Monday, October 31, 2011

Privacy conference


You might be interested in what is getting covered at the Public Voice Conference on Privacy.

Even as privacy rights spread around the world the struggle to promote privacy continues to be challenging. Laws and regulations continue to face economic and technological challenges, effective protections continue to require constant campaigning, implementation of rights continue to be questioned on the grounds of culture and conflict of laws. This Public Voice meeting aims to address these challenges with an emphasis on developments in Latin America. Follow #TPV11for updates and information related to the meeting.

Wednesday, October 19, 2011

Liberation Technology Seminar this Thursday - How the Street, Institutions, and Mediascape Converge in Egypt

Program on Liberation Technology



Layers of Networks: How the Street, Institutions, and Mediascape Converge in Egypt 
Liberation Technology Seminar Series


October 20, 2011
4:30 PM - 6:00 PM

Wallenberg Theater
Wallenberg Hall
450 Serra Mall, Building 160

Speaker
Ramesh Srinivasan - UCLA




Abstract

Running across freeways with labor organizers, speaking with taxi drivers and laborers, and visiting rural areas of Egypt convinced me during my fieldwork that neither social media technologies nor the youth that use them caused or directly led a revolution where people from every walk of life took to the street. Indeed, only 15% of Egyptians and other Arab Spring countries have Internet access and a small percent of them are active on social media. These dynamics replay themselves in the many countries and cultures that I have worked within - from Kyrgyzstan, to Native America, to India. Indeed, while re-telling a story that places heroic youth and wonderfully liberating technologies at the center ignores the masses, dismissing social media’s dramatic impact on journalism and high-end organizing in turn is equally shortsighted. This talk will bring up different arguments (sometimes in conflict with one another) of how networks of the street and networks of the Internet work with one another, placing working classes and community organizers side-by-side with social media users.

Dr. Ramesh Srinivasan, Assistant Professor at UCLA in Design and Media/Information Studies, studies and participates in projects focused on how new media technologies impact political revolutions, economic development and poverty reduction, and the future of cultural heritage. He recently wrote a front page article on Internet Freedom for the Huffington Post, an Op/Ed in the Washington Post on Social Media and the London Riots, an upcoming piece in the Washington Post on Myths of Social Media, and was recently on NPR discussing his fieldwork in Egypt on networks, actors, and technologies in the political sphere. He was also recently in the New Yorker based on his response (from his blog: http://rameshsrinivasan.org) to Malcolm Gladwell’s writings critiquing the power of social media in impacting revolutionary movements. He has worked with bloggers who were involved in overthrowing the recent authoritarian Kyrgyz regime, non-literate tribal populations in India to study how literacy emerges through uses of technology, and traditional Native American communities to study how non-Western understandings of the world can introduce new ways of looking at the future of the internet. He holds an engineering degree from Stanford, a Masters degree from the MIT Media Lab, and a Doctorate from Harvard University. His full academic CV can be found at http://rameshsrinivasan.org/cv

Saturday, October 15, 2011

Anonymity and rage

http://www.guardian.co.uk/technology/2011/jul/24/internet-anonymity-trolling-tim-adams

How the internet created an age of rage

The worldwide web has made critics of us all. But with commenters able to hide behind a cloak of anonymity, the blog and chatroom have become forums for hatred and bile

Wednesday, October 12, 2011

Interesting followon to today's discussion on Internet and ID


http://www.ft.com/intl/cms/s/2/9b28f1ec-eaa9-11e0-aeca-00144feab49a.html?ftcamp=rss#axzz1abZ0ZBlO

Founding father wants secure ‘Internet 2’

By Joseph Menn in San Francisco
Vint Cerf, known as one of the fathers of the internet, acknowledges that he and co-founder Bob Kahn did not think enough about security when they built the framework for the web. He shares a view held by a growing number of experts that the best way to defend against cyberattacks might be to simply start again.
“I would have put a much stronger focus on authenticity or authentication – where did this email come from, what device I am talking to . . . those things are elements that would make a big difference,” Mr Cerf says.
The fight to secure the current internet is unwinnable, says Ori Eisen, founder of a security company called 41st Parameter, which defends banks against online crime.
A faulty initial design – with net protocols that rely on trust and freely allow anonymity – has been compounded by the slow rollout of security gear, he says.
“I can do a very good job,” says Mr Eisen, whose company tries to keep pace with advancements in the cybercrime underworld. “But in the long run, it is essentially hopeless.”
So, what would a secure internet look like? Mr Eisen has set out plans for Internet 2 in a document called Project Phoenix. Included in his blueprint are biometric identification, encryption of all keystrokes and virtual machines created for every transaction.
His plan has drawn praise from the security industry, including Michael Barrett, PayPal’s head of security, who calls it a “very helpful scenario”.
“There are a number of people in the community who have been arguing for a while that we need to press the proverbial reset button and start again,” Mr Barrett said.
The US government has made some tentative steps in that direction. Military contractors funded by the Pentagon’s defence advanced research projects agency – which sponsored the first version of the internet – are also contemplating redesigns. But these efforts are aiming mainly at isolated government locations and not broad adoption in the civilian world.
A new internet, along the lines of Project Phoenix, seems destined to remain a plan on paper only – at least for now. A company based on Project Phoenix would be doomed without a government mandate or a consortium of banks or telecommunications companies stepping in, says Ted Schlein of Kleiner Perkins, 41st Parameter’s prominent venture capital investor.
“The concept of a more secure network that customers or vendors are willing to pay for is probably the only way to provide the security that people want to have,” Mr Schlein says.
Mr Cerf said the ubiquity of the present internet need not block the adoption of a new version.
“I’m actually quite interested in the clean-slate ideas,” Mr Cerf said. “People will say, ‘Oh you can never do that, it’s already too deeply embedded in everything else.’ But you could have said that of the telephone system in 1973, and the internet is replacing the telephone system.”
Additional reporting by Tim Bradshaw in London

Monday, October 10, 2011

Talk Thursday: The Last Mile: Grassroots Development and Technology in Africa



The Last Mile: Grassroots Development and Technology in Africa 
Liberation Technology Seminar Series
 

October 13, 2011
4:30 PM - 6:00 PM

Wallenberg Theater
Wallenberg Hall
450 Serra Mall, Building 160
Speaker
Joshua Stern - Co-Founder and Executive Director at Envaya


ABSTRACT:

A system is only as strong as its weakest connections. The most fragile and easily disrupted links of international development and foreign aid structures are unfortunately the most important: those connecting community stakeholders with one another and with the larger system designed to support them. Grassroots civil society organizations are essential to sustain growth in developing regions. Across Africa, these groups do the hands-on, local development work that changes lives, but the overwhelming majority operate in isolation, unable to collaborate, to plan new interventions, share best practices, or communicate directly with funders and supporters.

Joshua Stern will discuss some of the systemic obstacles facing grassroots civil society organizations, and the impact that web technology is having in developing communities across East Africa. Stern co-founded Envaya whose mission is to build and deploy a software platform that provides “the last mile” of connection between grassroots activists and the larger development sector. Built to be easy-to-use and optimized to work in challenging, developing-world environments, Envaya's online and mobile tools empower community organizations to stake out an online presence, connect and coordinate with each other, and directly engage the international development sector. The tools encourage collaboration and transparency, inspire activism and civil society engagement, and increase the efficiency of established programs. In just over one year, the Envaya platform has become the largest online network of civil society organizations in East Africa.

Joshua Stern (Stanford '06) is the Executive Director of Envaya. After graduating, Joshua served in the Peace Corps in Tanzania. He founded Envaya in 2010 with Jesse Young (Stanford '06, MS '07) and Tanzanian civil society leader Radhina Kipozi. Joshua splits his time between Africa and the San Francisco Bay Area.
Contact: Kathleen Barcos at kbarcos@stanford.edu

Talk on Control System Security, Wed right after class



Stanford EE Computer Systems Colloquium

4:15PM, Wednesday, Oct 12, 2011
Skilling Auditorium, Stanford Campus http://ee380.stanford.edu

Control System Cyber Security - State of the State 


Joe Weiss
Applied Control Solutions, LLC
About the talk:Industrial control systems are used in electric power, water, pipelines, etc. These systems were designed for performance and safety considerations, not security. Traditional IT security technologies, policies, and testing may not apply to these systems. Moreover, there is currently no university with an interdisciplinary program accross multiple engineering disciplines to address control system cyber security. There have already been more than 200 actual control system cyber incidents to date, though most have not been identified as cyber. In the US alone, there have been 4 control system cyber incidents that have killed people, 3 major cyber-related electric outages, 2 nuclear plants shut down from full power, etc. With the advent of Stuxnet, cyber has been introduced as an offensive weapon. The purpose of this presentation is to provide a state-of-the-state view of control system cyber security.
Resources:
Book: Joe Weiss, Protecting Industrial Control Systems from Electrionic Threats
CNN video: Idaho 'ground zero' in cyber-terror war
Slides:
There is no downloadable version of the slides for this talk available at this time.
About the speaker:


Joseph Weiss is an industry expert on control systems and electronic security of control systems, with more than 35 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI) where he led a variety of programs including the Nuclear Plant Instrumentation and Diagnostics Program, the Fossil Plant Instrumentation & Controls Program, the Y2K Embedded Systems Program and, the cyber security for digital control systems.

Sunday, October 9, 2011

Artificial Intelligence - a legal perspective - Panel at Stanford

http://cyberlaw.stanford.edu/node/6732


Stanford Law School, Thursday October 26 6-9 pm
RSVP for this free event: http://bit.ly/cis-ai-rsvpEveryone is invited.


In the summer of 1956, several key figures in what would become known as the field of "artificial intelligence" met at Dartmouth College to brainstorm about the future of the synthetic mind. Artificial intelligence, broadly defined, has since become a part of everyday life. Although we are still waiting on promises of "strong AI" capable of approximating human thought, the widespread use of artificial intelligence has the potential to reshape medicine, finance, war, and other important aspects of society. The Center for Internet and Society, along with the the Stanford Law and Technology Association (SLATA), and the Stanford Technology Law Review (STLR) bring together four scholars who have begun to examine the near term, short term, and long term ramifications of artificial intelligence for law and society. This panel follows up on our Legal Challenges in an Age of Robotics panel from November 2009.

Wednesday, October 5, 2011

Virtual realities

After today's visit I thought you might be interested in a couple of virtual spaces that are quite different, from the early 90s.  Brenda Laurel's Placeholder (1992) was a two-person VR with mythological character avatars.

See http://www.tauzero.com/Brenda_Laurel/Placeholder/Placeholder.html

Char Davies Osmose (1995) was an underwater experience where you navigate by breathing.

http://www.immersence.com/osmose/
for a short video see http://www.youtube.com/watch?v=QlV6pgVJapI

Monday, October 3, 2011

Article on Willow Garage, where we'll visit in November


Household robots are moving from science fiction to reality

Willow Garage's PR2 robot can fold clothes, set a table and bake cookies. It costs too much and does too little to interest consumers, but researchers are rapidly developing technology to make it more useful and less expensive.