<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Social Network Constitution - Blog]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog]]></link><description><![CDATA[Blog]]></description><pubDate>Wed, 26 Jun 2024 00:54:23 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[WHEN YOUR CAR SPIES ON YOU]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/when-your-car-spies-on-you]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/when-your-car-spies-on-you#comments]]></comments><pubDate>Tue, 14 Apr 2015 19:53:32 GMT</pubDate><category><![CDATA[data aggregation]]></category><category><![CDATA[gps]]></category><category><![CDATA[privacy]]></category><category><![CDATA[technology]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/when-your-car-spies-on-you</guid><description><![CDATA[Cars are getting smarter.&nbsp; Some can show you a video of what is behind you to help you park in a tight spot.&nbsp; Others can automatically apply the brakes if you are about to run into the car in front of you.Now cars have a new power.&nbsp; They can snitch to an insurance company about your driving.&nbsp;&nbsp; A tracking device can be installed in your car to monitor how and when and how far you drive.&nbsp; Progressive and other insurers offer discounts on car insurance to drivers based [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Cars are getting smarter.&nbsp; Some can show you a video of what is behind you to help you park in a tight spot.&nbsp; Others can automatically apply the brakes if you are about to run into the car in front of you.<br /><br />Now cars have a new power.&nbsp; They can snitch to an insurance company about your driving.&nbsp;&nbsp; A tracking device can be installed in your car to monitor <a href="https://www.progressive.com/auto/snapshot-common-questions/" style="" target="_blank" title="">how and when and how far</a> you drive.&nbsp; <a href="http://www.chicagotribune.com/business/breaking/ct-progressive-aggressive-surcharge-0330-biz-20150327-story.html" style="" target="_blank" title="">Progressive</a> and other insurers offer discounts on car insurance to drivers based on data from such devices.&nbsp; <br /><span style=""></span><br />Do you accelerate sharply, corner too closely, travel at night or drive great distances?&nbsp;&nbsp; Those traits can be <a href="http://www.chicagotribune.com/business/breaking/ct-progressive-aggressive-surcharge-0330-biz-20150327-story.html" style="" target="_blank" title="">used against you</a> and prevent you from getting a discount.&nbsp; But many of those factors are beyond your control.&nbsp; If your job requires you to work in the evening, why should you be penalized by your insurer?&nbsp; <br /><span style=""></span><br />Most insurers&rsquo; devices are installed in the data port of car, under the drivers&rsquo; side of the dashboard, which limits their use to cars sold after 1998.&nbsp; But the Canadian insurer Desjardins uses a mobile phone app, <a href="http://www.ajusto.com/frequently-asked-questions/application.html" style="" target="_blank" title="">Ajusto</a>, that doesn&rsquo;t even need to be installed in the car. &nbsp;But phone apps raise additional issues.&nbsp; Nothing prevents an insurer from matching data from the phone driving app with other information.&nbsp; Nearly two-thirds of smartphone owners <a href="http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/" style="" target="_blank" title="">look up health information</a> on their devices.&nbsp; What if you&rsquo;ve done a Google search for the side effects of an allergy medication?&nbsp; The insurer might take that to mean you are using the medication while driving, despite the drug&rsquo;s warnings about drowsiness.&nbsp;&nbsp; <br /><span style=""></span><br />Who else will ultimately get the driving information?&nbsp; &nbsp;Will the police want to know who is driving faster than the speed limit?&nbsp; &nbsp;As a phone app, Ajusto can tap into location information.&nbsp; Will spouses and employers want to know where the driver has been?&nbsp; Already, information from toll passes has been used as evidence in criminal cases and divorce cases.&nbsp; If you get into an accident while using Progressive&rsquo;s Snapshot device, Progressive will <a href="https://www.progressive.com/auto/snapshot-privacy-statement/" style="" target="_blank" title="">turn over</a> their information about your driving style and history to the court. <br /><span style=""></span><br />These programs to reward safe drivers might actually lead to more accidents.&nbsp; A friend who used the Progressive device heard a series of beeps from his car if he <a href="https://www.progressive.com/auto/snapshot-common-questions/" style="" target="_blank" title="">braked too quickly</a>.&nbsp; The only way to avoid the beeps was to stay four car lengths behind the car in front of him, but that meant other cars were constantly swerving in front of him.&nbsp; It also greatly increased the chance of his being rear-ended.&nbsp; <br /><span style=""></span><br /><span style=""></span>  The tracking devices for cars are touted as a way to save you money.&nbsp; But the data they collect can be used against you.&nbsp; Progressive <a href="http://www.bloomberg.com/news/articles/2015-03-24/progressive-to-charge-risky-snapshot-drivers-more-in-new-plan" style="" target="_blank" title="">announced</a> that it will start charging higher rates to drivers who volunteer to use its Snapshot device, but whose driving does not measure up.&nbsp; Courts can order that you turn over your driving information to someone who sues you.&nbsp;&nbsp; Tracking devices have real risks. What you might save in premiums, you&rsquo;ll lose in privacy.&nbsp;&nbsp;<br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[PROPOSED CHICAGO DATA SENSORS RAISE CONCERNS OVER PRIVACY, HIDDEN BIAS, Guest Blog by Michael Holloway and John McElligott]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/proposed-chicago-data-sensors-raise-concerns-over-privacy-hidden-bias-guest-blog-by-michael-holloway-and-john-mcelligott]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/proposed-chicago-data-sensors-raise-concerns-over-privacy-hidden-bias-guest-blog-by-michael-holloway-and-john-mcelligott#comments]]></comments><pubDate>Thu, 26 Jun 2014 17:36:55 GMT</pubDate><category><![CDATA[data aggregation]]></category><category><![CDATA[government]]></category><category><![CDATA[privacy]]></category><category><![CDATA[technology]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/proposed-chicago-data-sensors-raise-concerns-over-privacy-hidden-bias-guest-blog-by-michael-holloway-and-john-mcelligott</guid><description><![CDATA[Beginning in mid-July, Chicagoans may notice&nbsp;decorative metal boxes&nbsp;appearing on downtown light poles.&nbsp;&nbsp;They may not know that the boxes will contain sophisticated data sensors that will continuously collect a stream of data on &ldquo;air quality, light intensity, sound volume, heat, precipitation, and wind.&rdquo;&nbsp;&nbsp;The sensors will also collect data on nearby foot traffic by counting signals from passing cell phones.&nbsp;&nbsp;According to the&nbsp;Chicago Tribune [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Beginning in mid-July, Chicagoans may notice&nbsp;<a href="http://articles.chicagotribune.com/2014-06-20/news/ct-big-data-chicago-20140621_1_cell-phone-data-big-data-sensors" target="_blank">decorative metal boxes</a>&nbsp;appearing on downtown light poles.&nbsp;&nbsp;They may not know that the boxes will contain sophisticated data sensors that will continuously collect a stream of data on &ldquo;air quality, light intensity, sound volume, heat, precipitation, and wind.&rdquo;&nbsp;&nbsp;The sensors will also collect data on nearby foot traffic by counting signals from passing cell phones.&nbsp;&nbsp;According to the&nbsp;<em>Chicago Tribune</em>, project leader Charlie Catlett says the project will &ldquo;give scientists the tools to make Chicago a safer, more efficient and cleaner place to live.&rdquo; Catlett&rsquo;s group is&nbsp;<a href="http://www.usatoday.com/story/news/nation-now/2014/06/24/chicago-big-data-sensors/11301333/" target="_blank">seeking funding</a>&nbsp;to install hundreds of the sensors throughout the city. &nbsp;But the sensors raise issues concerning potential invasions of privacy, as well as the creation of data sets with hidden biases that may then be used to guide policy to the disadvantage of poor and elderly people and members of minority groups.<br /><span></span><br /><span></span><strong><font size="3">Privacy</font></strong><br /><span></span><br /><span></span>Project leaders and City officials deny that the sensors raise privacy concerns.&nbsp; According to Catlett, a computer scientist, the sensors will &ldquo;count contact with the signal rather than record the digital address of each device,&nbsp;and &ldquo;information collected by the sensors&nbsp;<a href="http://www.usatoday.com/story/news/nation-now/2014/06/24/chicago-big-data-sensors/11301333/" target="_blank">will not be connected</a>&nbsp;to a specific device or IP address.&rdquo;&nbsp; Brenna Berman, the city&rsquo;s commissioner of information and technology, said that &ldquo;privacy concerns are unfounded because no identifying data will be collected.&rdquo;&nbsp; However, Alderman Robert Fioretti has<a href="http://www.chicagotribune.com/news/politics/clout/chi-alderman-wants-hearing-on-emanuel-deal-to-install-light-pole-sensors-20140623,0,5543027.story" target="_blank">called for a public hearing</a>&nbsp;on the data sensors.&nbsp; Fioretti notes that City Council was never consulted about the plan, an Emanuel administration initiative, and states that the sensors raise &ldquo;obvious invasion-of-privacy concerns.&rdquo;<br /><br /><span></span>Raising a note of skepticism about the City&rsquo;s privacy assurances, Professor Fred Cate of Indiana University&rsquo;s Maurer School of Law noted the&nbsp;<a href="http://articles.chicagotribune.com/2014-06-20/news/ct-big-data-chicago-20140621_1_cell-phone-data-big-data-sensors" target="_blank">difficulty of avoiding the collection of personally identifiable information</a>, even when protections intended to prevent the collection of personal information are in place: &ldquo;Almost any data that starts with an individual is going to be identifiable.&rdquo; &nbsp;Cate&rsquo;s statement accords with scientific research showing that, in practice, supposedly anonymous or anonymized data can in&nbsp;<a href="http://www.nature.com/srep/2013/130325/srep01376/full/srep01376.html" target="_blank">many cases</a>be&nbsp;<a href="https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf" target="_blank">reidentified&nbsp;</a>with an individual.&nbsp; Cate also raised the question of oversight: &ldquo;If you spend a million dollars wiring these boxes, and a company comes in and says &lsquo;We&rsquo;ll pay you a million dollars to collect personally identifiable information,&rsquo; what&rsquo;s the oversight over those companies?&rdquo;<br /><br /><span></span>In light of the potential privacy concerns, Dean Harold Krent of IIT Chicago-Kent College of Law noted that&nbsp;<a href="http://chicago.univision.com/videos/video/2014-06-24/censores-chicago-controversia?refPath=/videos/" target="_blank">transparency is key</a>&nbsp;in Chicago&rsquo;s operation of the sensors. The City must be clear about how many sensors there are and how they are used, and must ensure that the data captured by the sensors is easily accessible to public officials.<br /><br /><span></span><strong><font size="3">Hidden Bias</font></strong><br /><br /><span></span>Jeremy Gillula, a staff technologist at the Electronic Frontier Foundation (EFF), pointed out that the proposed system may create&nbsp;<a href="http://www.usatoday.com/story/news/nation-now/2014/06/24/chicago-big-data-sensors/11301333/" target="_blank">unintentionally biased data sets</a>.&nbsp; The proposed sensors will track contacts with signals from Wi-Fi and Bluetooth-enabled devices, but this will only reflect a subset of the overall foot traffic, since not all passers-by will be carrying devices with Wi-Fi or Bluetooth capabilities.&nbsp; In Boston, the use of a mobile app called Street Bump to track potholes in the city produced biased data because smartphone owners tended to live in wealthier areas.&nbsp; Similarly, many Tweets during Hurricane Sandy originated in the largely affluent borough of Manhattan, giving the impression that it was among the hardest-hit areas of the storm, while in fact lower-income, outlying areas such as Breezy Point, Coney Island and Rockaway were harder hit.<br /><br /><span></span>These examples reflect the fact that large datasets, while seemingly objective and abstract, are &ldquo;<a href="http://blogs.hbr.org/2013/04/the-hidden-biases-in-big-data/" target="_blank">intricately linked to physical place and human culture</a>.&rdquo;&nbsp; As the EFF has noted, &ldquo;many&nbsp;<a href="https://www.eff.org/deeplinks/2014/05/white-house-big-data-report-good-bad-and-missing" target="_blank">groups are under-represented</a>&nbsp;in today&rsquo;s digital world (especially the elderly, minorities, and the poor). These groups run the risk of being disadvantaged if community resources are allocated based on big data, since there may not be any data about them in the first place.&rdquo;&nbsp; Chicago will need to carefully validate the data collected from the proposed sensors to avoid introducing similar biases into policy and planning decisions.<br /><span></span><br /><span></span><em>Michael Holloway is a Legal Fellow at IIT Chicago-Kent&rsquo;s Institute for Science, Law and Technology.</em><br /><span></span><br /><span></span><em>John McElligott is a Research Assistant at the IIT Chicago-Kent Institute for Science, Law and Technology. He is currently studying Law in his second year at the IIT Chicago-Kent College of Law.</em><br /><span></span><br /><span></span></div>]]></content:encoded></item><item><title><![CDATA[WHY REPORTERS NEED TO LEARN CRYPTOGRAPHY]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/why-reporters-need-to-learn-cryptography]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/why-reporters-need-to-learn-cryptography#comments]]></comments><pubDate>Wed, 05 Mar 2014 16:07:12 GMT</pubDate><category><![CDATA[privacy]]></category><category><![CDATA[security]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/why-reporters-need-to-learn-cryptography</guid><description><![CDATA[      They use burner phones as they cross borders.&nbsp; They buy old Lenovo computers because there are fewer backdoors into those computers that allow surveillance.They are not spies or criminals.&nbsp; They are investigative reporters trying to get on-the-ground stories to help us understand and sometimes change our world.Last week,&nbsp;The Media Consortium&nbsp;and&nbsp;IIT Chicago-Kent College of Law&nbsp;joined forces to describe the challenges that reporters face in an era when intellig [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class='wsite-multicol-table-wrap' style='margin:0 -15px'> <table class='wsite-multicol-table'> <tbody class='wsite-multicol-tbody'> <tr class='wsite-multicol-tr'> <td class='wsite-multicol-col' style='width:70.571010248902%;padding:0 15px'>  <div class="paragraph" style="text-align:left;">They use burner phones as they cross borders.&nbsp; They buy old Lenovo computers because there are fewer backdoors into those computers that allow surveillance.<br /><br />They are not spies or criminals.&nbsp; They are investigative reporters trying to get on-the-ground stories to help us understand and sometimes change our world.<br /><br />Last week,&nbsp;<a href="http://www.themediaconsortium.org/" target="_blank" title="" style="">The Media Consortium</a>&nbsp;and&nbsp;<a href="http://www.kentlaw.iit.edu/institutes-centers/center-for-information-society-and-policy/about-cisp" target="_blank" title="" style="">IIT Chicago-Kent College of Law</a>&nbsp;joined forces to describe the challenges that reporters face in an era when intelligence agencies such as the&nbsp;<a href="http://blogs.kentlaw.iit.edu/islat/2013/06/11/nsa-spying-violates-first-and-fourth-amendments/" target="_blank" title="" style="">National Security Agency</a>&nbsp;and corporations such as Google spy on what each of us is doing on our digital devices.&nbsp; At the joint workshop, Josh Stearns of&nbsp;<a href="http://www.freepress.net/" target="_blank" title="" style="">Free Press</a>&nbsp;and the&nbsp;<a href="http://pressfreedomfoundation.org/" target="_blank" title="" style="">Freedom of the Press Foundation</a>&nbsp;reported on how many journalists had been killed and jailed in last year.&nbsp; And it&rsquo;s not just a problem abroad. &nbsp;According to the&nbsp;<a href="http://rsf.org/index2014/en-index2014.php" target="_blank" title="">World Press Freedom Index</a>, the United States has slipped to number 46 in a ranking of countries on how much freedom it gives its reporters, well below even countries such as Ghana and Uruguay. &nbsp;amalia deloney of the&nbsp;<a href="http://centerformediajustice.org/" target="_blank" title="">Center for Media Justice</a>&nbsp;described how surveillance in general disproportionately affects people of color.&nbsp; She showed a slide of a&nbsp;<a href="http://www.mag-net.org/sites/default/files/amalia_TMC_comments_media_consortium.pdf" target="_blank" title="">police tower</a>&nbsp;that one might have guessed was situated in Guatemala or another oppressive nation. &nbsp;Instead, it was in a primarily African-American neighborhood in Charlotte, North Carolina.</div>  </td> <td class='wsite-multicol-col' style='width:29.428989751098%;padding:0 15px'>  <div><div class="wsite-image wsite-image-border-thin " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/937136_orig.jpg" alt="Picture" style="width:100%;max-width:955px" /> </a> <div style="display:block;font-size:90%">Julian Assange Skyped into the TMC conference to discuss &ldquo;The Use and Abuse of Whistleblowers&rdquo; with Juan Gonzales, Democracy Now!; Gavin MacFadyen, Centre for Investigative Journalism; and Bea Edwards, Government Accountability Project.</div> </div></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/9163871.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  </td> </tr> </tbody> </table> </div></div></div>  <div class="paragraph" style="text-align:left;"><a href="http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far" target="_blank" title="">What is the NSA collecting</a> about activists, reporters and you?&nbsp; The NSA gathers the phone numbers, locations, and length of virtually all phone calls in the United States.&nbsp; It collects records of nearly everything you do online, including your browsing history and the contents of your emails and instant messages.&nbsp; It can create detailed graphs of your network of personal connections. &nbsp;It can create phony wireless connections in order to access your computer directly.&nbsp; It can intercept the delivery of an electronic device and add an &ldquo;implant&rdquo; allowing the agency to access it remotely.<br /><span style=""></span><br /><span style=""></span>  Companies, too, undertake surveillance.&nbsp; Investigative reporter&nbsp;<a href="http://www.theinvestigativefund.org/reporters/adamfederman/" target="_blank" title="" style="">Adam Federman</a>&nbsp;found that the &ldquo;American Petroleum Institute (API) paid private global intelligence firm Stratfor more than $13,000 a month for weekly bulletins profiling activist organizations and their campaigns &hellip; from energy and climate change to tax policy and human rights, according to &hellip; WikiLeaks in 2012.&rdquo; &nbsp;Federman reported that when a community group of 10 people met to screen environmental films and attend local environmental forums, a private security firm identified them as likely planning an eco-terrorism attack.&nbsp; A bulletin with the group&rsquo;s information &ndash; where and when they met, and upcoming protests &ndash; was sent to the Pennsylvania Department of Homeland Security alongside information about other groups such as Al-Qaeda affiliated groups and pro-life activists.<br /><span style=""></span><br /><span style=""></span>    When reporters cross borders, they are at increased risk of surveillance.&nbsp; As the 2013 federal district court case of&nbsp;<a href="https://www.aclu.org/free-speech-technology-and-liberty/abidor-v-napolitano" target="_blank" style="" title=""><em style="">Abidor v. Napolitano</em></a>&nbsp;showed, border agents in much of the U.S. can search, copy, and detain a U.S. citizen&rsquo;s laptop computer, cell phone, or other electronic device even when the agents have no reason to suspect any wrongdoing. &nbsp;The court held that the government had reasonable suspicion to search and detain Abidor&rsquo;s laptop because Abidor, a Ph.D. student in Islamic history, had pictures of Hamas and Hezbollah rallies on his computer, and because he possessed both U.S. and French passports.&nbsp; When the laptop was returned, evidence showed that agents had examined Abidor&rsquo;s personal files, including photos and chats with his girlfriend.<br /><span style=""></span><br /><span style=""></span>    How, then, do reporters protect themselves and sources in an era of surveillance?&nbsp; At the TMC/IIT Chicago-Kent workshop, Gavin MacFadyen<strong style="">,</strong>&nbsp;Director of the&nbsp;<a href="http://www.tcij.org/" target="_blank" title="" style="">Centre for Investigative Journalism</a>&nbsp;at University College London, warned, &ldquo;The first minute is the most crucial when the whistleblower calls a reporter.&rdquo;&nbsp;&nbsp; At&nbsp;the workshop, a group of technical experts discussed technological tools and practices that journalists can use to protect themselves and their sources.&nbsp; Eva Galperin of the&nbsp;<a href="http://eff.org/" target="_blank" title="" style="">Electronic Frontier Foundation</a> discussed threat modeling, in which a journalist or organization assesses potential threats to determine the level of protection needed.&nbsp; Threat modeling involves building a comprehensive list of people or entities who might be after information in one&rsquo;s possession (say, an opposing lawyer, the NSA, or a foreign government).&nbsp; It then considers the nature of the information to determine the tools, such as encryption, which are required to protect it.<br /><span style=""></span><br /><span style=""></span>    Once the level of threat is determined, reporters can use specific tools for defending against online surveillance. &nbsp;They can protect themselves and their sources by maintaining strong and unique passwords, detecting and avoiding fraudulent &ldquo;<a href="https://www.securelist.com/en/threats/spam?chapter=85" target="_blank" title="" style="">phishing</a>&rdquo; emails, encrypting their laptops and other electronic devices, and using two-factor log-in authentication where available.&nbsp; They can protect anonymity with&nbsp;<a href="http://www.torproject.org/" target="_blank" title="" style="">Tor</a>, a powerful tool that works by obscuring the source and destination of online communications.&nbsp; They can use tools such as&nbsp;<a href="http://www.gnupg.org/" target="_blank" title="" style="">GPG</a>&nbsp;to encrypt their emails and other communications and render them illegible to third parties.<br /><span style=""></span><br /><span style=""></span>    Journalists can also use tools such as&nbsp;<a href="http://guardianproject.info/apps/obscuracam/" target="_blank" title="" style="">ObscuraCam</a>, developed by the&nbsp;<a href="http://guardianproject.info/" target="_blank" title="" style="">Guardian Project</a>&nbsp;(unaffiliated with the U.K.&rsquo;s&nbsp;<em style="">Guardian</em>&nbsp;news organization) to remove potentially identifying data from digital photos, and to obscure the faces of people appearing in photos in situations in which being identified might put them in danger.&nbsp; And news organizations can implement&nbsp;<a href="https://pressfreedomfoundation.org/securedrop" target="_blank" title="" style="">SecureDrop</a>, a secure submissions system for receiving documents from anonymous sources.<br /><span style=""></span><br /><span style=""></span>  No single tool or practice can render a journalist &ldquo;NSA-proof&rdquo; or immune to corporate spying, but appropriate tools and strong security practices can significantly evade surveillance and increase the reporters&rsquo; ability to deliver a well-researched, convincing story without exposing sources to harmful retaliation.<br /><span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[CALIFORNIA’S REVENGE PORN STATUTE:  A START BUT NOT A SOLUTION]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/californias-revenge-porn-statute-a-start-but-not-a-solution]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/californias-revenge-porn-statute-a-start-but-not-a-solution#comments]]></comments><pubDate>Thu, 03 Oct 2013 17:08:34 GMT</pubDate><category><![CDATA[crime]]></category><category><![CDATA[government]]></category><category><![CDATA[law]]></category><category><![CDATA[privacy]]></category><category><![CDATA[technology]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/californias-revenge-porn-statute-a-start-but-not-a-solution</guid><description><![CDATA[Lori discusses revenge porn in television interview.  Susan, a professional woman in her 30s, met a man she thought she&rsquo;d ultimately marry.&nbsp; Their relationship was sufficiently intimate that she sent him a naked photo of herself.&nbsp; When she caught him cheating, she broke up with him.&nbsp; He took revenge by posting that selfie on a revenge porn website, along with her name, the name of her town, and her social media contact information.&nbsp; She received messages from complete s [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:right;height:586px'></span><span style='z-index:10;position:relative;float:right;;clear:right;margin-top:20px;*margin-top:40px'><a href='http://wgntv.com/2013/02/21/revenge-porn-growing-threat-to-safety/' target='_blank'><img src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/7534512.jpg" style="margin-top: 5px; margin-bottom: 10px; margin-left: 10px; margin-right: 0px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><span style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;" class="wsite-caption">Lori discusses revenge porn in television interview. </span></span> <div class="paragraph" style="text-align:left;display:block;">Susan, a professional woman in her 30s, met a man she thought she&rsquo;d ultimately marry.&nbsp; Their relationship was sufficiently intimate that she sent him a naked photo of herself.&nbsp; When she caught him cheating, she broke up with him.&nbsp; He took revenge by posting that selfie on a revenge porn website, along with her name, the name of her town, and her social media contact information.&nbsp; She received messages from complete strangers asking for more naked photos.&nbsp; As she went about her daily life, she was afraid that one of those men would stalk her. &nbsp;She worried that her co-workers might have come across the photo.&nbsp; She knew that if she applied for a new job, that nude photo would come up in a Google search of her name.&nbsp; She&rsquo;d been branded with a modern Scarlet Letter. &nbsp;<br /><br />Across the Web, thousands of people attack their exes by posting disgusting comments about them, warnings not to date them, or nude photos of them. &nbsp;On October 1, California Governor Jerry Brown signed into law a bill criminalizing what has become known as revenge porn.&nbsp; The&nbsp;<a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB255" title="" target="_blank" style="">law</a>&nbsp;assesses a thousand dollar fine in a narrow situation.&nbsp; It is a misdemeanor for a person to photograph &ldquo;the intimate body part or parts of another identifiable person, under circumstances where the parties agree or understand that the image shall remain private, and the person subsequently distributes the image taken, with the intent to cause serious emotional distress, and the depicted person suffers serious emotional distress.&rdquo;<br /><br />But the law has serious limits.&nbsp; The law wouldn&rsquo;t&nbsp; help Susan because it doesn&rsquo;t cover selfies;&nbsp; it would only apply if her boyfriend had taken the photo and then later posted it.&nbsp; Even when an ex-boyfriend did take a photo and post it, it would be hard for the woman to prove that their understanding was that it would remain private.&nbsp; Didn&rsquo;t she know there was at least a chance he was going to show it to his friends?&nbsp; And the requirement that he must have &ldquo;the intent to cause serious emotional distress&rdquo; is both hard to prove and too narrow.&nbsp; A man might evade punishment by claiming that by posting the photo he was just trying to brag that his girlfriend was hot.&nbsp; Or what if they were law students competing for the same job and he said he posted it to reduce her chances of winning the job?&nbsp;&nbsp; That wouldn&rsquo;t be covered by the law.&nbsp;<br /><br />And while the men who posted nude photos of their exes could be prosecuted under the law, it would provide no remedy for the women who want to get their photos removed from the web.&nbsp; Nude photos posted on one revenge porn site are often re-posted on dozens of other sites. &nbsp;A particular ugly or revealing photo might be replicated in hundreds of places on the Web.<br /><br />A state law, such as that in California, can&rsquo;t reach the main offenders&mdash; the websites that host revenge porn.&nbsp; A federal law adopted in the infancy of the Web, Section 230 of the Communications Decency Act, says that interactive computer services are immune from the types of suits for defamation and invasion of privacy that can be brought against traditional publishers.&nbsp; That makes sense with providers such as Comcast and websites such as Facebook (why should they be sued if I defame you in an email or post?), but it doesn&rsquo;t make sense to grant immunity to websites whose sole purpose is to defame or invade privacy.&nbsp; It&rsquo;s time to strip those websites of the ability to digitally gang rape women whose photos they post.&nbsp;&nbsp;<br /><br />On revenge porn websites, the&nbsp;<a href="http://motherboard.vice.com/blog/future-sex-pornographic-trolling-is-the-ultimate-trolling" title="" target="_blank" style="">posting is just the beginning</a>.&nbsp; Hunter Moore used to run a website,&nbsp;<em style="">Is Anybody Up</em>, where other men would write savage comments about the ugliness or sluttiness of the women in the photos. &nbsp;(&ldquo;No sex with her unless she had a bag over her head&rdquo; is one of the milder comments.)&nbsp; The more hits Moore&rsquo;s site got, the more money he made through ads.&nbsp; &ldquo;Hate can be monetized,&rdquo; wrote Kelly Bourdet of Vice.&nbsp;&nbsp;<a href="http://www.villagevoice.com/2012-04-04/news/revenge-porn-hunter-moore-is-anyone-up/" title="" target="_blank" style="">Hunter Moore told the Village Voice</a>&nbsp;how much he&rsquo;d benefit if someone killed herself because of his posting her nude photo and comments about her:&nbsp; &ldquo;So if someone fucking killed themselves? Do you know how much hate I&rsquo;d get? All the Googling, all the redirects, all, like, the press&hellip;&rdquo;&nbsp;&nbsp;<br /><br />As I advocate in my book&nbsp;<em style="">I<a href="http://www.amazon.com/Know-Who-You-Are-What/dp/1451651058" target="_blank"> Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy</a></em>, we need to revamp Section 230 to allow people to sue the revenge porn websites for defamation and invasion of privacy and to grant people the right to have their photos removed. &nbsp;The rationale for protecting internet service providers (that they shouldn&rsquo;t have a duty to police transmissions to see if people are defaming each other) should not apply to protect websites whose whole business model is to defame and harass.&nbsp; Women like Susan should have a right to have her nude photo&mdash;intended for an audience of one&mdash;to be removed from a website that is exposing her to the world.<br /></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>  <div class="paragraph" style="text-align:left;"><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[NSA SPYING VIOLATES FIRST AND FOURTH AMENDMENTS]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/nsa-spying-violates-first-and-fourth-amendments]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/nsa-spying-violates-first-and-fourth-amendments#comments]]></comments><pubDate>Wed, 12 Jun 2013 14:34:33 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/nsa-spying-violates-first-and-fourth-amendments</guid><description><![CDATA[The United States Foreign Intelligence Surveillance Court in Washington, D.C. in a top secret court order  ordered Verizon to produce to the National Security Agency (NSA) &ldquo;all  call detail records or &lsquo;telephony metadata&rsquo; created by Verizon for  communications (i) between the United States and abroad; or (ii) wholly  within the United States, including local telephone calls.&rdquo; Since we&rsquo;re Verizon users, this order means that the NSA knows who we  called, where we cal [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">The United States Foreign Intelligence Surveillance Court in Washington, D.C. in a <a style="" href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order" target="_blank" title="">top secret court order</a>  ordered Verizon to produce to the National Security Agency (NSA) &ldquo;all  call detail records or &lsquo;telephony metadata&rsquo; created by Verizon for  communications (i) between the United States and abroad; or (ii) wholly  within the United States, including local telephone calls.&rdquo;<br /><span style=""></span><br /><span style=""></span> Since we&rsquo;re Verizon users, this order means that the NSA knows who we  called, where we called them from, and for how long.&nbsp; The NSA even  knows that we&rsquo;ve talked to each other.<br /><span style=""></span><br /><span style=""></span> The NSA&rsquo;s actions seriously infringe First Amendment rights.&nbsp; It  chills freedom of speech, perhaps dissuading someone from calling a  whistleblower hotline, since such calls will no longer be anonymous.&nbsp; It  chills freedom of association.&nbsp; If a person makes a call to participate  in a group at a church, mosque, or synagogue&mdash;or calls the Tea Party or  the ACLU for information&mdash;that association might improperly be used  against him.<br /><span style=""></span><br /><span style=""></span> The NSA action also violates the Fourth Amendment since it is an  unreasonable search.&nbsp; People&rsquo;s phone records are being collected with  absolutely no suspicion that they&rsquo;ve committed a crime.&nbsp; The government  argues that the search does not violate Fourth Amendment protections  because phone records do not contain substantive content. But such an  argument is not consistent with modern Fourth Amendment jurisprudence.&nbsp;  Just last year, the Supreme Court decided in <a style="" href="http://www.thecrimereport.org/viewpoints/2012-01-us-v-jones-protecting-privacy-in-the-digital-age" target="_blank" title=""><em style="">U.S. v. Jones</em></a>  that the collection of location information implicates the Fourth  Amendment.&nbsp; Justice Sotomayor said location information &ldquo;generates a  precise, comprehensive record of a person&rsquo;s public movements that  reflects a wealth of detail about her familial, political, professional,  religious, and sexual associations.&rdquo; &nbsp;If you know where we&rsquo;ve made our  calls from, you would know whether we were meeting with a competitor to  our current employer, attending an Occupy rally, going to an AIDS clinic  or abortion clinic, or other very private information.&nbsp; Who we&rsquo;ve  called is likewise sensitive and private.<br /><span style=""></span><br /><span style=""></span> Even the rights-invading Patriot Act does not appear to allow such a  sweeping invasion of citizens&rsquo; rights.&nbsp; Under 50 U.S.C. &sect; 1861(b)(2) of  the Act, the information sought must be &ldquo;relevant to an authorized  investigation.&rdquo;&nbsp; This sweeping surveillance is not an investigation, but  rather a fishing expedition.<br /><span style=""></span><br /><span style=""></span> Today, the ACLU filed suit to challenge the NSA&rsquo;s actions on  Constitutional grounds.&nbsp; Turns out, the ACLU uses Verizon, too.&nbsp; You can  read the complaint <a style="" href="http://www.aclu.org/files/assets/nsa_phone_spying_complaint.pdf" target="_blank" title="">here</a>.<br /><span style=""></span><br /><span style=""></span> Senators Ron Wyden (D-Oregon) and Mark Udal (D-Colorado) have also  spoken out against the government&rsquo;s use of the Patriot Act.&nbsp; Both  senators have served on the intelligence committee and were briefed on  the NSA&rsquo;s activities.&nbsp; <a style="" href="http://news.cnet.com/8301-13578_3-57587929-38/nsa-secretly-vacuumed-up-verizon-phone-records/" target="_blank" title="">Wyden has said</a>  &ldquo;I believe that when more of my colleagues and the American public come  to understand how the Patriot Act has actually been interpreted in  secret, they will insist on significant reforms.&rdquo;<br /><span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[BIG BROTHERS--MITT AND BARACK--ARE WATCHING]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/big-brothersmitt-and-barackare-watching]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/big-brothersmitt-and-barackare-watching#comments]]></comments><pubDate>Fri, 02 Nov 2012 18:56:08 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/big-brothersmitt-and-barackare-watching</guid><description><![CDATA[  Facebook and other social networks are transforming huge swaths of our lives&mdash;how we work, shop, and stay in touch with the people we love. They are also changing the political process itself. When John F. Kennedy and Richard Nixon debated on television, concerns were raised that politics would deteriorate into a contest where the most telegenic candidate won. But TV debates took place out in the open&mdash;anyone could tune in. And the Federal Communications Commission adopted regulation [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">  Facebook and other social networks are transforming huge swaths of our lives&mdash;how we work, shop, and stay in touch with the people we love. They are also changing the political process itself. When John F. Kennedy and Richard Nixon debated on television, concerns were raised that politics would deteriorate into a contest where the most telegenic candidate won. But TV debates took place out in the open&mdash;anyone could tune in. And the Federal Communications Commission adopted regulations so that opposing candidates were granted equal time to present their views.<br /><span style=""></span><br /><span style=""></span>  With social networks, it&rsquo;s not the most telegenic candidate who wins, but the one with the best data crunchers. Barack Obama was swept into office largely because of his presence on the Web. His social network campaign was managed by one of the founders of Facebook, twenty-four-year-old Chris Hughes, who took a leave from the company to propel Obama into office.<br /><span style=""></span>    </div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">The Republicans did Obama one better and stormed Washington in the 2010  elections through targeted use of social network data. Data aggregators  used posts from social networks, such as people&rsquo;s interest in the Bible,  and combined it with other information about what those people did on  the Web, such past political contributions, voter registration status,  shopping history, and real estate records.&nbsp; They were able to identify  conservative voters by name and provide that information to Republican  political hopefuls. The candidates could then email the people directly,  making promises and taking stances that were never revealed to the  public&mdash;and were shielded from scrutiny by their opponents.<br /><br />In an election where every last vote will count, <a target="_blank" href="http://www.nytimes.com/2012/10/14/us/politics/campaigns-mine-personal-lives-to-get-out-vote.html?pagewanted=2&amp;_r=2&amp;nl=todaysheadlines&amp;emc=edit_th_20121014&amp;pagewanted=all&amp;" style="" title="">Romney and Obama are seeking new ways to persuade us to support them</a><a style="" title="">.</a>  &nbsp;Employing techniques that businesses use to find out who to target  with ads for luxury cars, cheap home loans, or coupons for discounts at  department stores, the campaigns have authorized websites to deposit  tracking mechanisms called &ldquo;cookies&rdquo; on our computers.&nbsp; This allows  candidates to collect data about where we go on the Web (porn sites,  religious sites, a Facebook high school reunion page, or all of the  above), and make decisions about what sort of phone calls or emails  would get us to vote their way. &nbsp;&nbsp;<br /><br />   But do we really want to condone a government that spies on us in our  own homes by following our travels across the Web?&nbsp; I&rsquo;d rather see a  candidate who speaks out for our fundamental right of privacy and  supports an idea brewing at the Federal Trade Commission&mdash;that we should  have a do-not-track list, like the do-not-call one, in order to protect  us from prying eyes on the Web.&nbsp; <br /><br />      Lori Andrews, a law professor at Chicago-Kent College of Law, is the author of <em style="">I Know Who You Are and I Saw What You Did:&nbsp; Social Networks and the Death of Privacy</em>.</div>]]></content:encoded></item><item><title><![CDATA[MY LETTER TO THE INTERNET]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/my-letter-to-the-internet]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/my-letter-to-the-internet#comments]]></comments><pubDate>Fri, 12 Oct 2012 22:36:16 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/my-letter-to-the-internet</guid><description><![CDATA[                       [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-multicol"><div class='wsite-multicol-table-wrap' style='margin:0 -15px'> <table class='wsite-multicol-table'> <tbody class='wsite-multicol-tbody'> <tr class='wsite-multicol-tr'> <td class='wsite-multicol-col' style='width:50%;padding:0 15px'>  <div><div class="wsite-image wsite-image-border-thin " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/8681929_orig.jpg" alt="Picture" style="width:100%;max-width:191px" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  </td> <td class='wsite-multicol-col' style='width:50%;padding:0 15px'>  <div class="wsite-html5audio"><audio id="audio_494572413797798428" style="height: auto;" class="wsite-mejs-align-left wsite-mejs-dark" src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/sotru_-_state_of_the_re-union_edit.mp3" preload="none" data-autostart="no" data-artist="" data-track=""></audio></div>  </td> </tr> </tbody> </table> </div></div></div>]]></content:encoded></item><item><title><![CDATA[ARE YOU IN CONTROL OF YOUR DIGITAL SELF?]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/conversation-withaba-journal-web-producer-lee-rawles]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/conversation-withaba-journal-web-producer-lee-rawles#comments]]></comments><pubDate>Wed, 30 May 2012 14:14:41 GMT</pubDate><category><![CDATA[data aggregation]]></category><category><![CDATA[law]]></category><category><![CDATA[privacy]]></category><category><![CDATA[right to a fair trial]]></category><category><![CDATA[social networks]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/conversation-withaba-journal-web-producer-lee-rawles</guid><description><![CDATA[Are you in control of your digital self? ABA Journal web producer Lee Rawles talks with Lori Andrews, author of&nbsp;I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy&nbsp;about the lack of online privacy rights and the need for a social media constitution.They discuss the changes that social networks have brought to all areas of the law, including evidence gathering; what evidence is admissible in courts; how social media can affect the right to a fair trial; a [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style='text-align:left;'>Are you in control of your digital self? <a href="http://www.socialnetworkconstitution.com/news.html">ABA Journal web producer Lee Rawles talks with Lori Andrews</a>, author of&nbsp;<em style="">I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy</em>&nbsp;about the lack of online privacy rights and the need for a social media constitution.<br /><br />They discuss the changes that social networks have brought to all areas of the law, including evidence gathering; what evidence is admissible in courts; how social media can affect the right to a fair trial; and the right to control one&rsquo;s image. Andrews touches on how secret data aggregation about your online activities can affect the price of your health insurance, the advertisements you see, what jobs you qualify for and the limits on your credit card balance.<br /><br /></div>]]></content:encoded></item><item><title><![CDATA[OMG! FACEBOOK COULD RUIN YOUR LIFE! Guest blog by Diane Solomon]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/omg-facebook-could-ruin-your-life-guest-blog-by-diane-solomon]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/omg-facebook-could-ruin-your-life-guest-blog-by-diane-solomon#comments]]></comments><pubDate>Wed, 28 Mar 2012 21:06:50 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/omg-facebook-could-ruin-your-life-guest-blog-by-diane-solomon</guid><description><![CDATA[Photo Credit: Octavio Martinez & Silicon Valley De-Bug Originally Published at&nbsp;SiliconValley De-Bug.While you&rsquo;re happily playing the latest online game, sending texts, tweeting, posting content or doing Google searches, your digital data is being recorded, aggregated, marketed and sold without your knowledge or permission and its created an online profile that could seriously mess with your future.Illinois Institute of Technology Law Professor Lori Andrews says colleges and employers  [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style=' float: left; z-index: 10; position: relative; ;clear:left;margin-top:0px;*margin-top:0px'><a><img src="http://www.socialnetworkconstitution.com/uploads/8/6/6/0/8660362/307621.jpg?417" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><div style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;">Photo Credit: Octavio Martinez & Silicon Valley De-Bug</div></span> <div  class="paragraph editable-text" style=" text-align: left; display: block; "><em style="">Originally Published at&nbsp;<a href="http://www.siliconvalleydebug.org/articles/2012/03/27/omg-facebook-could-ruin-your-life" target="_blank" title="" style="">SiliconValley De-Bug</a>.</em><br /><br />While you&rsquo;re happily playing the latest online game, sending texts, tweeting, posting content or doing Google searches, your digital data is being recorded, aggregated, marketed and sold without your knowledge or permission and its created an online profile that could seriously mess with your future.<br /><br /><br />Illinois Institute of Technology Law Professor Lori Andrews says colleges and employers routinely reject applicants after checking them out on the social networks. Her new book is called, &ldquo;<em style="">I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy</em>.&rdquo;<br /><br />Fifty percent of the employers she polled say they won&rsquo;t hire applicants with an online photo showing them holding an alcoholic beverage, or what looks like one.<br /><br />How do they know? They look online or hire firms like Sterling Infosystems, Inc. to perform &ldquo;social media background checks&rdquo;.<br /><br />Andrews says courts, high schools, police departments and credit card companies now take information from social networks and use it as evidence in legal proceedings, school suspensions, criminal cases and credit reviews.<br /><br /><strong style="">Big Brother is Watching You</strong><br />Every week the New York Times reports more unauthorized data mining. They&rsquo;ve reported that developers can take photos from Apple mobile and Google Android devices and app developers can take your smartphones&rsquo; address book at will.<br /><br />Even if you actually read the fine print of online user agreements and allow your data to be accessed, it&rsquo;s often not clear how it will be used and archived.<br /><br />Last month your tweets were sold. Twitter announced a deal that allows the analytics firm Datasift to sell the last two years&rsquo; worth of posted public tweets. Google saves and employs your search histories and, whether you&rsquo;ve tagged them or not, posted photos associated with your name are added to the virtual dossier created by the data aggregators who collect your internet inputs and sell them to the advertisers who target you online.<br /><br /><strong style="">The Death of Privacy Laws</strong><br />Andrews says with respect to every other technology courts have not hesitated to apply Constitutional principles to protect users&rsquo; rights, but courts have allowed social networks, data aggregators and third parties using social network information to ignore the privacy rights of individuals. She says the constitutional privacy protections we enjoy offline don&rsquo;t apply online.<br /><br /><strong style="">Too Big to F*ck With</strong><br />The digital data aggregation/advertising industry is huge and largely unseen by users. Take FB as an example; if it was a country, its 850 million members would make it the largest in the world.<br /><br />Because it&rsquo;s not a publicly traded company, FB isn&rsquo;t required to publically report its earnings but estimators say FB earned over $4 billion in 2011, with most earned from the sale of targeted ads. Meanwhile, Google pulled in 37.9 billion last year, most from advertisers. &nbsp;&nbsp;<br /><br />Both have Washington DC lobbyists and political action committees to better influence lawmakers and political candidates to let them do their thing.<br /><br /><strong style="">Take Action</strong><br />&ldquo;The right to privacy has been an abiding principle in the United States, protected by the U.S. Constitution&rdquo;, says Andrews. &ldquo;But as social institutions use social networks to invade privacy, new legal mechanisms may be needed to revitalize the fundamental privacy right.&rdquo;<br /><br />Andrews is calling for a Social Network Constitution to protect us online the way the U.S. Constitution protects us offline. Until legislators take that up, here&rsquo;s what you can do:<br /><br />1. Knowledge is power.&nbsp;Apps and online amusements aren&rsquo;t free. They&rsquo;re the gateway for commercial interests to gather your data. Your posts, texts, web searches, and smartphone&rsquo;s content aren&rsquo;t private.&nbsp; When you&rsquo;re offered a new application or visit a new social networking site, beware. They likely won&rsquo;t disclose the personal information they&rsquo;re taking from you, how they&rsquo;re going to use it or who they&rsquo;re selling it to.<br /><br />2. Beware: Don&rsquo;t disclose anything online that you wouldn&rsquo;t want anyone to know about.<br /><br />3. Limit the apps you download and the new social networks you join. New providers may make it easy, quick, fun and free to do something or to post photos, videos and other materials online but they don&rsquo;t disclose where they get the money to do this for you, what they&rsquo;re doing with your digital data and who else will be able to access and aggregate it.<br /><br />4. Privacy Settings:&nbsp;Check the privacy settings and preferences of every program you use and site you visit. Choose the tightest settings, knowing that your data may still be collected without your permission.<br /><br />5. Be Alert:&nbsp;Don&rsquo;t allow people to photograph you drinking or doing anything else you don&rsquo;t want a future employer, college admissions officer, school official, credit bureau or law enforcer to see. If possible prevent your photographs and likenesses from being tagged as associated with you.<br /><br />6. Use your voice:&nbsp;Share this article. Complain to your lawmakers. Talk to your families, teachers, friends and co-workers about this. Boycott the advertisers you see hitting you up on the sites you visit. Don&rsquo;t double click their ads, they treat them like yes votes and you&rsquo;ll see more of them.<br /><br />7. Learn more and Visit: &nbsp;<a href="http://epic.org/" title="" style="">http://epic.org/</a>&nbsp;;&nbsp;<a href="http://www.socialnetworkconstitution.com/" title="" style="">www.socialnetworkconstitution.com</a>; and&nbsp;<a href="https://www.eff.org/wp/know-your-rights" title="" style="">https://www.eff.org/wp/know-your-rights</a>.<br /><br /><em style="">Diane Solomon&nbsp;produces and hosts a weekly public affairs program on&nbsp;<a href="http://www.kkup.com/" title="" style="">Radio KKUP</a>, 91.5 fm, and works as a freelance journalist writing for&nbsp;<a href="https://www.facebook.com/Atommag" title="" style="">Atom Magazine,</a>&nbsp;<a href="http://content-magazine.com/welcome/" title="" style="">Content Magazine</a>,&nbsp;<a href="http://siliconvalleydebug.com/" title="" style="">De-Bug</a>, and&nbsp;<a href="http://www.metroactive.com/" title="" style="">Metro, Silicon Valley's weekly newspaper</a>. She's a full time Silicon Valley wage slave, a&nbsp;Willow Glen Neighborhoodie and a big time&nbsp;<a href="http://www.sjbikeparty.org/" title="" style="">San&nbsp;Jose&nbsp;Bike Partier.</a></em><br /></div> <hr  style=" clear: both; visibility: hidden; width: 100%; "></hr>  ]]></content:encoded></item><item><title><![CDATA[WOMEN--HARASSED AND DISCRIMINATED AGAINST ON THE WEB]]></title><link><![CDATA[http://www.socialnetworkconstitution.com/blog/womenharassed-and-discriminated-against-on-the-web]]></link><comments><![CDATA[http://www.socialnetworkconstitution.com/blog/womenharassed-and-discriminated-against-on-the-web#comments]]></comments><pubDate>Thu, 08 Mar 2012 21:13:55 GMT</pubDate><category><![CDATA[cyberbullying]]></category><category><![CDATA[privacy]]></category><category><![CDATA[social networks]]></category><guid isPermaLink="false">http://www.socialnetworkconstitution.com/blog/womenharassed-and-discriminated-against-on-the-web</guid><description><![CDATA[Today is the 101st anniversary of International Women&rsquo;s Day and women are facing a new threat to their rights&mdash;and sometimes even to their lives.&nbsp; The vast array of information available about us on the Web is leading to new forms of harassment and discrimination against women.&nbsp;     In a chilling revelation, a woman writes about a man who raped her years ago and was never brought to justice. &nbsp;She moved to another state and yet her rapist was able to find her and torment [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Today is the 101st anniversary of International Women&rsquo;s Day and women are facing a new threat to their rights&mdash;and sometimes even to their lives.&nbsp; The vast array of information available about us on the Web is leading to new forms of harassment and discrimination against women.&nbsp; <br /><br />    In a chilling revelation, <a title="" href="http://jezebel.com/5890590/did-my-rapist-find-me-on-spokeo" style="">a woman writes about a man who raped her</a> years ago and was never brought to justice. &nbsp;She moved to another state and yet her rapist was able to find her and torment her.&nbsp; She speculates that he was able to find her on a website called Spokeo.&nbsp; The website, she said, provided &ldquo;incredibly detailed&rdquo; information about her and about her apartment where her rapist tracked her down. &ldquo;It listed everything from the types of pets I had to my profession, and included a street-view map showing our building.&rdquo;<br /><br />    Spokeo and other data aggregators collect personal online and offline information about individuals without their consent and sell that information.&nbsp; Other institutions&mdash;from employers to courts&mdash;use information from social networks and other websites against women.&nbsp; One third of employers say they&rsquo;ve rejected job candidates because of a photo where they had a drink in their hand on a social network page or wore provocative clothing.&nbsp; But who does that apply to?&nbsp; Women.<br /><br />    Women have also lost custody of children, not because they&rsquo;ve done anything wrong as a mom, but because they have posted something sexy on their boyfriend&rsquo;s MySpace page.&nbsp; And when a male rival wanted to intimidate a woman, he posted a Google map of her house with a message that she had a rape fantasy and men should come and rape her.<br /><br />    The tactic of using sexual messages to put someone into harm&rsquo;s way is standard on social networks and could be thought of as a new form of sexual harassment. &nbsp;A study by <a title="" href="http://www.enre.umd.edu/content/rmeyer-assessing.pdf" style="">University of Maryland researchers</a> found that users in a chat room with a female user name received twenty-five times more harassing private messages than users with a male name. &nbsp;Rather than being cornered and beat up in a dark alley, women now need to be concerned about being ganged up upon on the Web.&nbsp; <br /><br />    In my new book, <em style="">I Know Who You Are and I Saw What You Did:&nbsp; Social Networks and the Death of Privacy</em>, I call for a right to privacy on the Web and penalties for sexual harassment and discrimination on the Web.&nbsp; It&rsquo;s time that offline rights apply online as well.&nbsp; <br /><br />    </div>]]></content:encoded></item></channel></rss>