Monday, June 15, 2009
Blog #5: Privacy and the License Branch / REAL ID
With the talk of privacy this week and digital footprints, I found an article that connects this problem with government agencies. This one involves driver's licenses and how your information (digital footprints) can be used to track you wherever you go. When you go to the BMV to renew or get a new license, you are subjected to a process where your picture is taken, as usual, but your facial features are "read" and then documented as part of your digital footprint. Most of you already know this, but what we might not know is that in states like Pennsylvania, that data could be gleaned from the dirver's licence when used to enter certain places, like bars, to prove identity.
The article examines the repurcussions of allowing the state to gather this information into a collective database, where your digital footprint could also include scans of your birth certificate and SS card. In effect, it turns your driver's license into a national ID card, which the government calls REAL ID. According to the article, all states have to submit individual information to the governmnet by the end of this year into a "single, national database." The information could also include what is called biometric data (fingerprints, eye scans, and radio identification chips used for passports).
According to lawmakers who are addressing this issue, "The potential for abuse is absolutely horrendous," and "The more information you put in one spot, the more vulnerable it is and the more likely it will be compromised." They continued, saying, that "people attending any public gathering could be required to scan their cards, giving organizers access to Social Security numbers, birth dates and even facial features."
I didn't know about the REAL ID program until this story. But I think it has a great deal to do with how my picture was taken when I renewed by driver's licence this year. I couldn't smile if I showed my teeth and all hair had to be off of my forehead. No glasses, either. I was told that it was in order for my face to be able to be recognized using certain "points". When I asked why it was being done this way I was told the truth: that it is a better way to identify you if we need to. I didn't ask who the "you" was. Scary.
More info:
REAL ID by Wikipedia:
http://en.wikipedia.org/wiki/REAL_ID_Act
Here's the DHS take on it:
http://www.dhs.gov/xprevprot/programs/gc_1200062053842.shtm
Full Story:
IS LOSS OF PRIVACY IN THE CARDS?:
http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,cookie,url,uid&db=krh&AN=2W62W62819703127&loginpage=Login.asp&site=ehost-live&scope=site
Wednesday, June 10, 2009
Blog Posting #4 for Week of June 10th
The article states that, "As the basis for the suit, the ACLU invoked both a federal statute enabling the direct federal-court enforcement of constitutional rights – here, First Amendment rights – and the Equal Access Act, which grants public high school student groups a right to equal access to school resources. "
See more information about the Equal Access Act here:
http://www4.law.cornell.edu/uscode/20/4071.html
Other Tennessee school districts have unblocked the pro-LGTB sites, and since the filtering company's software could block pornography sites separately, there was no argument that the school systems could make for inadvertent access to sexual content. It was also a clear case of "viewpoint censorship" since the anti-LGTB sites were not blocked. It was mentioned in the article that school districts in Indiana had also unblocked the pro-LGTB sites. I wonder if that's the case. If anyone who reads this wants to respond about whether they know if their school district still blocks LGTB sites? The filtering company, called ENA services, still offers the blocking filter to districts that want it. The ACLU might be interested to know if anyone has evidence that their district blocks pro-LGTB sites.
Here is the full Article:
http://writ.news.findlaw.com/hilden/20090605.html
Wednesday, June 3, 2009
Blog #3 for Week of June 3
The man in charge of the ACMA (Australia Communications and Media Authority) refuses to accept any advice against his plan to try and block over 1300 sites. I don't know the political structure of Australian government, but there doesn't seem to be the checks and balances that exist here. This man, Senator Steven Conroy, began his campaign to filter the Internet under the auspices of blocking child pornography websites.
The ACMA now has a "secret blacklist" of websites it intends to block using some sort of classification code which is not fully explained in the article. Suggestions by others with cooler heads include an education program to raise awareness of Internet supervision by parents. Another individual implied that the "scheme" couldn't work due to child porn being transferred from peer-to-peer networks that are encrypted (same technology as the X-netters).
Piggy-backing on my last posting, I can't help but wonder if our government will try to do something similar after Obama appoints the Cyber Czar. First, the military is the reason for the need for more control over privacy. After a couple of years of acceptance, what will they try next? The Patriot Act and the DHS are imposing enough, now we have the Czar. The trifecta of ....what should we call it?
Link to Full Story:
http://www.msnbc.msn.com/id/30998004
Saturday, May 30, 2009
Blog Posting #2 for Week of May 27
"It's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation," Obama said, adding, "We're not as prepared as we should be, as a government or as a country."
Created mainly to protect national security and the economic sector, the office of cyber security will allow the government unprecedented access to monitoring computer networks. Although Obama promises to keep the office tight and in his control, can he really guarantee that this step is not the first towards the Big Brother society depicted in the novel 1984? With the grid in place, how easy would it be to expand influence over private Internet access during a time of war or terrorism? If the infrastructure is in place, what's to stop inacting the Partiot Act to include the monitoring of individual access in the name of national security? Who decides what that is, anyway?
Accoding to the story Obama "... made it clear that the new cyber security effort will not involve any monitoring of private networks or individual e-mail accounts. The Internet, he said, should remain open and free."
I'm beginning to wonder about that. Maybe Little Brother is starting to get to me a little bit. Oh, and by the way, what part will the DHS play in this office?
Link to the full story:
http://www.msnbc.msn.com/id/30998004/
The 5-Point Plan:
http://projects.newsobserver.com/under_the_dome/obamas_five_point_security_plan
The White House Blog:
http://www.whitehouse.gov/CyberReview/
Friday, May 22, 2009
Blog Posting for week of May 20th
This past week, one of the topics we've been discussing is challenged books. I found something interesting about challenges and self censorship.
In an article by Paul McMasters for the First Amendment Center, he exalts libraries as the last bastions of first amendment rights, where other institutions who are supposed to be protecting these rights are failing. Even though Mr. McMasters is referring to the library itself, where does the library board of trustees fit into his scenerio? What happened here is kind of the ultimate in self censorship. The FTRF, the OIF and the Library Bill of Rights all support the patron's right to choose. In particular, if that right is taken away, then according to the Library Bill of Rights, the library "should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment."
In Gulfport, Miss., the Jackson-George Regional Library System board of trustees banned Jon Stewart's book, "America (The Book): A Citizen's Guide to Democracy Inaction", because it showed Supreme Court Justice's faces on naked bodies, showing full frontal nudity. As a result of the ban, the board received significant criticism from people both locally and out of state, and it reversed it's decision. Evidently, they discovered that reading a book is a lot like watching TV. If you don't want to read it or watch it, choose something else. The following is a direct quote from the article: "We have come under intense scrutiny by the outside community," said David Ables, board chairman. "We don't decide for the community whether to read this book or not, but whether to make it available."
My opinion is that a board of trustees is set up to protect the organization that it represents, and is bound by the same tenents as the organization itsef, in this case the eight libraries of the Jackson-George Regional library system. It is a form of self censorship to, in effect, challenge the book that they are bound to protect based on the Library Bill of Rights. In this case, the board censored it's libraries, and then reconsidered its own decision (challenge) and reversed the ban.
References
McMasters, Paul K.. "firstamendmentcenter.org: Libraries & First Amendment in Speech - Overview." firstamendmentcenter.org: Welcome to the First Amendment Center Online. 22 May 2009