{"id":1212,"date":"2013-04-22T12:12:43","date_gmt":"2013-04-22T10:12:43","guid":{"rendered":"http:\/\/wordpress.khm.de\/sag\/?p=1212"},"modified":"2013-04-22T12:12:43","modified_gmt":"2013-04-22T10:12:43","slug":"bruce-schneier-braindump-internet-and-power","status":"publish","type":"post","link":"https:\/\/sag.khm.de\/?p=1212","title":{"rendered":"Bruce Schneier braindump: &quot;Internet and Power&quot;"},"content":{"rendered":"<p>The always excellent\u00a0<a href=\"http:\/\/www.schneier.com\/\" target=\"_blank\">Bruce Schneier<\/a>\u00a0(who coined the term &#8220;security theater&#8221;) in a talk at Harvard&#8217;s Berkman Center (<a href=\"http:\/\/cyber.law.harvard.edu\/events\/2013\/04\/schneier\" target=\"_blank\">video and transcrip<\/a>t). About the Internet and Power, \u00a0and\u00a0technological advances that set into motion events no could can possibly predict. In his own words:<\/p>\n<blockquote>\n<p style=\"padding-left: 30px\">What I&#8217;ve Been Thinking About<\/p>\n<p style=\"padding-left: 30px\">I have been thinking about the\u00a0<a href=\"http:\/\/www.schneier.com\/essay-409.html\">Internet and power<\/a>: how the Internet affects power, and how power affects the Internet. Increasingly, those in power are using information technology to increase their power. This has many facets, including the following:<\/p>\n<p style=\"padding-left: 30px\">1.\u00a0<a href=\"http:\/\/www.schneier.com\/essay-418.html\">Ubiquitous surveillance<\/a>\u00a0for both government and corporate purposes &#8212; aided by cloud computing, social networking, and Internet-enabled everything &#8212; resulting in a world without any real privacy.<\/p>\n<p style=\"padding-left: 30px\">2. The\u00a0<a href=\"http:\/\/www.schneier.com\/essay-416.html\">rise of nationalism<\/a>\u00a0on the Internet and a\u00a0<a href=\"http:\/\/www.schneier.com\/essay-411.html\">cyberwar arms race<\/a>, both of which play on our fears and which are resulting in increased military involvement in our information infrastructure.<\/p>\n<p style=\"padding-left: 30px\">3. Ill-conceived laws and regulations on behalf of either government or corporate power, either to prop up their business models (copyright protections), enable more surveillance (increased police access to data), or control our actions in cyberspace.<\/p>\n<p style=\"padding-left: 30px\">4. A\u00a0<a href=\"http:\/\/www.schneier.com\/essay-406.html\">feudal model of security<\/a>\u00a0that leaves users with little control over their data or computing platforms, forcing them to trust the companies that sell the hardware, software, and systems.<\/p>\n<p style=\"padding-left: 30px\">On the one hand, we need\u00a0<a href=\"http:\/\/www.schneier.com\/essay-410.html\">new regimes of trust<\/a>\u00a0in the information age. (I wrote about the extensively in my most recent book,<a href=\"http:\/\/www.schneier.com\/essay-412.html\"><em>Liars and Outliers<\/em><\/a>.) On the other hand, the\u00a0<a href=\"http:\/\/www.schneier.com\/essay-417.html\">risks associated with increasing technology<\/a>\u00a0might mean that the fear of catastrophic attack will make us unable to create those new regimes.<\/p>\n<p style=\"padding-left: 30px\">It is clear to me that we as a society are headed down a dangerous path, and that we need to make some hard choices about what sort of world we want to live in. It&#8217;s not clear if we have the social or political will to address those choices, or even have the conversations necessary to make them. But I believe we need to try.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The always excellent\u00a0Bruce Schneier\u00a0(who coined the term &#8220;security theater&#8221;) in a talk at Harvard&#8217;s Berkman Center (video and transcript). About the Internet and Power, \u00a0and\u00a0technological advances that set into motion events no could can possibly predict. In his own words: What I&#8217;ve Been Thinking About I have been thinking about the\u00a0Internet and power: how the [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[76,67,63],"tags":[],"class_list":["post-1212","post","type-post","status-publish","format-standard","hentry","category-activism","category-security","category-the-future"],"_links":{"self":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts\/1212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1212"}],"version-history":[{"count":0,"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts\/1212\/revisions"}],"wp:attachment":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}