This week we drafted our project proposal and MOU.
We will present this to our partner this week and finalize it for next week.
This week we drafted our project proposal and MOU.
We will present this to our partner this week and finalize it for next week.
This week, our team worked on drafting the working agreement [https://docs.google.com/document/d/1e92TMK0CX5DmswujRw90JX6M8_97xmmpjXFL5W-FtlE/edit?usp=sharing]. Our team met up on Friday to begin the draft work on the agreement, but we still have to hear back from our collaborators at UYC in response to our messages sent during the past few days. Although the communication has gotten slightly better, we still have trouble reaching our partners. Our planned meeting this week is at Tuesday 5pm, in which we hope to get some feedback on our user stories and also some input on the working agreement. We will continuously work on the working agreement through this week.
For this week, we worked on solidifying our personae (user stories) and Working Agreement. At the moment, the SSD is intended for journalists and activists – people who need solid information on the logistics of how to protect their data/information. Some of the other personae are people who might need more basic information, such as the average college student, or a community organizer.
We also started to talk about the “fun” aspects of the site to engage people who are not as proactive about properly protecting their digital assets – we (and a lot of our friends) are really into Buzzfeed quizzes (like this one), so we were thinking something along the lines of that. We might also be developing an actual workshop module for the Threat Model workshop, but we’ll see.
We’ll be meeting with Eva (Jillian’s out) – and this week, Bex as well – on Wednesday, right before class, so we’ll definitely have more concrete ideas of how we’ll be moving forward by then.
– Paulina & Wei-Wei
I subscribe to a daily news email from Quartz, and the intro from a couple of days ago felt particularly pertinent to our class. Enjoy!
“Russian troops take over Crimea! Rubbish, said Vladimir Putin: “Local self-defense forces.” Bitcoin’s inventor, the pseudonymous Satoshi Nakamoto, is really a man called Satoshi Nakamoto! Nonsense, said the real Nakamoto; he’d never before heard of “bitcom.” The man behind spoof Twitter gossip account @GSElevator never worked for Goldman Sachs! Yet in fact, his true identity was hiding in plain sight for months.
It seems that even in our hyper-surveilled and sharing-obsessed world, identity remains a fraught and nebulous thing. Putin used the confusion over what was really happening in Crimea to the fullest to steal a march on the West. The Nakamoto unmasked in Los Angeles might be telling the truth—online, an account linked more or less definitively with the bitcoin creator piped up to say he wasn’t that Nakamoto—or it might all be a ruse to keep himself out of the spotlight. And @GSElevator’s book deal mysteriously evaporated after he was outed.
Identities are increasingly central to the internet economy, since whoever manages your online identity for you manages your data, and thus acts as your broker for a growing number of services. Identifying and profiling online users could soon be an industry worth tens of billions of dollars.
Some think that means that, as people’s online identities fill out with real data about them, anonymity will gradually vanish. But as all three of the above cases show, there’s always demand for fake, fudged or invented identities. And where there’s demand, there’ll be another industry around it.”
Last weekend’s Discotech event in Cambridge was a very productive day for us. We shared our project amongst a fairly diverse group of people and people responded very well. There were a lot of conversations around COINTELPRO to situate the project historically as well as conversations about more recent cases of infiltrations such as the exploits and of FBI Informant Brandon Darby (Scott Crow, an activist who was very close to Brandon is one of our first stories in the Infiltrated project). The hands-on workshop, creating a comprehensive timeline a TimelineJS visualization of the COINTELPRO infiltrations, allowed us to connect with people interested in data visualizations, including faculty from the program of Information Design and Visualization at Northeastern University who are interested in grounding information design and visualization courses with projects that have a social dimension such as the SoMove: Infiltrated project.
Day 2 of the Discotech was really productive. My team met up for the first time in person and did a lot of brainstorming. We are currently working on refining 3 ideas around the bed quota issue to present to our project partners this Friday.
Our professor shared with us a really helpful strategy timeline for Transmedia Projects. This is something that we’re definitely considering at this stage into the design process. We’re also trying to schedule a meeting with Bex Hurwitz to try to get more feedback on our ideas.
At this discotech, we showed visitors http://fuerza.is: an interactive checklist to help a victim determine whether their various devices are infected and being used in their stalking. Then we discussed scenarios and potential solutions for stalking via digital communication tools. A visitor came up with the idea of collecting app fingerprints. Even if it is less likely to be delivered at the term end, it exemplify how existing product helps framing the problem.
Another workshop held in the DiscoTech was explaining encryption. Activities included showing how to fake an email on behalf of somebody else (via shell script), using GPGTools to sign emails, and using GPGTools and AESCrypt to encrypt files. The workshop also included trying to use RetroShare (a P2P communication tool encrypted under PGP), but it didn’t work out.
We also had some conversations with some of the guests on actions they would take if they noticed they were being digitally surveilled. What steps would they take. We also went through some of the source of data around abuse and which of those cases may have a digital surveillance component. Among conversations we had regarding possible tools, is a digital application fingerprinting software that could detect changes in applications or changes in the behavior of some of the applications and how that could be used to inform users of threats possible. The other application we brainstormed about was on an activity log, resident on the phone that tracks a users actions and phone operations. A technique akin to self surveillance which would then help one in curating and identifying suspicious behavior.
In the team meeting this week, we drafted three personas of users, in which we will pick one to work on. They are:
The DiscoTech was a huge success for us and gave us the opportunity to share with others information on cell phone surveillance. The DiscoTech allowed us to speak with people in a variety of settings, from meet and greets to hands on workshops. Through this, we were able to speak about the problem we’re trying to solve (IMSI-catcher detection) in a variety of ways. There was a huge disparity in how much people know and this allowed us to field questions ranging from how IMSI-catchers work, to what protocol they’re able to spoof. Throughout the day, we talked with people and learned a lot about what people know and got a lot of great feedback on our project idea.
The hands-on workshop we offered was “Locate your cell tower”. We used this time to show people how they could look at some advanced diagnostic menus on their phones (menus generally hidden and accessible through special key codes). This allowed the audience to see and compare which cell towers they were connected to. We took this information and compared it to some databases of cell towers to identify the location of the cell towers that they were actually connected to, seen in Figure 1 below. Additionally, we used the time to explain the theory of how we can use this knowledge to detect possible IMSI interference. A lot of questions came up and we had amazing conversations on topics such as cell tower databases, protocols, and areas of concern.
Figure 1: Example cell tower location of one of the attendees
Overall we had a great experience participating in the DiscoTech. We learned a lot from the attendees and got some great feedback on our project. Additionally we opened peoples eyes to a real problem and the reception was great. People enjoyed seeing how they can utilize their phone and get more information for themselves and they were interested to hear more about how IMSI-catchers are being used.
This past weekend’s DiscoTech was an amazing event at which we had the opportunity to meet an incredibly interesting and diverse group of people. For our project specific workshop, Team CURE came to the DiscoTech armed with a questionnaire and statistics that we hoped would both stir conversation and help us develop a more accurate end user profile. We are hoping to develop an online awareness platform for CURE’s sex offender advocacy work (read more about it here!). Because the topic is potentially controversial, we thought that developing a firm understanding of prospective user initial assumptions/value systems would be particularly useful. We expected that the answers would shed some light on possible perspectives and, in turn, inform the crafting of our project. Although we started with the questionnaire, our workshop participants were much more interested in the discussion that our introduction presentations and questions spurred. We were surprised that many of our visitors had deeply personal stories to tell about how their lives have been affected by the sex offender registry and/or associated legal processes. Although we didn’t get as much data as expected, we had a very rich discussion about the complexity of the US detention system, rehabilitation, and sex offender rights. As we continue to develop the project, we are becoming more and more aware of how important it is that we are sensitive to language and the significance of a positive framework.
Earlier this week we also had quite a bit of fun with our partners at CURE crafting and choosing user personas. The user personas, like the DiscoTech activity, are meant to help us hone into the profiles of our end users – so that we will have a ficticious but very discerning audience to guide some of our design decisions. The group settled on two different/similar end users:
Daniel Young
Amelia Smith
Here’s to hoping that Daniel and Amelia are pleased with our future product! Until next time, some food for thought:
http://www.psychologytoday.com/blog/witness/201309/efficacy-sex-offender-treatment-still-in-the-air
Daniel: The discotech was an interesting experience for learning about surveillance and counter surveillance activism. Through talking with the numerous attendees there, I came out with a fresh perspective on how to approach social issues and think about these problems, such as surveillance, with a more critical and analytical mindset. I thought it was also interesting to see numerous artists who were there, also accomplished with their various social projects they are currently undertaking. During the hands on workshop, I especially found the analytical workshop for threatmodeling and the facepainting very informative. The face painting demo demonstrated the far reaches of technology, and how advanced facial recognition technology currently is. I believe the experience I gained at the DiscoTech will definitely allow me to be more aware of surveillance issues in the future.