Andrew O’Hagan’s London Review of Books essay on the Wikileaks founder Julian Assange is quite something. Hired to ghostwrite Assange’s autobiography, O’Hagan spent many months with the hacker while he was on bail and living in a country house in Norfolk. The essay describes Julian Assange’s erratic, selfish and sometimes delusional personality that caused the book project to wither.
I’ve heard some people call the essay ‘a hatchet job’ but it is more subtle than that. The piece seethes and scathes, but I don’t detect a sneer or anything to suggest that it seeks to pull Julian Assange down a peg.
Rather, its a literary catharsis. O’Hagan is a man squeezed between the exasperating Assange and the bolshy publisher Jamie Byng, a position he clearly finds deeply uncomfortable. The story reads as incredibly sincere, which also makes it credible and compelling.
There’s no doubt that O’Hagan’s essay zips up the body bag on Assange’s already brutalised reputation. His protagonist (for, by the end, Assange has become a character, a ‘cipher’) is unquestionably the author of his own downfall. Nevertheless, there remains a certain unease in the fact that this essay has been published in the same week as some more damning revelations about the practices of GCHQ.
Writing on First Look Media’s Interceptor blog, Glenn Greenwald (the journalist who took receipt of Edward Snowden’s cache of NSA documents) exposes the paychological techniques deployed by our the security services. His article is titled ‘How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations’ and presents leaked GCHQ slides that describe the techniques used by JTRIG (Joint Threat Research Intelligence Group). The group allegedly deploys techniques developed by behavioural scientists to break up political groups that they perceive to be a threat to national security. They use agents provocateurs, False Flag operations, and even ruin business and personal relationships through the hacking of social media and e-mail accounts. ‘Honey Traps’ are also mentioned.
Its impossible to know which, if any, of these techniques have been used against Wikileaks and Julian Assange, but I don’t think it would be particularly outlandish or paranoid to imagine that the group have been the target of this sort of action. I don’t know how the public, and targets of such covert government attacks, can counter the misinformation… But I do know that Assange’s chaotic response, and his decision to avoid the chance to clear his name, is not the way to go about it.
Protect whistleblowers to protect the leaks
If O’Hagan’s account is to be believed (and the hours of tape recordings lends weight to his account) then Julian Assange is actually quite careless with the sensitive data he handles. In an op-ed in the Independent, my colleague Mile Harris points out that this is a reason to protect and encourage whistleblowers. Far better that those who handle leaked information treat it with care. By aggressively prosecuting the act of whistleblowing, we ensure that future leakers are likely to be in the Assange mould—unreliable and careless.
This is my offering for Blog Action Day. This year’s theme is Human Rights, so a post about surveillance and my ongoing notes on ‘Everday Human Rights’ seems appropriate (if obvious).
Snowcrash is Neal Stephenson’s break-out novel. It was published in 1992, when the World Wide Web was still a nascent and obscure technology. Nevertheless, it is a remarkably prescient book that predicts the ‘always on’ internet we have today, especially the Massive Multiplayer Online Games like Second Life and World of Warcraft. It also predicts the rise of cyber-attacks and the need for security in this area.
However, the passage that has stuck in my mind since I read the book a few years ago is an amusing piece of ‘world building’ that Stephenson constructs around one of his minor characters. Through the morning of ‘Y.T.’s Mom’ he describes the oppressive atmosphere of having to live and work under constant surveillance. Continue reading “Surveillance in Snowcrash”
How should a parents keep tabs on their kids?
On the technology site GigaOM, Matthew Ingram has posted two of a series of three articles about his “experiences of snooping on my kids and their online behaviour over a period of years.” He installed a ‘keylogger’ on his daughter’s computer everything she typed was e-mailed to him. When he confessed this to friends, they were shocked.
Is such parental behaviour justified? Children have fewer civil rights than adults (they cannot get married or vote) and its unreasonable to expect that they enjoy the same level of privacy as an adult – Parents should be aware of their medical conditions, for example. However, the transition from childhood, to the place where you take responsibility for yourself, is long and grey (see a previous post where I recommended aligning the age of religion with the age of consent).
When teenagers are concerned, NSA-style eavesdropping feels creepy. I think having secrets is part of what makes us a rounded and mature human being, and accepting that there are things that you do not know about your child is part of the parental process of ‘letting go’. However, much of their discourse takes place in public and semi-public social media spaces. It is less creepy to register an account and ‘follow’ a tween’s online discussions. I think that even doing so under an alias would be acceptable. What better illustration of the pitfalls in online discourse can there be, than discovering that the kid with the cat avatar you’ve been discussing Zac Efron with, was actually Your Mum?! Continue reading “Is parental snooping the alternative to censorship?”
I have been away this week and unable to write anything on the PRISM revelations that have dominated the news over the past few days. Here are a few notes and links in lieu of something more rounded.
At ORGcon, I did preface my remarks during the ‘free speech online in the UK’ panel to note that the right to free speech includes the right not to be surveilled. If you think your conversations are being monitored, then you are not going to speak as freely as you may wish. (I will post a longer reflection on the ORGcon discussion soon).
This week I did read an article by Daniel Solove in the Chronicle of Higher Education which summarises variations on the “if you have nothing to hide you have nothing to fear” argument for surveillance. It’s obviously extremely relevant given recent revelations surrounding the US Government’s PRISM programme.
Solove’s article is a frustrating read, because the arguments against surveillance are, like many human rights issues, bound up in ‘slippery slope’ or ‘boiling frog’ concepts that tend not to resonate with ordinary people. Public interest (and outrage) at privacy invasions only occur when rare real-life examples manifest themselves, as when the damage has already been done (the hacking of Milly Dowler’s mobile phone being the prime example). Liberally minded people who oppose surveillance and privacy intrusions on principle need more sound-bites to compete with “if you have nothing to hide you have nothing to fear”. Solove lists a few candidates – “Why do you have curtains, then?” is probably the best retort. Continue reading “Notes on PRISM, privacy and surveillance”