Truth v. Privacy: Colbert on Murdoch

Stephen Colbert offers some brilliant word smithing on the Rupert Murdoch privacy scandal. He cites a former editor of Murdoch’s News of the World, Paul McMullan:

I’ve always said that I’ve just tried to write articles in a truthful way and, you know, what better source of getting the truth is to listen to someone’s messages.

Then Colbert follows the advice and offers exclusive access to Rupert Murdock’s messages.

This thing’s got out of control! I’m Australian for F@#$ed!

Incident Debt Visualization

Interesting visualization chart from clarified networks.

…the horizontal axis represents time (the beginning of March in the left, the end of June in the right) and the vertical axis represents the count of new incidents that appeared to do something nasty at that point of time. One bar is about two days, one line through the the vertical axis is about 1000 incidents. Now, when the animation starts going, you can see how unhandled incidents (red color) are detected and then turning into handled ones (grey). In the end we also show the cumulative amount of work still left at each point of time. Sort of “incident debt”, if you will.

The information conveyed looks more like a work flow queue for a service than a security illustration. What does it mean when an incident is “unhandled”? No response or no solution? Maybe that’s why they call it a “debt” — they’re representing service workloads for security but it could just as easily be any service ticket. It’s the basic difference between items completed and those still being worked on.

Also, each incident appears to have an equal value of debt, which seems unrealistic. Or maybe not all incidents are equal units. Hard to tell. Bouncing lines are a compelling animation but much more interesting would be workload relative to risk. Then workload relative to risk relative to source could be seen. In other words, where are the highest risk incidents and what percentage of resources (number of resources and length of time) do they consume (versus low risk incidents)?

SB 914 or leave your cell phone at home

When I was last in Rio de Janeiro, Brazil I had two cell phones. One I kept with me during the day and in safe areas. The other was a cheap old one with no data and no logs that I could use at night and in areas where I was uncertain about losing control of portable electronic devices that I carried. This was normal practice in Rio. Californians may find themselves facing a similar situation for different reasons.

The recent California Supreme Court decision on cell phone searches means a law enforcement officer can review all information on an electronic device as part of an arrest, including call logs and messages. It is now argued that warrantless search has been legalized in California — a cell phone can be searched without the need for criminal charges filed or to prove relevance to an arrest.

The California Supreme Court, in People v. [Gregory] Diaz, 51 Cal.4th 84 (2011), held that the information in these [portable electronic] devices may be subject to search incident to an arrest without a warrant or other judicial supervision.

An arrestee already could be searched by law enforcement under circumstances of officer safety and to protect evidence against destruction. However, contents of memory and disk, such as with cell phones, generally were not included in the search.

Prior to the California Supreme Court decision a warrantless search of electronics during an arrest was widely believed to be prohibited by state constitutional privacy protections in the public access “Shield Law” and in conflict with penal code 1524. Also, other state supreme courts (Ohio) have ruled specifically that cell phone searches require a warrant while Federal law enforcement agencies follow a protocol that require a warrant for cell phone searches.

Senate Bill 914 subsequently was introduced (updated July 1, 2011) in an attempt by the state legislature to clarify that portable electronic devices only can be accessed with a warrant, except in circumstances of an immediate threat to public safety or to an arresting officer.

It is the intent of the Legislature in enacting Section 1542.5 of the Penal Code to reject as a matter of California statutory law the rule under the Fourth Amendment to the United States Constitution announced by the California Supreme Court in People v. Diaz. The Legislature finds that once in the exclusive control of the police, cellular telephones do not ordinarily pose a threat to officer safety. The Legislature declares that concerns about destruction of evidence on a cellular telephone can ordinarily be addressed through simple evidence preservation methods and prompt application to a magistrate for a search warrant and, therefore, do not justify a blanket exception to the warrant requirement. Moreover, good forensic evidence practice supports the use of search warrants to obtain information contained in a cellular telephone seized incident to arrest. Except as otherwise stated in this section, it is not the intent of the Legislature to curtail law enforcement reliance on standard established exceptions to the warrant requirement.

SB 914 last week passed the Assembly Public Safety Committee with a 5-0 vote.

Nietzsche at DefCon19

Friedrich Nietzsche will be showing up in two presentations at DEFCON this year. Last month I offered a translation of his Aphorism 146 from Jenseits von Gut und Böse (1886):

He who fights with monsters must see to it that he does not thereby become a monster. And if you look for long into an abyss the abyss also looks into you.

Not everyone agrees on the translation, obviously. Here are the talk titles.

  • “Whoever Fights Monsters…” Confronting Aaron Barr, Anonymous, and Ourselves
  • Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence

The philosopher argued that it takes courage and strength to live authentically, to find a path to follow of ones own choosing rather than follow the groups and organizations that offer an “escape”.

He exaggerated his case to make a point but it still seems to have survived. Will be interesting to see if the presenters try to reconcile his harsh critiques of patriotism and regulation, or even his critique of the environment in which they are presenting.