Privacy & Security Reading List, Next TGP
Privacy & Security Reading List, Next TGP

Most current posts by Sean O’Brien (see all)

If you’re touring this weekend, nestled in entrance of the hearth, or just attempting to offset the result of sugar-coated getaway specials, we have received a looking through checklist for you. These picks had been advised by team customers at Purism and mirror our determination to electronic privateness, protection, and freedom. With daily headlines about Major Tech scandals like Facebook’s clandestine knowledge-sharing, there is no greater time to browse up on these topics.

The possibilities underneath are mentioned in no individual purchase and, wherever possible, we website link to writer internet websites and privacy-respecting resources.

Reading through about surveillance capitalism may not warm your heart, but it could put a hearth in your tummy and inspire you to #DemandFreedom in 2019.

The End of Have faith in – McSweeney’s Challenge 54 (Nov. 2018)

Compiled by the group at the Electronic Frontier Basis (EFF) for McSweeney’s, this selection features producing by luminaries like Cory Doctorow, Gabriella Coleman, Edward Snowden, Bruce Schneier, and a lot of additional. Between the gems within just is a dialogue involving artist Trevor Paglen and journalist Julia Angwin, with Paglen acquiring this to say about the intersection of liberty and privacy:

“I feel I had the perception of increasing up inside buildings that didn’t get the job done for me and feeling like there was a deep injustice all around that. Sensation like the planet was set up to move you down selected paths and to implement specified behaviors and norms [didn’t] get the job done for me, and noticing that the benefit of this word formerly known as privacy, if not regarded as liberty, plays not only at the scale of the individual, but also as a sort of public resource that permits for the probability of, on a single hand, experimentation, but then, on the other hand, factors like civil liberties and self-illustration.”

Simply click Listed here to Kill Every person: Protection and Survival in a Hyper-linked Entire world – Bruce Schneier, W. W. Norton & Enterprise (Sep. 2018)

Schneier’s most recent book is a sobering account of the pitfalls of modern technologies. It handles a large amount of ground, these kinds of as the huge hole concerning safety and implementation in Online-of-Matters equipment. The writer has a gift for boosting concerns that cause the reader to rethink the fundamental know-how driving seemingly-basic tech, like network-related child monitors:

“They’re surveillance equipment by style, and can choose up a large amount more than a baby’s cries. Of program, I had a great deal of stability inquiries. How is the audio and online video transmission secured? What’s the encryption algorithm? How are encryption keys produced, and who has copies of them? If facts is stored on the cloud, how long is it saved and how is it secured? How does the smartphone application, if the keep track of works by using a single, authenticate to the cloud server?”

American Spies: Contemporary Surveillance, Why You Must Care, and What to Do About It – Jennifer Stisa Granick, Cambridge College Push (Jan. 2017)

Granick provides the reader a real perception of just how significant, and just how pervasive, U.S. intelligence packages seriously are. The creator does not prevent with govt courses, even so, and phone calls out Huge Tech for its significant part in populace surveillance:

“Spying is flourishing not only for the reason that of technology, but also due to the fact of modern day company models. Significantly of the fashionable privacy trouble is the outcome of individuals offering up their details – knowingly or otherwise – to obtain cool new products and solutions and providers.”

Nothing at all to Cover: The Bogus Tradeoff amongst Privacy and Security – Daniel J. Solove, Yale College Press (Jan. 2013)

This is a now-classic rumination on the deeply essential part of privateness in autonomy and freedom. It immediately demolishes the “nothing to cover argument”, a constant chorus in today’s privacy debates, and carries on to shed light on social and authorized proportions of surveillance. Here, Solove highlights contradictory perceptions of audio and online video snooping:

“The digital-surveillance statutes strongly defend in opposition to the government’s eavesdropping on your conversations but really do not shield towards the government’s observing you. This distinction does not make a good deal of sense. Online video surveillance requires related threats to privateness as audio surveillance. As a person court docket pointed out: ‘Television surveillance is equivalent in its indiscriminate character to wiretapping and bugging. It is even far more invasive of privacy… but it is not much more indiscriminate: the microphone is as ‘dumb’ as the tv digicam both equally products decide up everything within their electronic access, nevertheless irrelevant to the investigation.’”

Dragnet Nation: A Quest for Privateness, Protection, and Liberty in a Globe of Relentless Surveillance – Julia Angwin, Instances Books (Feb. 2014)

Angwin is no stranger to the a lot of aspects of surveillance capitalism, and this guide is just as prescient now as it was 5 several years ago. In that time, the author’s issues have been validated, with the tempo of Significant Tech’s blunders only escalating. Angwin keeps the human element in frequent look at, supplying very important context to headlines about privacy and data catastrophes:

“Skeptics say: ‘What’s erroneous with all of our information being gathered by unseen watchers? Who is staying harmed?’ Admittedly, it can be hard to display personal harm from a details breach. If Sharon or Bilal is denied a work or insurance policy, they may by no means know which piece of facts induced the denial. Individuals put on the no-fly listing are by no means informed about the knowledge that contributed to the decision. But, on a bigger scale, the remedy is uncomplicated: troves of personalized info can and will be abused.”

Totally free Program, Free of charge Culture, 3rd Edition – Richard M. Stallman, Cost-free Computer software Basis (Oct. 2015)

Stallman’s position as an icon in the Absolutely free/Libre environment is usually the emphasis of push. Bootstrapping GNU and the Absolutely free Software program movement was no compact feat, but there is much too very little target on Stallman’s crafting. The author’s philosophy is grounded in useful worries and spelled out with a clear and aware tone that several writers have. This most new edition of Stallman’s collected essays describes just how critical liberty is in the present-day electronic context:

“If ‘cloud computing’ has a indicating, it is not a way of doing computing, but fairly a way of imagining about computing: a satan-may possibly-care strategy which states, ‘Don’t request queries. Really do not worry about who controls your computing or who holds your information. Do not verify for a hook hidden within our services right before you swallow it. Have faith in organizations without the need of hesitation.’ In other terms, ‘Be a sucker.’”

Defending Politically Vulnerable Corporations On the internet – Sean Brooks, Middle for Long-Time period Cybersecurity (July 2018)

In this report from the Heart for Extensive-Expression Cybersecurity (CLTC), Brooks provides a wide overview of the cybersecurity landscape. This is a excellent introduction for business specialists and shoppers alike, nevertheless it focuses on civil corporations that are normally focused for political explanations. The report’s citations are a beneficial source in their possess right, providing context as well as technological alternatives. The author is brief to place out lackluster investment decision in cybersecurity in both of those the public and private spheres, describing the vicious cycle this creates:

“The broad asymmetry amongst attackers and defenders on-line is unsurprising politically susceptible corporations absence assets and are hence notably below-secured. This difficulty is not exclusive to politically vulnerable businesses. Lots of general public and private organizations have underinvested in cybersecurity and have grow to be smooth targets for criminals and other bad actors. On-line attackers have ongoing to build their offensive abilities, exacerbating the mismatch.”

Terrible Blood: Tricks and Lies in a Silicon Valley Startup – John Carreyrou, Penguin Random Residence (May possibly 2018)

This story of the increase and drop of biotech startup Theranos is a web site-turner, described right here with all the depth of investigative journalism. Carreyrou’s most fascinating passages are those people where the author describes the tradition of Silicon Valley, where fraudulent CEO Elizabeth Holmes was desperately hoping to fill the mold of her Huge Tech heroes:

“For a younger entrepreneur constructing a company in the coronary heart of Silicon Valley, it was hard to escape the shadow of Steve Work opportunities. By 2007, Apple’s founder experienced cemented his legend in the technologies globe and in American modern society at large… to anybody who spent time with Elizabeth, it was distinct that she worshipped Positions and Apple.”

The Doomsday Equipment: Confessions of a Nuclear War Planner – Daniel Ellsberg, Bloomsbury Usa (Dec. 2017)

Decades after the famous whistleblower disclosed the Pentagon Papers to the American general public, Ellsberg’s warnings will nevertheless ring alarm bells and shock the reader. Through initial-hand accounts, the writer chronicles the nuclear plan of the 1960’s and the risks of the current working day, describing the contrasting roles of secrecy and transparency, as very well as their romance to belief:

“Like discussion of covert functions and assassination plots, nuclear war plans and threats are taboo for general public dialogue by the little minority of officials and consultants who know anything about them. In addition to their own sense of identification as reliable keepers of these most-sensitive secrets, there is a solid careerist factor to their silence.”

The Participatory Situation in the Digital Age – Digital Mediations Guide 51 (Nov. 2016)

This assortment of content articles spans the gamut from avenue protests to on-line “hacktivism” to Free and Open-Resource collaboration. The editors expertly summarize the transdisciplinary tone of the quantity in an introductions that’s really worth considering in its personal suitable. Among other concerns, Gabriella Coleman describes Kate Crawford’s do the job on the electric power and scale of spying:

“Ubiquitous surveillance facilitated by [information and communications technology or ICTs] – what Crawford designates as ‘algorithmic listening’ – and the gathering of particular details presently operated by net-based corporations (commercial surveillance) and governments (the NSA application, for instance) are not basically matters of privateness but also of scale and deficiency of accountability.”

Privacy and Major Knowledge: The Players, Regulators, and Stakeholders – Terence Craig & Mary Ludloff, O’Reilly Media (Sep. 2011)

Released at a time when “Big Data” was much more of a buzzword than a component of day-to-day daily life, this ebook is a brief and effortless introduction to the perils of the knowledge overall economy. The lessons would feel dated if they weren’t nonetheless applicable, and there is probably practically nothing far more prescient than the simple fact that facts can not only be marketed by Massive Tech to small business companions, it can be given absent:

“While the IP stakeholders have been chaotic redefining “privacy” for their have finishes, Google, Yahoo, Fb, and others have been similarly chaotic making billions of pounds accumulating your data and employing it for qualified advertising. Of training course, any business or corporation that collects facts can supply it for sale or free.”

Habeas Facts: Privateness vs. the Increase of Surveillance Tech – Cyrus Farivar, Melville Household (May well 2018)

Farivar exposes the role of popular, home tech in the world surveillance apparatus, diving into the courtroom cases and authorized precedent that shapes the scope and limits of privacy and safety. Over all, the author steeps his examination in historical past, with rates from legal heavyweights like Louis Brandeis, listed here talking about wiretaps in a well-known dissenting view:

“‘The progress of science in furnishing the Authorities with means of espionage is not probable to cease with wiretapping,’ Brandeis wrote. ‘Ways may sometime be developed by which the Govt, with out removing papers from magic formula drawers, can reproduce them in court docket, and by which it will be enabled to expose to a jury the most intimate occurences of the home.’”

Sean O’Brien