Archive for re-post

“Intimate supervision”: Surveillance on campus

This Washington Post report – holy crap:

Short-range phone sensors and campuswide WiFi networks are empowering colleges across the United States to track hundreds of thousands of students more precisely than ever before. Dozens of schools now use such technology to monitor students’ academic performance, analyze their conduct or assess their mental health. …

Instead of GPS coordinates, the schools rely on networks of Bluetooth transmitters and wireless access points to piece together students’ movements from dorm to desk. One company that uses school WiFi networks to monitor movements says it gathers 6,000 location data points per student every day.

School and company officials call location monitoring a powerful booster for student success: If they know more about where students are going, they argue, they can intervene before problems arise. But some schools go even further, using systems that calculate personalized “risk scores” based on factors such as whether the student is going to the library enough.

The dream of some administrators is a university where every student is a model student, adhering to disciplined patterns of behavior that are intimately quantified, surveilled and analyzed.

cross-posted from nocontest.ca

h/t Clarissa

Simpleness

My recipe for making people happy:

  • Tell parents that their infant is beautiful.
  • Tell neighbours that their dog is beautiful.
  • Tell children that their bikes are fantastic.

Facebook friends append some ingredients to my recipe:

  • Little kids also like to know that you love their sneakers.” (thanks to S.M.)
  • Also, tell them their lemonade is good. Buy a second cup.” (thanks to @bfwriter)

My prodigal URL

When I moved to Vancouver in 1996, I became a communications specialist for public and private companies mostly headquartered in this city. I wrote management discussions for annual and quarterly reports, literally hundreds of news releases, and lots of material for online audiences in chatrooms on Usenet and elsewhere. With a couple of partners, I also created two or three dozen websites for clients; these were among the first in their industries.

Part of the fun of these latter projects was registering not just appropriate domain names for these companies, but other URLs that *might* be appropriate for them one day. On top of that, we made sure to register domain names that could possibly be confused for those our clients used, so that their competitors couldn’t get ahold of them for the purpose of confounding investors and regulators.

I thus spent a fair amount of capital collecting URLs, mostly for clients and potential clients but also for many for my own endeavours. This week I learned that I almost lost one – PigeonPark.net (used for various literary projects) – that I have had for 15 or so years. (Its expiration notice landed in my spam folder – yikes!) With the help of my friends at Uniserve Communications (which hosts most of my websites), I saved it in the nick of time – whew!

Here’s a blast from the past, from when I first announced the site on basil.CA:

16 August 03:  In You Don’t Look 35, Charlie Brown! the late Charles M. Schultz writes, “There must be different kinds of loneliness, or at least different degrees of loneliness. …  The most terrifying loneliness is not experienced by everyone and can be understood only by a few.  I compare the panic in this kind of loneliness to the dog we see running frantically down the road pursuing the family car.  He is not really being left behind, for the family knows it is to return, but for that moment in his limited understanding, he is being left alone forever, and he has to run and run to survive.  It is no wonder that we make terrible choices in our lives to avoid loneliness.”

Comix artist Seth illustrates these words in a remarkable series of panels called “Good Grief!” published in Drawn and Quarterly (Volume 2, Number 4).  I came across these panels many years ago and have been looking for them ever since, locating them in my disorganized files only this morning.  I now realize that my Pigeon Park Sentences were variations on Schultz’s theme, that I could not have even started without its echo in my imagination. 

“It is no wonder that we make terrible choices in our lives to avoid loneliness.”

If you can’t exaggerate …

The renowned and divisive Hungarian-American physicist Edward Teller would tell this little story about an exchange he had with the great Niels Bohr:

Some of us, including Bohr, were having a discussion about the spectrum and states of molecular oxygen. Bohr had some opinions, the details of which I have now forgotten, but which were in obvious conflict with the facts that were known. In this special detailed case, I knew the situation and tried to explain it. Unfortunately I could not do so to Bohr’s satisfaction.

He began his objection: “Teller, of course, knows a hundred times more about this than I.” With a lack of politeness occasionally seen among twenty-year-olds, I interrupted (with some difficulty): “That is an exaggeration.”

Bohr instantly stopped and stared at me. After a pause, he declared, “Teller says I am exaggerating. Teller does not want me to exaggerate. If I cannot exaggerate, I cannot talk. All right. You are right, Teller. You know only ninety-nine times more than I do.” He then proceeded with his original argument having dispensed with any possibility of further interruption.

I have never forgotten, nor have I often neglected to mention, Bohr’s wisdom: *If you cannot exaggerate, you cannot talk.*

This is one of my favourite stories. (I’m with Bohr, surprise.)

Saving your name

The “Naked Security” blogs published by Sophos remind me how vigilant online publishers – and all organizations, really – have to be to protect their content, their data, even their names. Indeed, the word “vigilance” needs to at the top of our whiteboard every day – and never erased.

When I moved to Vancouver in 1996, I saw that almost no small-cap companies in the exploration and mining business had online presences. This was a good business opportunity. I knew my way around the Internet – coming from Stanford, you had to be – but hadn’t created websites myself. I found a couple of partners who did, and we found a bunch of clients right away.

The first order of business was registering URLs for each client. This typically involved registering four or five: client.com, client.net, clientresources.com, clientresources.net, and clientinvesting.com, for instance. We wanted to make sure that we covered the bases, so to speak. We would use the main URL and make sure that the others “pointed to” the main one.

For a couple of years, on the Internet there was the equivalent of the 19th-century American land rush. Promoters, IT whizzes, managers, communications pros, publishers, inventors, entrepreneurs – everybody, it seemed to me – were staking out their claims to URLs, in essence buying names and making them their own. Whether or not these names were used for actual websites, for some it was just as important that their competitors *didn’t* have these names.

I have a spreadsheet to make sure that I never forget to re-register the “stable” of URLs I own or manage (a few dozen). Two times I missed a deadline; I lost one URL (this still bugs me, as you can imagine) and *miracle of miracles* I got the other one back.

Forgetfuless is one way to lose control of your URL. Having it stolen is another. The other day Sophos blogger John E Dunn published an article called “US gov issues emergency directive after wave of domain hijacking attacks.”

The US Department of Homeland Security (DHS) has issued an emergency directive tightening DNS security after a recent wave of domain hijacking attacks targeting government websites. …

Domain hijacking has been a persistent issue in the commercial world for years, a prime example of which would be the attack that disrupted parts of Craigslist in November 2014.

In that incident, as in every successful every domain hijacking attack, the attackers took over the account used to manage the domains at the registrar, in this case, Network Solutions.

The objective is to change the records so that instead of pointing to the IP address of the correct website it sends visitors to one controlled by the attackers.

This change could have been made using impersonation to persuade the registrar to change the domain settings or by stealing the admin credentials used to manage these remotely. …

Dunn recommends that you verify your company’s IP addresses and “change passwords on all accounts used to manage domain records.” Read his entire post for a longer list of important safeguard measures.

Reposted from nocontest.ca