September 20, 2015
Violation of Home and Person
What can be more frightening and violating?
A home is one's castle and sanctuary--that is where we go for shelter, safety, and unconditional love.
When the the home space is violated, then fear and panic ensue as all bets are off to what can happen to everything one loves and holds dear.
Think of basically any scene where the ancient city walls are being broached by a marauding army, and you'll immediately see men, women, and children running and screaming, but alas the city burns and the people are doomed at the hand of their invaders.
Similarly, when people are followed or suffer a home invasion--their privacy and security is violated to the core--and they easily become victims of theft, rape, and assault.
I remember when growing up in New York how one local neighborhood kid was followed home one day by a gang, and they started beating him in front of his home until some neighbors came and chased the attackers away.
But it didn't end there, because this kid was vulnerable for months afterward, not knowing if and when the attackers would return for more.
It's like when people threaten someone and say, "I know where you live!"
That puts the fear of G-d into people, because it's not only themselves, but their home and family at mortal risk--and not knowing when or how it may happen...people can just piss their pants.
The opposite is true as well, people tend to be big shots and aggressive when they feel they are anonymous--when their faces are covered by masks, and they have no identifiable insignias--you don't know who they are or where they are from.
With anonymity, people feel they can do what they want without fear of reprisal.
But someone who can be identified, they better behave themselves, because they can be found afterwards and "made to pay" for the bad things they did.
Ultimately, peace comes from having both safety in the home and the serenity of mind that comes with not having to look over your shoulder all the time.
Everyone should be able to feel safe in their homes and neighborhood, and the attacker be caught, killed, or damned. ;-)
(Source Photo: Andy Blumenthal)
May 17, 2013
Giving Voice to The Workers
A former Department of State employee, Kohl Gill, who I do not know, started the service.
LaborVoices collects information from workers by phone polling in the workers native languages.
The service anonymously records information about hazardous working conditions, product quality, and maintenance of equipment.
According to Bloomberg BusinessWeek (13 May 2013), LaborVoices aggregates worker responses and provides the results on a subscription basis through an online dashboard.
Unlike with onsite inspections, where workers can be easily coaxed, cajoled, or threatened to provide positive workplace feedback, the private polling by mobile phones provides for more accurate and timely reporting of workplace issues.
Problems that can be identified early can be remediated sooner and hopefully avoid defects, injuries, and illnesses from poor products and working conditions.
Giving voice to the workforce--anonymously, safely, and in aggregate can provide important information to companies, labor unions, government regulators, and law enforcement to be able to take action to protect people inside the workplace and to users outside.
Like an ever-present inspector general, internal auditor, or tip hotline, LaborVoices can help self-regulate industry, produce safer products, and protect the workers who make it all happen.
(Source Photo: here with attribution to UN Women Asia and The Pacific)
Giving Voice to The Workers
August 20, 2011
Social Media: Closer Together or Further Apart?
Social Media: Closer Together or Further Apart?
June 14, 2009
Architecture of Freedom
In the United States, we have been blessed with tremendous freedom, and these freedoms are enshrined in the Constitution and Bill of Rights. However, in many countries around the world, people do not share these basic freedoms and human rights.
Now in many countries, the limitation and subjugation of people has extended from the physical to the virtual world of the Internet. People are prevented through filtering software from freely “surfing” the Internet for information, news, research and so forth. And they are prohibited from freely communicating their thoughts and feelings in email, instant messages, blogs, social networks and other communications media, and if are identified and caught, they are punished often through rehabilitation by hard prison labor or maybe just disappear altogether.
In fact, many countries are now insisting that technology companies build in filtering software so that the government can control or block their citizen’s ability to view information or ideas that are unwanted or undesirable.
Now however, new technology is helping defend human rights around the world—this is the architecture for anonymity and circumvention technologies.
MIT Technology Review (May/June 2009) has an article entitled “Dissent Made Safer—how anonymity technology could save free speech on the Internet.”
An open source non-profit project called TOR has developed a peer to peer technology that enables users to encrypt communications and route data through multiple hops on a network of proxies. “This combination of routing and encryption mask a computer’s actual location and circumvent government filters; to prying eyes, the Internet traffic seems to be coming from the proxies.”
This creates a safe environment for user to browse the Internet and communicate anonymously and safely—“without them, people in these [repressive] countries might be unable to speak or read freely online.”
The OpenNet Initiative in 2006 “discovered some form of filtering in 25 of 46 nations tested. A more current study by OpenNet found “more than 36 countries are filtering one or more kinds of speech to varying degrees…it is a practice growing in scope, scale, and sophistication.”
Generally, filtering is done with some combination of “blocking IP addresses, domain names… and even Web pages containing certain keywords.”
Violations of Internet usage can result in prison or death for treason.
Aside from TOR, there are other tools for “beating surveillance and censorship” such as Psiphon, UltraReach, Anonymizer, and Dynaweb Freegate.
While TOR and these other tools can be used to help free people from repression around the world, these tools can also be used, unfortunately, by criminals and terrorists to hide their online activities—and this is a challenge that law enforcement must now understand and contend with.
The architecture of TOR is fascinating and freeing, and as they say, “the genie is out of the bottle” and we cannot hide our heads in the sand. We must be able to help those around the world who need our help in achieving basic human rights and freedoms, and at the same time, we need to work with the providers of these tools to keep those who would do us harm from taking advantage of a good thing.
Architecture of Freedom