Social Network Diagram for ITO JOICHI
Found this strange site that has extracted data from conference attendances and created graphical maps of social network. Pretty scary. I attended an Open Source Solutions conference organized by Robert Steele, a former CIA expert on Open Source Intelligence. There were a bunch of CIA and KGB folks at the conference. Anyway, the list of attendants of this conference among other lists seem to have made it into this database...
From David Farber's IP Mailing List
From: Lauren Weinstein
Date: Tue, 06 Aug 2002 12:46:38
To: David Farber
Subject: Freedom Ad from the Ad Council
A marvelous video spot is starting to appear, sponsored by the Ad Council. It's worth watching for.
It begins with a teenager who approaches the help counter at a library. He tells the librarian that he can't find the books he has on a list, which he hands her. She looks them up in the computer, and replies, "These books are no longer available... may I have your name, please?" When the kid walks away from the counter without giving his name, he's approached by two men in suits (one of whom takes his arm) appearing from behind some shelves, who "just have a couple of questions" for him. Meanwhile, the librarian is watching with a look of sadness and concern.
A tagline appears: "What if America wasn't America?
Freedom. Appreciate it. Cherish it. Protect it."
Definitely one of the most chilling (and unfortunately appropriate) ads I've ever seen.
Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org
Co-Founder, Fact Squad - http://www.factsquad.org
Co-Founder, URIICA - Union for Representative International Internet Cooperation and Analysis - http://www.uriica.org
Moderator, PRIVACY Forum - http://www.vortex.com
Member, ACM Committee on Computers and Public Policy
This is very funny and insightful. Thanks Howard for pointing this out.
Key concepts: O'Reilly Open Source convention, computation, free software, Linux, spam, viruses, means of software production, social organization, Disney, Microsoft, Richard Stallman, Lawrence Lessig, information economics
Attention Conservation Notice: Over 5,400 words of diffuse Papal-Imperial ranting to a restive audience of Linux freaks.
"A Contrarian View of Open Source"
San Diego July 26, 2002
Thanks for showing up to see the obligatory novelist at this gig.
It's very touching of you to take the trouble to watch me get some emotional issues off my chest.
You know, I don't write code. I don't think I'm ever going to write any code. It just amazes me how often people who know absolutely nothing about code want to tell software people their business. "Why don't they just," that's the standard phraseology. "Why don't they just" code-up something-or-other. Whenever I hear that, frankly, I just want to slap the living shit out of those people.
That's like people whose fingers are covered with diamonds complaining about the easy lives of diamond miners.
Today I will be on the news at 5:30pm on TBS and 10:30pm (thanks Sakiyama-san) on Fuji TV protesting the National ID. From 1pm to 3pm today, Yoshiko Sakurai, her team and I held a rally passing out pamphlets and giving speeches in the middle of the busy shopping district of Ginza. The media was around in force today, but it is really too little too late. We've been doing this since September of last year and the day before it goes live, the media is finally focused. We will continue our struggle, but it will be harder now that the law is officially running. At least now almost everyone I meet says that they have been protesting this all along instead of threatening me that I will lose everything if I continue...
I have been interviewed several times by TV. It seems that the media is focused very much on the security of Jyukinet. I believe, that although this is very important, the bigger risk is the use of the 11 digit number in databases in the bureaucracy and the effect that this will have on the ease in which lists can be created, cross references and leaked.
The media is also discussing quite a bit, the storage on the IC card. This is practically irrelevant. What is relevant is the IC card being using to link real world transactions to databases.
The other big risk is that 11 digit number can be written down, read and distributed easily. Why didn't they use digital signatures or some sort of hash function that is not human readable?
Everyone wants me to talk about the security of the Jyukinet, and the cut the sections where I talk about the nature of identity and the concept of privacy underpinning democracy. Oh well.
With respect to the security of the network, it is important to note that the Somusho is saying that it is safe because they have firewalls and leased lines, but anyone who knows anything about computer networks know that this is not true. No network is safe. Having said that, I think it is important to focus, not on the technical issues such as firewall security, but on the fact that the safest network is a small network with the least number of users and terminals.
Beijing (SatireWire.com) — Bitter after being snubbed for membership in the "Axis of Evil," Libya, China, and Syria today announced they had formed the "Axis of Just as Evil," which they said would be way eviler than that stupid Iran-Iraq-North Korea axis President Bush warned of his State of the Union address.From January. Was funnier when I first read it, but still funny and still sort of relevant. I promise this is my last Satirewire archive I'll post. Just been doing too much heavy reading and needed to refresh with something funny. And for people new to Satirewire, this should still be new.
Axis of Evil members, however, immediately dismissed the new axis as having, for starters, a really dumb name. "Right. They are Just as Evil... in their dreams!" declared North Korean leader Kim Jong-il. "Everybody knows we're the best evils... best at being evil... we're the best."
For full story click on Satirewire link above.