#Intelligence (2012)

25 April 2012, dusan

The growth of social media poses a dilemma for security and law enforcement agencies. On the one hand, social media could provide a new form of intelligence – SOCMINT – that could contribute decisively to keeping the public safe. On the other, national security is dependent on public understanding and support for the measures being taken to keep us safe.

Social media challenges current conceptions about privacy, consent and personal data, and new forms of technology allow for more invisible and widespread intrusive surveillance than ever before. Furthermore, analysis of social media for intelligence purposes does not fit easily into the policy and legal frameworks that guarantee that such activity is proportionate, necessary and accountable.

This paper is the first effort to examine the ethical, legal and operational challenges involved in using social media for intelligence and insight purposes. It argues that social media should become a permanent part of the intelligence framework but that it must be based on a publicly argued, legal footing, with clarity and transparency over use, storage, purpose, regulation and accountability. #Intelligence lays out six ethical principles that can help government agencies approach these challenges and argues for major changes to the current regulatory and legal framework in the long-term, including a review of the current Regulation of Investigatory Powers Act 2000.

Authors Sir David Omand, Jamie Bartlett, Carl Miller
Publisher Demos, London, 24 April 2012
ISBN 978-1-909037-08-3
Creative Commons license
106 pages

publisher

PDF

Honza ‘Klokánek’ Šípek: Zásek do živýho (1999/2012) [Czech]

10 April 2012, dusan

Jaké je české digitální podsvětí? Kdo jsou hackeři? Zbojníci či vandalové? Co dovedou? Proč dělají své odvážné kousky? Jací jsou policisté, kteří je pronásledují? Firmy, vlády, velké společnosti, špionážní služby, státní správa, banky, komunikační satelity – je vubec něco v bezpečí?

“Tenhle text jsem napsal na gymplu v roce 1999 z okouzlení ‘jánošíkovskou’ hackerskou scénou. Plánoval jsem ‘jednou’ ji rozšířit do podoby knihy, ale jak tomu bývá, to ‘jednou’ jsem odkládal tak dlouho, až nikdy nepřišlo. Neboť po webu kolujou různé verze tohoto textu, a navíc se zdá, že o hackerské scéně v daném období toho dneska už moc dohledat nejde (zvláště o skupinách SERT a CzERT), zveřejňuju ji aspoň v nejucelenější dobové podobě, i když je možné, že se věci staly jinak, než píšu, a že bych se dneska za text v jeho naivitě už styděl, nebo se nad ním minimálně poušklíbal. Ale stejně asi stojí za existenci.

As is, no warranty, own risk, atd.

V roce 2012 byl text připraven k webovému vydání a doplněny některé Pajkusovy poznámky s odstupem let.” (author)

119 pages
via gnd

PDF
View online (HTML)

Julie E. Cohen: Configuring the Networked Self: Law, Code, and the Play of Everyday Practice (2012)

19 March 2012, dusan

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.

Publisher Yale University Press, 2012
ISBN 0300125437, 9780300125436
Printable version is under a Creative Commons Attribution NonCommercial ShareAlike license
352 pages

the author discussing her book (video)

author
publisher
google books

PDF