsell-yourself-%E2%80%94-a-protest-model-against-facebook/).

  31. Wanying Luo, Qi Xie, and Urs Hengartner, “FaceCloak: An Architecture for User Privacy on Social Networking Sites,” in Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (https://cs.uwaterloo.ca/~uhengart/

  publications/passat09.pdf).

  32. Charles Arthur, “How Low-Paid Workers at ‘Click Farms’ Create Appearance of Online Popularity,” theguardian.com, August 2, 2013 (http://www.theguardian.com/

  technology/2013/aug/02/click-farms-appearance-online-popularity).

  33. Jaron Schneider, “Likes or Lies? How Perfectly Honest Business can be Overrun by Facebook Spammers,” TheNextWeb, January 23, 2004 (http://thenextweb.com/

  facebook/2014/01/23/likes-lies-perfectly-honest-businesses-can-overrun

  -facebook-spammers/).

  34. Leo Selvaggio, “URME Surveillance,” 2014 (http://www.urmesurveillance.com).

  35. Francisco Goldman, The Art of Political Murder: Who Killed the Bishop? (Grove, 2008).

  36. Ibid., 109.

  CH A P T E R 3

  1. See the following for a brief look at the story of present-day privacy theory: Daniel J. Solove, Understanding Privacy (Harvard University Press, 2010); Ruth Gavison,

  “Privacy and the Limits of the Law,” in Philosophical Dimensions of Privacy: An Anthology, ed. Ferdinand David Schoeman (Cambridge University Press, 1984); David Brin, The Transparent Society (Perseus Books, 1998); Priscilla M. Regan, Legislating Privacy: Technology, Social Values and Public Policy (University of North Carolina Press, 1995); Jeffrey H. Reiman, “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future,” Santa Clara High Technology Journal 11, no. 1 (1995): 27–44 (http://digitalcommons.law.scu.edu/chtlj/vol11/

  iss1/5); Alan F. Westin, “Science, Privacy and Freedom: Issues and Proposals for the NOTES TO CHAPTERS 2 AND 3

  105

  1970’s. Part I—the Current Impact of Surveillance on Privacy,” Columbia Law Review 66, no. 6 (1966): 1003–1050 (http://www.jstor.org/stable/1120997).

  2. See the following for diverging theories: Helen Nissenbaum, Privacy in Context: Technology, Policy and the Integrity of Social Life (Stanford University Press, 2009); Julie E. Cohen, “Examined Lives: Informational Privacy and the Subject as Object,”

  Stanford Law Review 52 (May 2000): 1373–1437 (http://scholarship.law.georgetown.

  edu/cgi/viewcontent.cgi?article=1819&context=facpub); Daniel J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154, no. 3 (2006): 477–560

  (doi: 10.2307/40041279); Christena E. Nippert-Eng, Islands of Privacy (University of Chicago Press, 2010); Michael Birnhack and Yofi Tirosh, “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74, no. 6 (2013): 1263–1306.

  3. See Paul Dourish, “Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena,” Human-Computer Interaction 21, no. 3 (2006): 319–342 (doi: 10.1207/s15327051hci2103_2); Paul Dourish, Emily Troshynski, and Charlotte Lee, “Accountabilities of Presence: Reframing Location-Based Systems,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2008

  (doi: 10.1145/1357054.1357133).

  4. Helen Nissenbaum, Privacy in Context: Technology, Policy and the Integrity of Social Life (Stanford University Press, 2009).

  5. Kevin Kelly, Out of Control: The New Biology of Machines, Social Systems and the Economic World (Addison-Wesley, 1994) p. 176.

  6. Gilbert Keith Chesterton, “The Sign of the Broken Sword,” in The Innocence of Father Brown (Cassell, 1947) p. 143.

  7. Nichia Corp v. Argos Ltd. , Case A3/2007/0572. EWCA Civ 741 (July 19, 2007) (http://

  www.bailii.org/ew/cases/EWCA/Civ/2007/741.html).

  8. The Simpsons, “The Lemon of Troy,” May 14, 1995.

  9. Hanna Rose Shell, Hide and Seek: Camouflage, Photography and the Media of Reconnaissance (Zone Books, 2012).

  10. Donald H. Rumsfeld, February 12, 2002 (11:30 a.m.), “DoD News Briefing—Sec-retary Rumsfeld and Gen. Myers,” U.S. Department of Defense/Federal News Service, Inc. (http://www.defense.gov/transcripts/transcript.aspx?transcriptid=2636).

  106

  NOTES TO CHAPTER 3

  11. Brad Templeton, “The Evils of Cloud Computing: Data Portability and Single Sign On,” presented at BIL Conference, 2009 (http://www.vimeo.com/3946928).

  12. Tal Zarsky, “Transparent Predictions,” University of Illinois Law Review 2013, no.

  4: 1519–1520.

  13. Solon Barocas, “Data Mining and the Discourse on Discrimination,” in Proceedings of Data Ethics Workshop at ACM Conference on Knowledge Discovery and Data Mining, New York, 2014.

  14. See, in particular, Josh Lauer, “The Good Consumer: Credit Reporting and the Invention of Financial Identity in the United States, 1840–1940,” Enterprise & Society 11, no. 4 (2010): 686–694 (doi: 10.1093/es/khq091); Lauer, The Good Consumer: A History of Credit Surveillance and Financial Identity in America (Columbia University Press, forthcoming).

  15. Anthony Giddens, “Risk and Responsibility,” Modern Law Review 62, no. 1 (1999): 1–10 (doi: 10.1111/1468-2230.00188). See also the elaboration of this idea in Ulrich Beck, Risk Society: Toward a New Modernity (SAGE, 1999).

  16. Ben Cohen, “After Sandy, Wired New Yorkers Get Reconnected with Pay Phones,”

  Wall Street Journal, October 31, 2012.

  17. James C. Scott, Weapons of the Weak: Everyday Forms of Peasant Resistance (Yale University Press, 1987).

  18. For a range of notable responses to surveillance, see the Gary T. Marx, “The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes,” IEEE Security and Privacy 11, no. 5 (2013): 56–61 (doi: http://doi.ieeecomputersociety.org/10.1109/

  MSP.2013.126); Marx, Undercover: Police Surveillance in America (University of California Press, 1989); Marx, “Technology and Social Control: The Search for the Illusive Silver Bullet Continues,” in International Encyclopedia of the Social and Behavioral Sciences, second edition (Elsevier, forthcoming); Kenneth A. Bamberger and Deirdre K.

  Mulligan, “Privacy Decisionmaking in Administrative Agencies,” University of Chicago Law Review 75, no. 1 (2008): 75–107 (http://ssrn.com/abstract=1104728); Katherine J.

  Strandburg and Daniela Stan Raicu, Privacy and Technologies of Identity: A Cross-Disciplinary Conversation (Springer, 2006).

  19. Scott elaborates on this concept in depth in Domination and the Arts of Resistance: Hidden Transcripts (Yale University Press, 1992).

  NOTES TO CHAPTER 3

  107

  20. For arguments regarding the development of the idea of the “monetization” of data and the role it plays in present-day businesses and institutions, see Gina Neff, “Why Big Data Won’t Cure Us,” Big Data 1, no. 3 (2013): 117–123 (doi: 10.1089/big.2013.0029); Brittany Fiore-Silfvast and Gina Neff, “Communication, Mediation, and the Expectations of Data: Data Valences across Health and Wellness Communities,” unpublished manuscript (under review at International Journal of Communication).

  21. Google Inc., Securities Exchange Commission Form 10-Q for the period ending October 31, 2009 (filed November 4, 2009), p. 23, from SEC.gov (http://www.sec.gov/

  Archives/edgar/data/1288776/000119312509222384/d10q.htm).

  22. Martin Heidegger, The Question Concerning Technology and Other Essays (Garland, 1977).

  23. For more on Snowden, see Glenn Greenwald, Ewen MacAskill, and Laura Poitras,

  “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations,”

  theguardian.com, June 11, 2013 (http://www.theguardian.com/world/2013/jun/09/

  edward-snowden-nsa-whistleblower-surveillance); Ladar Levison, “Secrets, Lies and Snowden’s Email: Why I Was Forced to Shut Down Lavabit,” theguardian.com, May 20, 2014 (http://www.theguardian.com/commentisfree/2014/may/
20/why-did-lavabit-shut-down-snowden-email); Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State (Metropolitan Books, 2014); Katherine J.

  Strandburg, “Home, Home on the Web and Other Fourth Amendment Implications of Technosocial Change,” University of Maryland Law Review 70, April 2011: 614–680

  (http://ssrn.com/abstract=1808071).

  24. The idea of “kleptography,” in its more expanded definition, is a useful way of understanding this approach. For the initial, narrower definition—the use of black-box cryptosystems implemented on closed hardware—see Adam Young and Moti Yung,

  “Kleptography: Using Cryptography Against Cryptography,” in Advances in Cryptology—Eurocrypt ’97, ed. Walter Fumy (Springer, 1997). For the more expansive definition—persuading your adversary to use a form of cryptography you know you can break, or using inferior alternatives for reasons of availability or convenience—see Philip Hallam-Baker, “PRISM-Proof Security Considerations,” Internet Engineering Task Force (IETF) draft 3.4, 2013 (https://tools.ietf.org/html/draft-hallambaker

  -prismproof-req-00#section-3.4).

  25. Arvid Narayanan, “What Happened to the Crypto Dream? Part 2,” IEEE Security and Privacy 11, no. 3 (2013): 68–71 (doi: http://doi.ieeecomputersociety.org/10.1109/

  MSP.2013.75).

  108

  NOTES TO CHAPTER 3

  CH A P T E R 4

  1. On TrackMeNot, see http://cs.nyu.edu/trackmenot/.

  2. Gary T. Marx, “A Tack in the Shoe: Neutralizing and Resisting New Surveillance,”

  Journal of Social Issues 59, no. 2 (2003): 369–390 (doi: 10.1111/1540-4560.00069).

  3. See James Edwin Mahon, “The Definition of Lying and Deception,” in The Stanford Encyclopedia of Philosophy (http://plato.stanford.edu/archives/fall2008/entries/

  lying-definition/); John Finnis, “Aquinas’ Moral, Political and Legal Philosophy,” in The Stanford Encyclopedia of Philosophy (http://plato.stanford.edu/archives/sum2014/

  entries/aquinas-moral-political/).

  4. Sissela Bok, Lying: Moral Choice in Public and Private Life (Vintage Books, 1999).

  5. Joseph T. Meyerowitz and Romit Roy Choudhury, CacheCloack, 2009 (http://www.

  cachecloak.co.uk/).

  6. See also Chris Jay Hoofnagle, Ashkan Soltani, Nathaniel Good, and Dietrich J.

  Wambach, “Behavioral Advertising: The Offer You Can’t Refuse,” Harvard Law & Policy Review 6, August (2012): 273–296 (http://ssrn.com/abstract=2137601); Aleecia M.

  McDonald and Lorrie F. Cranor, “The Cost of Reading Privacy Policies,” I/S 4, no. 3

  (2008): 540–565 (http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf); Katherine J. Strandburg, “Free Fall: The Online Market’s Consumer Preference Disconnect,” University of Chicago Legal Forum 95 (2013): 95–172 (http://ssrn.com/

  abstract=2323961); Chris Jay Hoofnagle and Jan Whittington, “Free: Accounting for the Costs of the Internet’s Most Popular Price,” UCLA Law Review 61 (2014): 606–670

  (http://ssrn.com/abstract=2235962).

  7. See Joseph Turow, Chris Jay Hoofnagle, Dierdre K. Mulligan, Nathaniel Good, and Jens Grossklags, “The Federal Trade Commission and Consumer Privacy in the Coming Decade,” I/S 3, no. 3 (2007): 723–749 (http://ssrn.com/abstract=2365578); Joseph Turow, The Daily You: How the New Advertising Industry Is Defining Your Identity and Your Worth (Yale University Press, 2013).

  8. Isaiah Berlin, The Crooked Timber of Humanity: Chapters in the History of Ideas (Princeton University Press, 2013), 2.

  9. Daniel J. Solove and Paul M. Schwartz, Privacy Law Fundamentals, second edition (International Association of Privacy Professionals, 2013).

  NOTES TO CHAPTER 4

  109

  10. See Daniel J. Solove, “Privacy Self-Management and the Consent Dilemma,”

  Harvard Law Review 126 (2013): 1880–1903 (http://ssrn.com/abstract=2171018); Lauren E. Willis, “Why Not Privacy by Default?” Berkeley Technology Law Journal 29

  (2014): 61–134 (http://ssrn.com/abstract=2349766); James Grimmelman, “The Sabotage of Do Not Track,” The Laboratorium, June 19, 2012 (http://laboratorium.net/

  archive/2012/06/19/the_sabotage_of_do_not_track).

  11. For more on Snowden, see Glenn Greenwald, Ewen MacAskill, and Laura Poitras,

  “Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations,”

  theguardian.com, June 11, 2013 (http://www.theguardian.com/world/2013/jun/09/

  edward-snowden-nsa-whistleblower-surveillance); Ladar Levison, “Secrets, Lies and Snowden’s Email: Why I Was Forced to Shut Down Lavabit,” theguardian.com, May 20, 2014 (http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email); Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State (Metropolitan Books, 2014); Joshua Eaton and Ben Piven, “Timeline of the Edward Snowden Revelations, theguardian.com, June 5, 2013 (http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html).

  12. John Rawls, A Theory of Justice (Harvard University Press, 1971).

  13. Ibid., 173.

  14. Arthur Ripstein, Equality, Responsibility and the Law (Cambridge University Press, 1999).

  15. Jeroen Van Den Hoven and Emma Rooksby, “Distributive Justice and the Value of Information: A (Broadly) Rawlsian Approach,” in Information Technology and Moral Philosophy, ed. John Weckert (Cambridge University Press, 2008), 376.

  16. See danah boyd, It’s Complicated: The Social Lives of Networked Teens (Yale University Press, 2014); Colin Koopman, “Internetworked Publics: The Emerging Political Conditions of the Internet,” paper presented at Ars Synthetica: The Anthropology of the Contemporary, Santa Cruz, 2009.

  17. Francisco Goldman, The Art of Political Murder: Who Killed the Bishop? (Grove, 2007).

  18. Anatole France, The Red Lily (Borgo, 2002), 64.

  110

  NOTES TO CHAPTER 4

  19. Philip Pettit, Republicanism: A Theory of Freedom and Government (Oxford University Press, 1997), 73, 79.

  20. See Viktor Mayer-Schönberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think (Houghton Mifflin Harcourt, 2013), 94; Solon Barocas, “Data Mining and the Discourse on Discrimination,” in Proceedings of Data Ethics Workshop at Conference on Knowledge Discovery and Data Mining, 2014; Tal Zarsky, “Transparent Predictions,” University of Illinois Law Review 2013, no. 4

  (2013): 1519–1520.

  21. Pettit, Republicanism, 80, 272.

  22. Rawls, A Theory of Justice.

  23. Mayer-Schönberger and Cukier, Big Data; Turow, The Daily You.

  24. Jeremy Waldron, Torture, Terror and Trade-Offs: Philosophy for the White House (Oxford University Press, 2012).

  25. Turow, The Daily You; Hoofnagle, Soltani, Good, and Wambach, “Behavioral Advertising.”

  CH A P T E R 5

  1. Get Smart, “Mr. Big,” September 18, 1965.

  2. See Cynthia Dwork and Aaron Roth, “The Algorithmic Foundations of Differential Privacy,” Foundations and Trends in Theoretical Computer Science 9, no. 3–4 (2014): 211–407 (doi: http://dx.doi.org/10.1561/0400000042); Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith, “Calibrating Noise to Sensitivity in Private Data Analysis,” in Proceedings of the Third Conference on Theory of Cryptography, 2006 (doi: 10.1007/11681878_14).

  3. Adam Shostack, Threat Modeling: Designing for Security (Wiley, 2014).

  4. danah boyd, It’s Complicated: The Social Lives of Networked Teens (Yale University Press, 2014), 65.

  5. Ibid., 69.

  6. Gion Green, “Rating Files, Safes, and Vaults,” in Handbook of Loss Prevention and Crime Prevention, ed. Lawrence Fennelly (Elsevier, 2012), 358.

  NOTES TO CHAPTERS 4 AND 5

  111

  BIBLIOGRAPHY

  Bamberger, Kenneth A., and Deirdre K. Mulligan. “Privacy Decisionmaking in Administrative Agencies.” University of Chica
go Law Review 75, no. 1 (2008): 75–107 (http://

  ssrn.com/abstract=1104728).

  Barbaro, Michael, and Tom Zeller Jr. “A Face Is Exposed for AOL Searcher No. 4417749.”

  New York Times, August 9, 2006.

  Barocas, Solon. “Data Mining and the Discourse on Discrimination.” In Proceedings of Data Ethics Workshop at ACM Conference on Knowledge Discovery and Data Mining, New York, 2014.

  Beck, Ulrich. Risk Society: Towards a New Modernity. London: SAGE, 1999.

  Berlin, Isaiah. The Crooked Timber of Humanity: Chapters in the History of Ideas. Princeton University Press, 2013.

  Birnhack, Michael, and Yofi Tirosh. “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74, no. 6 (2013): 1263–1306 (http://

  ssrn.com/abstract=2234476).

  Bok, Sissela. Lying: Moral Choice in Public and Private Life. New York: Vintage Books, 1999.

  boyd, danah. It’s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press, 2014.

  Brin, David. The Transparent Society. New York: Perseus Books, 1998.

  Burkell, Jacquelyn, and Alexandre Fortier. “Privacy Policy Disclosures of Behavioural Tracking on Consumer Health Websites.” Proceedings of the American Society for Information Science and Technology 50, no. 1 (2014): 1–9 (doi:10.1002/

  meet.14505001087).

  Ceccato, Mariano, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, and Paolo Tonella. “The Effectiveness of Source Code Obfuscation: An Experimental Asessment.” In Proceedings of 17th International Conference on Program Comprehension, 2009 (doi: 10.1109/ICPC.2009.5090041).

  Chesterton, Gilbert Keith. “The Sign of the Broken Sword.” In The Innocence of Father Brown. London: Cassell, 1947.

  Cho, Max. “Unsell Yourself—A Protest Model Against Facebook.” Yale Law & Technology blog May 10, 2011 (http://www.yalelawtech.org/control-privacy-technology/unsell-yourself-%E2%80%94-a-protest-model-against-facebook/).

  Cohen, Fred. “The Use of Deception Techniques: Honeypots and Decoys.” In Handbook of Information Security, volume 3, ed. Hossein Bidgoli. Hoboken: Wiley, 2006.

 

‹ Prev