“The snowden revelations about national security agency surveillance; starting in 2013; along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into con- temporary conundrums of surveillance and big data. attention has shifted from late c20th information technologies and networks to a c21st focus on data; currently crystallized in ‘“big data.”’ big data intensifies certain surveillance trends associated with information technology and networks; and is thus implicated in fresh but fluid configurations. this is considered in three main ways: one; the capacities of big data (including metadata) intensify surveillance by expanding interconnected datasets and analytical tools. existing dynamics of influence; risk-management; and control increase their speed and scope through new techniques; especially predictive analytics. two; while big data appears to be about size; qualitative change in surveillance practices is also perceptible; accenting consequences. important trends persist – the control motif; faith in technology; public-private synergies; and user-involvement – but the future-orientation increasingly severs surveillance from history and memory and the quest for pattern-discovery is used to justify unprecedented access to data. three; the ethical turn becomes more urgent as a mode of critique. modernity’s predilection for certain definitions of privacy betrays the subjects of surveillance who; so far from conforming to the abstract; disembodied image of both computing and legal practices; are engaged and embodied users-in-relation whose activities both fuel and foreclose surveillance.”
Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J.. (2014). After Snowden: Rethinking the impact of surveillance. International Political Sociology
“Current revelations about the secret us-nsa program, prism, have con-firmed the large-scale mass surveillance of the telecommunication and electronic messages of governments, companies, and citizens, including the united states’ closest allies in europe and latin america. the trans-national ramifications of surveillance call for a re-evaluation of contempo-rary world politics’ practices. the debate cannot be limited to the united states versus the rest of the world or to surveillance versus privacy; much more is at stake. this collective article briefly describes the specificities of cyber mass surveillance, including its mix of the practices of intelligence services and those of private companies providing services around the world. it then investigates the impact of these practices on national secu-rity, diplomacy, human rights, democracy, subjectivity, and obedience.”
Landau, S.. (2013). Making sense from snowden: What’s significant in the NSA surveillance revelations. IEEE Security and Privacy
“Did edward snowden cause irreparable harm, or did he reveal facts that should be publicly examined? what are the facts, anyhow? this article seeks to put the snowden revelations in context, explaining what’s new, why it matters, and what might happen next.”
Preibusch, S.. (2015). Privacy behaviors after Snowden. Communications of the ACM
“The article explores privacy behavior and u.s. public attitudes towards mass media following the release of information on state-surveillance detailed by former national security administration (nsa) contractor edward j. snowden. the author reflects on public knowledge about the prism program and related cyberintelligence initiatives. emphasis is given to a study using the metrics of information seeking, privacy-enhancing configurations, and new webpages. other topics include internet search habits, public interest in privacy services, and the relevance of longitudinal research.”
Hope, A.. (2016). Surveillance after Snowden. Information, Communication & Society
“In 2013, edward snowden revealed that the nsa and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of ’security’. in this compelling account, surveillance expert david lyon guides the reader through snowden’s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. lyon discusses the distinct global reactions to snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world.surveillance after snowden is crucial reading for anyone interested in politics, technology and society.”
</p>
Qin, J.. (2015). Hero on Twitter, Traitor on News: How Social Media and Legacy News Frame Snowden. International Journal of Press/Politics
“Is edward snowden a hero or traitor? in what ways do frames on social media and legacy news differ in covering the incident of >edward snowden? utilizing the approach of semantic network analysis, the study found social media users associated snowden’s case with other whistle-blowers, bipartisan issues, and personal privacy issues, while professional journalists associated the snowden incident with issues of n>ational security and international relations. frames on social media portray edward snowden as a hero while the frames on legacy news make him a trai>tor. the study further identified media frames on social media and legacy news differ in two ways: word selection and word salience. in addition, the study discussed the challenges and opportunities of framing analysis in the context of social media.”
<p>
</p
Rainie, L., & Madden, M.. (2015). Americans’ privacy strategies Post-Snowden. Pew Research Centeran><br< span=””>>
Show/hide publication abstract
tract”>“It has been nearly two years since the first disclosures of government surveillance programs by former natipan>onal security agency contractor edward snowden and americans are still coming to terms with how they feel about the programs and how to live in light of them. the documents leaked by snowden revealed an array of activities in dozens of intelligence programs that collected data from large american technology companies, as well as the buln”>k collection of phone ‘metadata’ from telecommunications companies that officials say are important to protecting national security. the metadata includes information about who phone users call, when they call, and for how long. the documents further detail the collection of web traffic around the globe, and efforts to break the security of mobile phones and web infrastructure. a new survey by the pew research center asked american adults what they think of the programs, the way they are run and monitored, and whether they have altered their communication habits and online activities since learning about the details of the surveillance. the notable findings in this survey fall into two broad categories: 1) the ways people have personally responded in light of their awareness of the government surveillance programs and 2) their views about the way the programs are run and the people who should be targeted by government surveillance.”
</br<>
Intelligence: from secrets to policy. (2013). >Choice Reviews Online
act”>“Mark m. lowenthal’s trusted guide is the go-to resource for understanding how the intelligence community’s history, structure, procedures, and functions affect policy decisions. in this sixth edition, the author highlights new challenges facing the intelligence community, examining nsa programs, uavs, the impact of social media, and the effects of the snowden leaks on collection and congressional oversight. all transnational issues have been updated, especially to rpan>eflect changes in the war on terror. new analytic issues receive attention, including big data, multi-intelligence analysis, and shifting demands on the workfor</span>ce. an expanded chapter on oversight scruan>tinizes the role of the fisa court, omb, and gao. new to this edition: implications of a de-emphasis on the war on terror intelligence implications of the obama administration’s ‘rebalance to the pacific’ ongoing effects of the manning and snowden leaks role of the foreign intelligence surveillance court key features: highlights new challenges facing the intelligence community a new chapter on oversight analytic issues examined”
Ring, T.. (2015). The enemy within. Computer Fraud and Security
Plain numerical DOI: 10.1016/S1361-3723(15)30111-1 DOI URL directSciHub download
[accotextannotation”>rdion c>pan>licktoclose=”true”]
Show/hide publication abstract
efabstract”>“Malicious insiders are the ultimate corporate nightmare: trusted individuals who decide to abuse their status and knowledge to compromise their company. experts are warning that this insider cyber threat is significantly under-estimated and growing. so what can you do to stop employees who are determined to wreak their revenge while hiding their true intent until it is too late? tim ring speaks to threat experts to find the answer. whether you think him a hero or villain, whistltannotation”>eblower edward snowden is the ultimate ‘malicious insider’. a man of impeccable credentials – he volunteered to serve in the iraq war and was one of the cia’s top computer security experts – snan>owden became so disillusioned with the electronic espis=”textannotation”>onage by the us on its citizens that he used his privileged access at the nsa’s office in hawaii to steal over a million confidential documents. in may 2013, he fled to hong kong and began revealing the data cache that led to the unravelling of western government policy on secret mass surveillance.”
[/accordion]
Deibert, R.. (2015). The geopolitics of cyberspace after snowden. journal”>Current History
[accordion clicktoclose=”true”]
Show/hide publication abstract
“The aims of the internet economy and those of state security converge around the same functional needs: collecting, monitoring, and analyzing as much data as possible”
“The nsa’s illegal surveillance techniques are leaked to the public by oclass=”textannotation”>;3″ class=”textannotation”>ne of the agency’s employees, edward snowden, in the form of thousands of classified documents distributed to the press.”
Scheuerman, W. E.. (ss=”refyear”>2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy and Social Criticism
“The media hoop-la about edward snowden has obscured a less flashy yet more vtation”>ital – and philosophically relevant – part of the story, namely the moral and political seriousness with which he acted to make the hitherto covert scope and scale of nsa surveillance public knowledge. here i argue th>at we should interpret snowden’s actions as meeting most of the demanding tests outlined in sophisticated political thinking about civil disobedience. like thoreau, gandhi, king and countless other (forgotten) grass-roots activists, snowden has in fact articulated a powerful defense of why he was morally obligated to engage in politically motivated law-breaking. he has also undertaken impressive efforts to explain how his actions are distinguishable from ordinary criminality, and why they need not cu</span>lminate in reckless lawlessness. in fact, his example can perhaps help us advance liberal and democratic ideas about civil disobedience. first, it highlights sound reasons why, pace the orthodox view, the acceptance of punishment by those engaging in civil disobedience should not be seen as a precondition of its legitimacy. second, snowden reminds us that ours is an era in which intensified globalization processes directly shape every feature of political existence. defenders of civil disobedience need to update their reflections accordingly.”
The nucleus accumbens has a significant role in the cognitive processing of motivation, aversion, reward (i.e., incentive salience, pleasure, and positive reinforcement), and reinforcement learning (e.g., Pavlovian-instrumental transfer).…
ExplicationIn classical Greek mythology (i.e., Homer’s Iliad) myrmidónes were commanded by Achilles during the Trojan War. According to the legend Zeus created them from a colony of ants (myrmex). Cf. Sir Francis Bacon's metaphor on ants, spiders, and bees (Novum Organum Scientiarum, 1620). Per analogiam, ants are scientists who are rule conformist followers who lack the capacity to reflect (i.e., metacognitively/epistemologically) on what they actually do. They work myopically within a given Kuhnian paradigm without asking quintessential overarching questions and, ergo, without any awareness of the bigger picture.Quotation:Even entertainment can be politically of special value, because the moment a person is conscious of propaganda, propaganda becomes ineffective. However, as soon as propaganda as a tendency, as a characteristic, as an attitude, remains in the background and becomes apparent through human beings, the propaganda becomes effective in every respect.
Joseph Goebbels, Facism and the Female Form, 1942, p.170-71