Tag Archives: regulation

“Justice for Daisy” goes viral: The collateral damage of online activism

Anonymous and others are responding en masse to Daisy Coleman\’s alleged assault. But will they take down innocents?

It’s already being called this year’s Steubenville. But the quest for “Justice for Daisy” is already playing out in very different ways.

When, over the weekend, journalist Dugan Arnett published the outrageous, infuriating tale of what happened to a 14-year-old Maryville, Mo., girl in the Kansas City Star, the story quickly made national headlines. Nearly two years ago, the now 16-year-old Daisy Coleman – she and her family consented to publish her name — snuck out of the house with a girlfriend during a sleepover. They were picked up by a football player with well-connected family ties named Matthew Barnett. When they arrived at his house, as Arnett wrote, “the girls found themselves among some of the school’s most popular student-athletes.” Coleman says she was given two drinks, and that’s the last thing she remembers. The next morning, her mother found her passed out on the porch in the subfreezing cold, clad in just a t-shirt and sweatpants. Her hair had frozen. When her mother brought her inside for a warm bath, that’s when she saw the signs on her body. That’s when the girl told her “it hurt.” (A 15-year-old boy later told police of his experience with Coleman’s friend. He said that “the girl said ‘no’ multiple times, he undressed her, put a condom on and had sex with her.”) Barnett was arrested and charged with sexual assault and endangering the welfare of a child. Another boy, Jordan Zech, who allegedly recorded what happened that night, was charged with sexual exploitation of a minor. The charges were dropped soon after. Robert Rice, the Nodaway County prosecutor, told the Star, “They were doing what they wanted to do, and there weren’t any consequences. And it’s reprehensible. But is it criminal? No.”

In the aftermath of the events, Coleman found herself the target of online harassment, and attempted suicide. Her mother was fired from her job. The family left town, and while their house was still on the market, it mysteriously burned down. Though the full details of what happened to Daisy Coleman that January night are not known, what is clear is that she was incapacitated by alcohol, she was left to freeze to death on her own porch, and then, for her troubles, she was harassed and bullied. The boys involved, meanwhile, managed to move on with almost no consequences.

But now that the story has gained national attention, it’s taken a new turn. Inevitably, Anonymous has become involved, demanding “an immediate investigation into the handling by local authorities of Daisy’s case.” Both the #justice4rdaisy and #opmaryville hashtags have become a deep repository for news information to put pressure on law enforcement – and the boys involved. And the “Justice for Daisy” campaign has already proven what’s possible in a world in which anybody who can Google can be an avenger.

via “Justice for Daisy” goes viral: The collateral damage of online activism – Salon.com.

Bad Code: Should Software Makers Pay? (Part 1)

The joke goes that only two industries refer to their customers as “users.” But here’s the real punch line: Drug users and software users are about equally likely to recover damages for whatever harms those wares cause them.

Let’s face it. Dazzled by what software makes possible—the highs—we have embedded into our lives a technological medium capable of bringing society to its knees, but from which we demand virtually no quality assurance. The $150 billion U.S. software industry has built itself on a mantra that has become the natural order: user beware.

Unfortunately, software vulnerabilities don’t just cost end-users billions annually in antivirus products. The problem is bigger than that. In 2011, the U.S.government warned critical-infrastructure operators about an exploit that was targeting a stack overflow vulnerability in software deployed in utilities and manufacturing plants around the world. In 2012, a researcher found almost two dozen vulnerabilities in industrial control systems (ICS) software used in power plants, airports and manufacturing facilities. In its 2013 threat update, Symantec, the world’s largest security software corporation, surprised no one when it announced that criminals were finding and exploiting new vulnerabilities faster than software vendors were proving able to release patches. Cybersecurity is a very big set of problems, and bad software is a big part of the mess.

via Bad Code: Should Software Makers Pay? (Part 1) | New Republic.

Chinese Censorship: More Complicated Than You Think

But the questions about limits on free speech in China that people ask me at public talks have convinced me that when even very well-informed Americans with no special concern with Chinese affairs consider the topic, what fills their minds is a mixture of solid pieces of information and notions that are, at best, only partly true. The subject is actually quite a bit more complicated—and more interesting—than many of them imagine.

For example, many know that Beijing uses a “Great Firewall” to try to keep the web free of things it dislikes. What fewer appreciate is how much energy the Chinese government puts into trying to flood the Internet with things it likes. People can earn small payments, on a post-by-post basis, for adding pro-government comments to sites. Bloggers mock this piece-rate system: those benefiting from it, they say, have joined the “Fifty-Cent Party” that props up the Communist Party.

via Chinese Censorship: More Complicated Than You Think | Dissent Magazine.

For a discussion of how academics study such issues (which itself often raises ethical issues), see also Fakebook: U.S. Researchers Create Phony Social Network to Study Chinese Censorship.