Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked – the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves.
By making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.
“Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect data from third party sources to gather information about individuals. This data in conjunction with machine learning aids governments in determining where crime will be committed and who has committed a crime. Could this data serve as a method by which governments predict whether or not the individual will commit a crime? This talk will examine the use of big data in the context of predictive policing. Specifically, how does the data collected inform suspicion about a particular individual? In the context of U.S. law, can big data alone establish reasonable suspicion or should it just factor into the totality of the circumstances? How do we mitigate the biases that might exist in large data sets?”
A New Kid on the Block
Conditions for a Successful Market Entry of Decentralized Social Networks
Talk by Katharina Nocun
Extract from the program:
The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?
Szenische Lesung von anna, Constanze Kurz, cbass, Felix Betzin
Auszug aus dem Programm:
In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des NSA-BND-Untersuchungsausschusses, die bei netzpolitik.org nachzulesen sind, verbergen sich interessante Antworten auf Fragen, die niemand gestellt hat, vorher unbekannte juristische „Theorien“ des BND und Perlen verlogener Rabulistik.
Using follower bombing as art performances, the artist Constant Dullaart continues the research into attention and identity as a commodity on social networks, and has recently created a large sum of custom created artificial Facebook identities.
Many websites offer an option to login in with Facebook credentials due to the strict controle of the service on the reliability and verification of the social medium. In a time where the open borders in Europe are under pressure, and Syrian identities are sold to people that long for a better future, virtual identity systems, and their reliability become a topical analogy.
#32c3 conceptual artist @constantdull presents "research into attention and identity as a commodity on social networks" 1/2
The lecture outlines strategies by the “Artist against 419” online community that uses open source intelligence to gather data and file reports about fraudulent websites. The lecture presents the artistic installation “Megacorp.” (created by KairUs) that tries to visualize the global phenomenon of fake business websites.
The talk „We Lost The War“ was presented at Congress ten years ago, causing quite a stir. It was a prediction of a dark future that did not sit well with many people, but unfortunately many predictions have come true meanwhile. This talk will try to address what comes next, as well as what the hacker community can do to make things better.
In the past years there has been a lot of discussion on the topic of state sponsored surveillance. But hardly any material can be accessed to support the general debate due to vaguely declared security concerns. So we are debating Big Brother with little knowledge about what he actually sees, while he is watching. Over the course of three years, I was able to research the archives left by East Germany’s Stasi to look for visual memories of this notorious surveillance system and more recently I was invited to spend some weeks looking at the archive by the Czechoslovak StB. Illustrating with images I have found during my research, I would like to address the question why this material is still relevant – even 25 years after the fall of the Iron Curtain.
#32c3 Who is the owner of a #stasi file – one who has been spied upon or the federal republic as the legal successor and heir of the files?
Das Thema beschäftigt mich schon einige Jahre. Da war das Urteil des Bundesgerichtshofes, der festgestellt hat, die Strafprozessordnung erlaube es nicht, dass die Ermittlungsbehörden heimlich übers Internet private Computer durchsuchen: Meine Festplatte gehört mir! Ein paar Tage später beschwerte sich der damalige Innenminister Schäuble über die massive Kritik an der Online-Durchsuchung – wohingegen der CCC schon damals (Mitte 2007) nicht davon ausging, dass es sich bei Bundesinnenministerium um eine Behörde handelt, die in der Lage ist, sicherheitsrelevante Software unfallfrei zu betreiben resp. überhaupt auf den eigenen Regierungsrechnern zu erkennen, da sie ja die China-Trojaner im Bundeskanzleramt nicht hat verhindern können.