CALEA II Proposal & Responses

Context

  • CALEA (CALEA I, “CALEA One”); the standing law.
    CALEA => Communications for Law Enforcement Act
  • CALEA II; the proposed response to “Going Dark”
  • CISPA
  • RFC 3261: SIP: Session Initiation Protocol; J. Rosenberg, H. Schulzrinne, G. Camarillo et al.; IETF, 2002-06.

Response of EFF

Response of CDT

  • Signatories (see below); CALEA II: Risks of Wiretap Modifications to Endpoints; 2013-05-17; 7 pages.
  • Abstract: The U.S. government is proposing to expand wiretap design laws broadly to Internet services, including voice over Internet protocol (VoIP) services and other peer-to-peer tools that allow communications in real-time directly between individuals. This report explains how mandating wiretap capabilities in endpoints poses serious security risks. Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences for the economic well-being and national security of the United States.
  • Promotions
  • Signatories
    • Ben Adida (Independent);
      now at Mozilla, just not using the Mozilla brand.
    • Collin Anderson (Independent); either
    • Annie I. Anton (Georgia Institute of Technology);
    • Matt Blaze (University of Pennsylvania);
    • Roger Dingledine (The Tor Project);
    • Edward W. Felten (Princeton University);
    • Matthew D. Green (Johns Hopkins University);
    • J. Alex Halderman (University of Michigan);
    • David R. Jefferson (Lawrence Livermore National Laboratory);
    • Cullen Jennings (Independent);
      now at Cisco as a Fellow, just not using the Cisco brand.
    • Susan Landau (privacyink.org);
    • Navroop Mitter (Independent);
      now CEO of Gryphn Corporation (a DC-based security boutique)
    • Peter G. Neumann (SRI International);
    • Eric Rescorla (RTFM, Inc.);
    • Fred B. Schneider (Cornell University);
    • Bruce Schneier (BT);
    • Hovav Shacham (University of California, San Diego);
    • Micah Sherr (Georgetown University);
    • David Wagner (University of California, Berkeley);
    • Philip Zimmermann (Silent Circle, LLC)

Previously

Message Queuing Telemetry Transport (MQTT)

Basics

Overview

  • Like Hypertext Transfer Protocol (HTTP), but different
  • Still uses TCP/IP
    • not UDP
    • not a separable protocol (/etc/protocols)
  • Concepts
    • Publish/subscribe & One-to-many
    • Messages
      • At most once
      • At least once
      • Exactly once
    • Last Will & Testament feature
  • Concept & standard is twenty years old
    • First implementation 1998 with Arlen Nipper
  • To be standardized by Oasis
  • Available Software
  • Co-inventors
    • Andy Stanford-Clark
    • Arlen Nipper
  • Andy Stanford-Clark
    • Distinguished Engineer & Master Inventor at I.B.M.
    • lives in a 16th-century stone cottage & thatched roof on the Isle of Wight (“Eco Island”)
  • Arlen Nipper
    • Also at IBM?
  • David Locke
    • Dave Locke (locke@uk.ibm.com), Senior Inventor, Pervasive and Advanced Messaging Technologies, IBM
      Senior Inventor, Pervasive and Advanced Messaging Technologies
  • Interested Big Names
    • Cisco Systems
    • I.B.M.
    • Red Hat
    • Tibco
  • Reference Users
    • Facebook
      • MQTT for the live notifications it sends to Facebook users on devices running Apple’s iOS.
    • Ford
      • Vijay Sankaran, director of application development.
      • <quote>In the Focus Electric car, he said, Ford wants to get continual, detailed sensor data on the state and performance of the vehicle’s electric battery, then feed that information into product development.</quote>
  • Ponte – M2M Bridge Framework for REST developers; from Eclipse Foundation; “two weeks ago” (2013-04?)

Sources

The “LUMAscape” of the Internet of Things from FirstMark Capital

Via: Mark Turck; Making Sense Of The Internet Of Things; In TechCrunch; 2013-05-25.

Like the LUMAscapes, but different.

Framework

  • Platforms & Enablements (Horizontals)
    • Connectivity
    • Open Source Platforms
    • Software Platforms
    • Sensor Networks
    • Enabling Networks
    • Corporates
  • Applications (Verticals)
    • Quantified Self
      • Wearable Computing
      • Fitness
      • Health
      • Family
    • Lifestyle
      • Leisure
      • Pets
      • Toys
      • Music
      • Gardening
      • Home Improvement
    • Connected Home
      • Home Automation
      • Energy Efficiency
      • Security
    • Industries
      • Retail
      • Healthcare
      • Automotive
      • Smart Buildings
    • Industrial Internet
      • Robotics
      • Greentech
      • 3D Printing
    • New Interfaces
  • Building Blocks
    • Connection Protocols
    • M2M
    • Software
    • Mobile
    • Hardware
    • Parts/Kits
    • Services
    • Incubators
    • Funding
    • Distribution

Unique in the Crowd: The privacy bounds of human mobility | de Montjoye, Hidalgo, Verleysen, Blondel

Yves-Alexandre de Montjoye, Cesar A. Hidalgo, Michel Verleysen & Vincent D. Blondel; Unique in the Crowd: The privacy bounds of human mobility; In Scientific Reports; 2013-03-25; accepted: 2013-02-04, received: 2012-10-01; 5 pages.

Abstract

We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier’s antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals. We coarsen the data spatially and temporally to find a formula for the uniqueness of human mobility traces given their resolution and the available outside information. This formula shows that the uniqueness of mobility traces decays approximately as the 1/10 power of their resolution. Hence, even coarse datasets provide little anonymity. These findings represent fundamental constraints to an individual’s privacy and have important implications for the design of frameworks and institutions dedicated to protect the privacy of individuals.

Also

Overearning | Christopher Hsee, Jiao Zhang, Cindy Cai, Shirley Zhang

Christopher K. Hsee, Jiao Zhang, Cindy F. Cai, Shirley Zhang; Overearning; In Psychological Science; landing; 2012-08-28. 20 pages.

Abstract

High productivity and high earning rates brought about by modern technologies make it possible for people to work less and enjoy more, yet many continue to work assiduously to earn more. Do people overearn—forgo leisure to work and earn beyond their needs? This question is understudied, partly because in real life, determining the right amount of earning and defining overearning are difficult. In this research, we introduced a minimalistic paradigm that allows researchers to study overearning in a controlled laboratory setting. Using this paradigm, we found that individuals do overearn, even at the cost of happiness, and that overearning is a result of mindless accumulation—a tendency to work and earn until feeling tired rather than until having enough. Supporting the mindless-accumulation notion, our results show, first, that individuals work about the same amount regardless of earning rates and hence are more likely to overearn when earning rates are high than when they are low, and second, that prompting individuals to consider the consequences of their earnings or denying them excessive earnings can disrupt mindless accumulation and enhance happiness.

Promotions

Also backfill

GIGABYTE BRIX GB-XM1-3537 Ultra Compact Mini-PC / HTPC

Available with …

  • Intel® Core™ i7-3537U 2GHz / 3.1GHz
    • cooling: unclear
    • seems to be a fan on top of the CPU and ventillation slots on the back & slides
  • Max: 16GB
  • Intel integrated graphics
  • 1x mSATA
  • 1x mini PCIe occupied with a WiFi card
  • 1x USB 3.0
  • 1x HDMI
  • 1x mini DisplayPort
  • 1x RJ45 (wireline ethernet)
  • Separate inline DC power supply (not shown)+
  • 29.9 mm x 107.6 mm x 114.4 mm => 1.5″ x 5″ x 5″ => 3″ x 8″ x 8″ (including cable runup and ventillation)

Pricing: not stated

A Saudi Arabia Telecom’s Surveillance Pitch | Moxie Marlinspike

Mixie Marlinspike; A Saudi Arabia Telecom’s Surveillance Pitch; In His Blog; 2013-05-13.

“they’d already gotten a WhatsApp interception prototype working”

Memoto, not ready yet

Memoto
Memoto Camera, Memoto OrangeMemoto Camera, Arctic WhiteMemoto Camera, Graphite Gray

tl;dr

  • Seems fun
  • Does Not ‘Work with Linux’

Problems -> What could possilby go wrong?

  • The data is not stored on your computers, your disk drives.  It is stored on theirs.
  • The business model apparently is to require you to pay for that storage monthly.
  • But it’s never stored on your gear; it’s only stored on their gear.
  • “Safe & Secure Storage” is by definition on my gear in my house.

Will there be Linux?  no, not yet, maybe.  “there is no interest”  FAQ  Even in translation, that’s “no.”

<quote>There will be a web application available as well. Most of our developers (all except one, actually) use OS X or Linux so there is in-house interest in getting Linux to work. It’s a matter of seeing that there is sufficient demand to make apps for other platforms.</quote>

The Consequences of Machine Intelligence | Moshe Y. Vardi, The Atlantic

Moshe Y. Vardi; The Consequences of Machine Intelligence; In The Atlantic; 2012-10-25.
Teaser: If machines are capable of doing almost any work humans can do, what will humans do?

On Counterpoint

What pompous crap. Look around you man, get out of doors more! There’s much to do and not enough people to do it. See people who are not like you (shutins who only read magazine ephemera that passes for thought provocation). See people who do not like you. That should provoke you to understand what to do with the tech.

Mentions

Also

  • Steven Cherry; The Job Market of 2045; In IEEE Spectrum; 2013-01-22.
    What will we do when machines do all the work?

Via backfill

Geert Hofstede’s Cultural Dimensions Theory

Via: Jimi Wales’ Wiki pages Power Distance; Geert Hofstede

  • PDI => Power Distance
  • IDV => Individualism
  • UAI => Uncertainty Avoidance Index
  • MAS => Masculinity contra Femininity (also Quality of Life vs Quantity of Life)
  • LTO => Long-Term Orientation

Also

Geert Hofstede, Gert Jan Hofstede, Michael Minkov; Cultures and Organizations: Software of the Mind; McGraw-Hill, 3rd edition; 2010-05-03; 576 pages; kindle: #16, from: $10.

Two Studies Show Guitar Increases Male Facebook Attractiveness | Tiffert, Gazeil, Baram & Guéguen, Meineri, Fischer-Lokou

Two studies replicating the same concept, on the occasion of Nicolas Guéguen’s publication in 2013 in a peer-reviewed venue of a previous study of the concept which was published in 2012 in a low-review venue.

Sigal Tifferet, Ofir Gaziel, Yoav Baram; Guitar Increases Male Facebook Attractiveness: Preliminary Support for the Sexual Selection Theory of Music; In Letters on Evolutionary Behavioral Science; Vol. 3, No. 1; 2012; pages 4-6, 3 pages; landing.

Abstract
Music is a universal phenomenon that has genetic and brain-localized features. As such, it warrants adaptive evolutionary explanations. While some scholars believe that music arose as a by-product of other adaptations, others argue that music is likely to have served some adaptive function, for example in coalition signaling or mother-child bonding. The sexual selection theory of music suggests that music serves as a signal in mate selection. While this claim is prevalent, it lacks empirical evidence. A facebook (sic) experiment revealed that women replied more positively to friendship requests from a man shown in a photo holding a guitar. These results offer initial support for the sexual selection theory of music.

Nicolas Guéguen, Sébastien Meineri, Jacques Fischer-Lokou; Men’s music ability and attractiveness to women in a real-life courtship context; In Psychology of Music; Vol. 41, No 2; 2013-03; paywalled.

Abstract
This experiment tested the assumption that music plays a role in sexual selection. Three hundred young women were solicited in the street for their phone number by a young male confederate who held either a guitar case or a sports bag in his hands or had no bag at all. Results showed that holding a guitar case was associated with greater compliance to the request, thus suggesting that musical practice is associated with sexual selection.

Vanessa A. Sluming, John T. Manning; Second to fourth digit ratio in elite musicians: Evidence for musical ability as an honest signal of male fitness; In Evolution and Human Behavior; Vol. 21, No. 1; 2000-01; pages 1-9, 8 pages; paywalled.

Abstract
Abstract Prenatal testosterone may facilitate musical ability. The ratio of the length of the second and fourth digit (2D:4D) is probably determined in utero and is negatively related to adult testosterone concentrations and sperm numbers per ejaculate. Therefore, 2D:4D may be a marker for prenatal testosterone levels. We tested the association between 2D:4D and musical ability by measuring the ratio in 70 musicians (54 men and 16 women) recruited from a British symphony orchestra. The men had significantly lower 2D:4D ratios (indicating high testosterone) than controls (n = 86). The mean 2D:4D of women did not differ significantly from controls (n = 78). Rankings of musical ability within the orchestra were associated with male 2D:4D (high rank = low 2D:4D). Differences in 2D:4D ratio were not found among instrument groups, suggesting that 2D:4D was not related to mechanical advantages in playing particular intruments. Concert audiences showed evidence of a female-biased sex ratio in seats close to the orchestra. This preliminary study supports the thesis that music is a sexually selected trait in men that indicates fertilizing capacity and perhaps good genes. However, the association between low 2D:4D ratio and orchestra membership and high status within the orchestra may result from testosterone-mediated competitive ability. Further tests of the association between 2D:4D and musical ability per se are necessary.

Cited in the Pacific Standard promotion article (below).

Mentions

  • Study 1 (Tifferet, Gaziel, Baram) participants
    <quote>100 females listed as members of student facebook groups in Israel (Tel-Aviv University and Ben Gurion University) who were identified in their facebook status as single. The mean age as reported on the facebook profiles was 24.4 (SD = 1.7).</quote>
  • Study 2 (Guéguen, Meineri, Fischer-Lokou) participants
    <quote> It featured a 20-year-old man “previously evaluated as having a high level of physical attractiveness.” One sunny Saturday afternoon, in the shopping district of a medium-sized French city, this good-looking guy approached 300 young women (aged approximately 18 to 22). He introduced himself, declared “I think you’re really pretty,” and asked for her phone number so they could arrange to have a drink. For one-third of these brief encounters, he was carrying what was clearly a guitar case. For another third, he was holding a sports bag; for the final third, he was empty-handed.</quote>
  • <quote>Guéguen reports that he has just finished a replication of the Israeli study, except that the subject of the Facebook profile was a woman. He found whether or not she was strumming a guitar in her photo made no difference in respondents’ willingness to be her “friend.” So adding music to the equation appears to increase the attractiveness of men, but not women.</quote> cite

Promotions

Also backfill

Actualities

From Tifferet, Gaziel, Baram

Always Connected: How Smartphones And Social Keep Us Engaged | Facebook & IDC

Always Connected: How Smartphones And Social Keep Us Engaged; An IDC Research Report, Sponsored By Facebook; 2013-03; 25 slides; landing

Mentions

  • Survey
    • Online
    • N=7,446
    • 18-44 year olds
    • iPhone & Android
    • 2013-03
    • 1,000 surveys/day (i.e. eight day duration)
  • Summary
    • mobile+social=connectedness
    • half the U.S. population uses smartphones
    • Top 3 services
      • texting/messaging,
      • talking on the phone,
      • direct messaging via Facebook.
    • Term: device pocketability
    • Weekend: redefined by social & mobile
    • Fluid & asynchronous experiences
    • 33% of mobile Facebook use private messaging.
    • Within 15 min of waking up 80% of smartphone owners check their phones.
  • On First Wake Up?
    • Among all respondents
      • 79% => reach for phone within 15 minutes of waking
      • 62% => reach for it immediately after waking
      • 44% => reach for it immediately & use as alarm clock
    • Among 18-24 year olds
      • 89% => reach for phone within 15 minutes of waking.
      • 74% => reach for it immediately after waking
      • 54% => reach for it immediately & use as alarm clock
  • Daily Use
    • 79% have their phone on/near them for 22 hours / day
    • Social begets social (whatever that means)
    • Facebook > Twitter > Linkedin
  • Time Spent
    • 32:51 => average daily time spent on Facebook
    • 131:43 -> average daily time spent communicating on a smartphone
    • Weekend time spent is 2x weekday
  • Sessions
    • 13.8 => daily sessions on Facebook
    • 2:22 => average session length on Facebook
  • When was your phone not with you?
    • 63% => keep it with them for 23 hours/day
    • 79% => keep it with them for 22 hours/day
    • 75% => keep it with them all day.
    • Then there is a range of results that don’t seem related to this
      When was your phone not with you?

      • 17% => 3 hrs or more
      • 9% => 2-3 hrs
      • 19% =>1-2 hrs
      • 23% => 30 min to 1 hr
      • 24% => Less than 30 min
      • 25% => Never that I can recall was it not close to me
  • Weekend Connectedness vs Weekday Connectedness
    (not clear what all this portends, but the answers were different somehow)

    • 7% vs 5% => Community
    • 22% vs 12% => Children
    • 19% vs 18% => Colleague
    • 32% vs 25% => Family
    • 37% vs 33% => Parents
    • 60% vs 60% => Friends
    • 63% vs 58% => Spouse (fully generalized: partner, girlfriend, etc.)
  • The Gender Thing (women vs men)
    • 40% vs 26% => Parents
    • 33% vs 22% => Other family
    • 23% vs 16% => Colleagues
  • Eight more slides of factoids

Promotions

Via: backfill

Engineering Serendipity | Greg Lindsay, NYT

Via: Greg Lindsay; Engineering Serendipity; In The New York Times (NYT); 2013-04-07.
Via backfill

Mentions

  • Google, a hagiography in Vanity Fair, forthcoming
  • Yahoo!, is like Google, but different
  • Theme: serendipity
    • “coined by the British aristocrat Horace Walpole in a 1754 letter, long referred to a fortunate accidental discovery” (no citation)
  • Ronald S. Burt
    • sociologist, a professor, University of Chicago
    • a study on Raytheon circa 2004, N=673.
    • Co-author Michael Fire
    • Theory of “organizational gap ‘structural holes’”
    • Constructed a social network map
  • Thomas J. Allen
    • a professor of management and engineering at M.I.T.
    • “out of sight, out of mind”
  • Uncredited, uncited study of 2012
    • researchers at Arizona State University
    • “sensors” to measure creativity
    • a study-that-shows
  • Sociometric Solutions
    • originated at MIT Media Lab’s (ML) Human Dynamics Laboratory (HDL)
    • Ben Waber
      • co-founder, had visited MIT ML HDL
      • claim: “employees who ate at cafeteria tables designed for 12 were more productive than those at tables for four”
      • book People Analytics forthcoming 2013-05-11 (no kindle)
  • Gratuitous color quote
    • Scott Doorley, a creative director at Stanford University’s Institute of Design
    • Scott Witthoft, a colleague
    • propose “positioning couches near doorways and stocking rooms with multiple types of seating to encourage lingering conversations.”

RFC 6598: IANA-Reserved IPv4 Prefix for Shared Address Space

J. Weil, V. Kuarsingh, C. Donley, C. Liljenstolpe, M. Azinger; RFC 6598: IANA-Reserved IPv4 Prefix for Shared Address Space; IETF; ISSN: 2070-1721; was: draft-weil-shared-transition-space-request; 2012-04

Mentions

Might Be Evil (Secure Computation using Garbled Circuits) | Chapman, Evans, Huang

Via: Might Be Evil
Via: backfill

Knack & Evolv as examples of “Big Data meets Human Resources”

Via: Big Data, Trying to Build Better Workers; Steve Lohr; In The New York Times; 2013-04-20.
Also: backfill

Mentions

  • Something about “Big Data Meets Human Resources”
  • Quotes from Éminences Grises
  • Companies (users)
    • I.B.M.
    • Kenexa (of IBM), a recruiting, hiring and training company, $1.3B acquisition
    • “companies like” IBM, Oracle, SAP
    • eHarmony
    • Google
    • Transcom, a global operator of customer-service call centers
  • Highlighted
    • Knack
      • Tests emotional intelligence
      • Uses games to test
      • Customers (pilot testers)
        • NYU Langone Medical Center,
        • Bain & Company
        • An unnamed unit of Shell.
    • Evolv
      • San Francisco
      • Lotsa “researchers” from name-brand schools (Wharton, Yale, Stanford)
  • Quotes
    • Tim Geisert, chief marketing officer for I.B.M.’s Kenexa unit.
    • Guy Halfteck, C.E.O., Knack.
    • Prasad Setty, vice president for people analytics, Google.
    • Michael Housman, an economist and managing director of analytics at Evolv.
    • Neil Rae, an executive vice president of Transcom.

Marc Brevard Contributes to the Windows Kernel. Windows Is Slower Than Other Operating Systems. Here Is Why. | Some Anonymous Dude, Mark Brevard

Via: Marc Brevard; “I Contribute to the Windows Kernel. We Are Slower Than Other Operating Systems. Here Is Why.”; In  His Blog; 2013-05-10.
Teaser: he cut & pasts from a discussion on Hacker News that has since been deleted.