Presidential Campaign Reps at CFP 2008

(Image used under: Fair Use doctrine)

Today at the Computers, Freedom and Privacy Conference, we opened with statements from representatives from the Obama and McCain campaigns (Clinton declined to attend).

Obama

Daniel Weitzner from MIT represented Obama's campaign. He opened by talking about Obama's major views as they relate to privacy and technology. Obama believes in:
  • Greater accountability in government
  • Keeping government information and operations open and transparent
  • Citizen participation in decision making
  • The appointment of a government Chief Technology Officer to oversee these types of issues

McCain

Chuck Fish, a Patent Lawyer and part of McCain's legal team came to represent his campaign. McCain believes in:
  • Promoting American innovation
  • Taxing the rich is a popular idea, but it's the pursuit of riches that drives innovation
  • The system should reward the behaviors that we want to reward
  • We need to develop a skilled workforce
  • We should very lightly regulate the market and let it take care of itself until such point as they fail
  • Market regulation should focus on anti-competitive behavior

Open Questions

Next were questions asked by the moderators of the panel:

Q: "What do you see as the role of government in providing access to our basic communications infrastructure (the Internet)"

(McCain) Chuck – Can't understand his answer. Very politicalese. I'm fairly certain that he didn't answer the question, but it's hard to tell.

(Obama) Dan – Rather than focus on the infrastructure, it's important to protect the openness of the Internet. Even if we were to stay on dial-up or were years behind other countries on bringing broadband to our people, that's really secondary to protecting the nature of the Internet. He also noted that McCain's view of a self-regulating market will maintain open Internet (and I agree).

Q: "NSA Wiretapping – what would their position be on liability of carriers. What changes to Fisa"

(McCain) Chuck – "Immunity is a tough question because there's competing values. We're not talking about granting indulgences…" Again, hard to follow. Many words come out, but not much is said. The only thing he said of substance in his several minute non-answer to the question was "There needs to be hearings to find out what actually happened and what harm was actually done" which is to say that he will "look into it".

(Obama) Daniel – Obama's history and future view is to strengthen judicial review of administrative subpeonas, National Security Letters and the gag orders that accompany them. When surveillance is used, there must be real, meaningful oversight. Obama voted AGAINST retroactive immunity. McCain did not vote against them (which Dan feels is tacit approval).

Obama realizes that advanced surveillance and data mining can be important tools for national security, and they should be available, but with appropriate oversight. It's important to guard against mission creep! Woo! Someone gets it!

Q: "American companies are assisting China in censoring it's citizens. What would a given candiate do about that?"

(Obama) Dan – No official position, but if Dan had to offer advice to the campain, it would be that the lesson of the efforts in the US in the mid-90's to persuade countries to adopt an open Internet should be continued. We should open a dialogue and encourage and persuade countries to realize the benefits while using our influence to lead them towards more openness.

(McCain) Chuck – No explicit policy either. But the values that the campaign holds that would apply is to go slowly and carefully. It's always wrong to believe that you can legislate the behavior of people in other countries. Show the repressive regimes the benefits that openness provides, we will lead by example.

Open Questions

Next were open questions from the audience.

Q: "Email use by President – Will your candidate use e-mail. Does McCain know how? Will they avoid requirements to save e-mails by using other services outside of the Whitehouse?"

(McCain) Chuck – McCain does know how to use e-mail. As for avoiding requirements, you can tell from the tenor of his career that any perceived impropriety is anathema. Very little is more important for himself and country than acting honorably and keeping himself clean.

(Obama) Dan – There's a real commitment in Obama tech policy to keep government open and keep the flow of information open. Hiding e-mail wouldn't meet his commitment to open government.

Q: "Bush doesn't want to use e-mail because it becomes public record, but both of these candidates have records of believing in open government. But what will they do to keep government open?"

(McCain) Chuck – Answered by listing the example of require reporting of all data about sex offenders. He seems to have misunderstood that open government is about reporting what the GOVERNMENT is doing, not citizens.

(Obama) Dan – Bush administration has gone way overboard in classifying information. Obama called for national declassification center.

Q: "Clinton administration mandate cell companies to track users for 911. Companies are tracking all the time when powered. No legal limitations for what use can be made. Should this be protected by judicial oversight?"

(Obama) Dan – No position on that, but clear position of looking at tech capabilities that are not being addressed from a privacy perspective.

(McCain) Chuck – First ask, is there a problem and does the law already deal with it? If there was a possibility of current harm or future harm, then perhaps regulation would be appropriate, but otherwise, just trust but verify.

Q: "Net Nuetrality – How far would either of you go to live up to the view that the Internet is a tool for Democracy?"

(Obama) Dan – Obama wants to maintain openness of the Internet. Before we fight what the Internet may become, we should ask if we want to go where it's going. Do we like what it's evolving too. Either way, currently the regulatory agencies lack the power to get involved.

(McCain) Chuck – Understand Internet is important. But adverse to regulation, must have real evidence of harm. Don't want to stifle innovation.

Q: "Where do you think the burden lies for protecting information. American's must show harm? Or burden on Government that there's a justification for accessing my private information"

(McCain) Chuck – Companies always have known more about us than the government. We shouldn't have solutions seeking problems, but the opposite. Show the problem before acting.

(Obama) Dan – Increase FTC enforcement authority and budget. Too much burden on individuals to negotiate their privacy rights with whoever they deal with. Though our privacy laws are more modest than others, we've seen progress in our regulation. It's not up to normal people to protect their personal security. That's unreasonable. We don't have the time, energy, or (sometimes) capability.

Q: [my question] "Does your candidate realize the problem of Congress creating laws that over-rule stronger state laws that protect our privacy and freedom and would they have the balls to veto such a law?"

(McCain) Chuck – Clearly recognizes the importance of federalism. Always the rub whether what you have is well intentioned preemption or something else. Not the campaign's policy to over-turn what approaches of 3 centuries of preemption law. In other words, leave it to congress to make the determination of what is an appropriate level of preemption.

(Obama) Dan – No general position on preemption, but it's a right thing to keep an eye on. In other areas the benefit of some mount of federalism, but preemptive will come up. Depends on context.

Summary

This affirms in my mind that Obama is far beyond McCain in understanding privacy and technology issues. Obama wants to undo some of the damage Bush has done to us in recent years and is aware that regulatory agencies are valuable. He even believes in passing laws BEFORE there's a critical breakdown.

McCain is a fool that believes the market can regulate itself.

Tags:

Computers, Freedom, and Privacy Conference of 2008 – Coming Soon!

(Image used under: Fair Use doctrine)

I'm really jazzed about going to this conference. They've got some really cool events lined up like:

Hate Speech and Oppression in Cyberspace
Kids taunting classmates (with resulting emotional scars and even suicide); harassment, stalking, and death threats; and organized and race-, gender-, religion-based hate groups; prominent bloggers like Kathy Sierra and Blackamazon have take their blogs down after death threats or attacks ... along with all its promise and power of cyberspace, the Internet also distributes words and images of hate that often lead to real-world violence.

And

Activism and Education Using Social Network

We plan on examining several different types of social networks. Some of these networks are geared toward sending out 'news blasts' to your network of friends, while others support having a much deeper conversation about the topic at hand. Protest groups on Facebook can quickly grow to over a million people– and lead to millions demonstrating in the real world. New technology such as "causes," now available both on Facebook and MySpace, allows for fundraising and eases recruiting. Easy sharing can increase the viral spread of videos and web pages. Innovative mashups like those promoted by Netsquared with their Mashup Challenge make information and calls to action more easily available to more people. We'll survey the available functionality and describe how to use the different variants for education and activism activities, as well as giving tips on how to become part of the particlar social network community that the participant is interested in.

The program is here, but you only have a few more days to sign up so get on it!

Tags: ,

Wikileaks Retaliates Against Scientology Threats

(Image used under: Creative Commons 3.0 [SRC])
Wikinews has learned that The Church of Scientology has warned the documents leaking site Wikileaks.org that they are in violation of United States copyright laws after they published several documents related to the Church. Wikileaks has no intentions of complying, and states that in response, they intend to publish thousands of Scientology documents next week.

Good for them! It's heartening to see that now that one well publicized organization has stood up to their bully tactics, others are following.

Tags:

Unintended Dangers of Vista

(Image used under: Fair Use doctrine)

What can happen when you become numbed to the security alerts.

Tags: , ,

“Upgrading” To XP From Vista

(Image used under: Fair Use doctrine)

A good story about a man who had terrible problems with a slow Vista computer that became so fast after downgrading to XP that it was more accurate to call it an upgrade.

Tags: ,

Online Password Checker

(Image used under: Creative Commons 2.0 [SRC])

My first thought is to be very cautious about using an online password checker to test the strength of your passwords because you might inadvertantly give away your password to a rogue site. However, this Microsoft sponsored password checker requires no logins or personal information and being that it's a fairly well-known company, chances are smaller that they would abuse the info if they even store it (which I can't imagine it being cost-effective to do so).

Tags: ,

USB 3.0 Coming

(Image is in the Public Domain)

Information about the coming USB 3 format is now available. Of course it's far faster than the previous version (about 10 times as fast), but the important nugget is that the connector is backwards compatible with USB1 and 2. That means that you can plug USB 3 devices into older systems and you can plug your old devices into USB 3 solts. That's pretty cool.

Tags:

Consumers Choose Vista over XP…. NOT!

(Image is in the Public Domain)

Ars Technica, usually a good resource for information ran this bonehead article today about how, despite the bad press, consumers are choosing Vista over XP.

Fact: Most (if not all) in-store computers are pre-installed with Windows Vista

Fact: Most standard consumers don't build their own computers

Therefore, if a normal person goes to a store to buy a computer, and all of their options are Windows Vista, Windows Vista, or, gosh maybe I'll take, Windows Vista, it follows that they'll "choose" Windows Vista. Dur

Last I checked, lack of options doesn't mean that they made any choice at all. Besides, most normal computer users would automatically assume that the newest version of an operating system is the best option because they normally are. Unless they've studied the news and/or read site like this one, they wouldn't know to steer clear.

So… My point is that the Ars article says absolutely nothing of value. Even if it were true that people were "choosing" Vista, it wouldn't mean anything.

Tags: ,

Vista Death Watch

(Image used under: Fair Use doctrine)

This is funny and informative. I didn't know that the total number of Vista machines is near the same number of Macs out there. What's that? Under 5% market pentatration? Ouch.

Tags: ,

$200 Dollar PC Sold at Walmart Appears to be a Hit

(Image used under: Creative Commons 2.0 [SRC])

Walmart has tried selling a computer based on a Linux OS before, but this time it seems to be taking. the gPC runs with very light specs (by today's standards), but becuase the system and programs require less memory and processing power, the net result is competitive with today's more beefy machines.

Personally, I'm blogging about this article just for this line alone:

Even at the low end, however, image is everything. The gPC is built using tiny components, but put inside a full-size case because research indicates that Wal-Mart shoppers are so unsophisticated they equate physical size with capability.

Ha!

Tags:

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]