{"id":157,"date":"2009-06-22T02:39:34","date_gmt":"2009-06-22T02:39:34","guid":{"rendered":"http:\/\/hakawitech.wordpress.com\/?p=157"},"modified":"2009-06-22T02:39:34","modified_gmt":"2009-06-22T02:39:34","slug":"state-of-play-surveillance-and-security-in-vw","status":"publish","type":"post","link":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/","title":{"rendered":"State of Play: Surveillance and Security in VW"},"content":{"rendered":"<figure id=\"attachment_166\" aria-describedby=\"caption-attachment-166\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-166\" title=\"security_panel\" src=\"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg\" alt=\"Surveillance Panel at State of Play, NY\" width=\"400\" height=\"289\" \/><figcaption id=\"caption-attachment-166\" class=\"wp-caption-text\">Surveillance Panel at State of Play, NY<\/figcaption><\/figure>\n<p>Very very interesting session on surveillance and security on virtual worlds. I actually thought it would be all about &#8216;Muslim terrorists&#8217; and I was quite apprehensive, but then found the session to be absolutely fantastic and very informative.<\/p>\n<p>Here are my notes on the session:<\/p>\n<p>Intro from British intelligence: What can they do for bad-guys: Voip, recruitment..<\/p>\n<p>What can it do for good-guys: twitter for example. There was an operation Crevice to bomb London.<\/p>\n<p>Wikipedia, twitter, facebook, vertical content: the possibility of it spilling over in VW is great. Re the future of VWs going to be where warfare is conducted? [e during the Gaza war: Gaza and Israel in SL].<\/p>\n<p><strong>Bart Simon: <\/strong>perfect surveillance \u2013 worries about invasion of privacy. Jeremy Bentham and Foucault\u2019s panoptic. It is not about being watched, but it is about a state that requires minimal surveillance. It is about the people watching themselves \u2013 they do the surveillance themselves and they start watching and get info about themselves to police themselves. Surveillance is a systematic exertion of influence on someone\u2019s life and the second is systematic attention. People don\u2019t watch people any more. Now we have dataveillance: where data is collected and put in a database. The surveillance is not of the person but the data about that person and the key is to connect the data to the person. It ends when that person \u2018confesses\u2019 that you got him. But VWs make that difficult because you disengage who you are from the data about you.<\/p>\n<p>Oscillating between the concept that VWs is dangerous and the concept that it is not. We don\u2019t want their confessions any more but we want their genetic information. When we increase the individuization of avatars people make surveillance easier because they claim their data directly.<\/p>\n<p>Everything in VWs lets you act as who you are not \u2013 it encourages role play and encourages you to be someone else \u2013 which real life is difficult to do. How do we create a VW where people will not role play? This is for example for marketing projects.<\/p>\n<p><strong>Charles Cohen: <\/strong>is surveillance technically possible? And is it lawful? [a murder case where normally you would talk to friends etc.. and trace behavior, but he spent 20 hrs online and they decided they had to go there to make the investigation]. Distribution and production of child porn. Found in VWs but as it gets more photorealistic it becomes more difficult to prosecute: is this really a child? How to prove that?<\/p>\n<p>Currently it is more of a challenge than an opportunity. What about servers outside US jurisdiction?<\/p>\n<p><strong>Michael Schrage: <\/strong>raises sociological and legal questions. You design honeypots \u2013 in VW what constitutes a honey pot where you trap avatars to do get them \u2013 which may sound like entrapment. How do you design a honey pot? The issue is how the VW interacts with the real life. The rise is malevolent mashups. VW as media for trust and media for verficiation. Trust but verify as Reagan said. How do you verify?<\/p>\n<p>Creating jihadi bots. Assembling botnets is not that hard.<\/p>\n<p>The evocative aspect is not the evolution of VWs but because of the proliferation of devices we will see grey markets and black markets and improvisation. It will create interesting collaborations in the community.<\/p>\n<p><strong>Michael Theis: <\/strong>the world has changed fundamentally in such a way that people can steal stuff because it is in a computer in some place. It takes 3 things for protection:<\/p>\n<p>1-\u00a0\u00a0\u00a0\u00a0\u00a0 An aspect of trustworthiness: what do I trust and who<\/p>\n<p>2-\u00a0\u00a0\u00a0\u00a0\u00a0 Right size my permissions: the software does what it is designed to do. Information about them but not give out info about myself.<\/p>\n<p>3-\u00a0\u00a0\u00a0\u00a0\u00a0 Effective monitoring capability: not surveillance but monitoring.<\/p>\n<p>We look at people in real life, and see how they would act in cyberspace. Would someone who shares music steal from best buy for example? Not necessarily.<\/p>\n<p>Trustworthiness: looking at people and assessing facial and physical expressions during an investigation. It is difficult to do that in VWs and cyberspace.<\/p>\n<p>People believe in anonymity but it is not true. In voice it is an issue of meter and tone etc.. pausing, the ummms.. Could I do that in VW? Could I ask questions to determine their trustworthiness?<\/p>\n<p>People also act differently in different VWs. Anamiah.. people could take on multiple personalities but then after a while you can tell that the two are the same people. \u00a0What is needed is something that identifies those aspects.<\/p>\n<p>We have to consider how we go about doing monitoring.<\/p>\n<p><em>From the question\/answer session:<\/em><\/p>\n<p>Could griefers be prosecuted? For example for sexual harassment?<\/p>\n<p>In terms of constitutional law, how much can you do in terms of going into someone\u2019s virtual home? It has to be viewed as an intercept to do that rather than as a search of the home that needs a warrant. Currently the law does not specify that at all. But also that should fall into the laps of the VW owners and their TOS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Very very interesting session on surveillance and security on virtual worlds. I actually thought it would be all about &#8216;Muslim terrorists&#8217; and I was quite apprehensive, but then found the session to be absolutely fantastic and very informative. Here are <a href=\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,39],"tags":[],"class_list":["post-157","post","type-post","status-publish","format-standard","hentry","category-conferences","category-virtual-worlds"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>State of Play: Surveillance and Security in VW - Education and Technology Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State of Play: Surveillance and Security in VW - Education and Technology Hub\" \/>\n<meta property=\"og:description\" content=\"Very very interesting session on surveillance and security on virtual worlds. I actually thought it would be all about &#8216;Muslim terrorists&#8217; and I was quite apprehensive, but then found the session to be absolutely fantastic and very informative. Here are Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\" \/>\n<meta property=\"og:site_name\" content=\"Education and Technology Hub\" \/>\n<meta property=\"article:published_time\" content=\"2009-06-22T02:39:34+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg\" \/>\n<meta name=\"author\" content=\"mtadros\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mtadros\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\",\"url\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\",\"name\":\"State of Play: Surveillance and Security in VW - Education and Technology Hub\",\"isPartOf\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg\",\"datePublished\":\"2009-06-22T02:39:34+00:00\",\"author\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\"},\"breadcrumb\":{\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage\",\"url\":\"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg\",\"contentUrl\":\"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/virtualactivism.org\/education\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"State of Play: Surveillance and Security in VW\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#website\",\"url\":\"https:\/\/virtualactivism.org\/education\/\",\"name\":\"Education and Technology Hub\",\"description\":\"Technology and Education Resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/virtualactivism.org\/education\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b\",\"name\":\"mtadros\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g\",\"caption\":\"mtadros\"},\"url\":\"https:\/\/virtualactivism.org\/education\/author\/mtadros\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"State of Play: Surveillance and Security in VW - Education and Technology Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/","og_locale":"en_US","og_type":"article","og_title":"State of Play: Surveillance and Security in VW - Education and Technology Hub","og_description":"Very very interesting session on surveillance and security on virtual worlds. I actually thought it would be all about &#8216;Muslim terrorists&#8217; and I was quite apprehensive, but then found the session to be absolutely fantastic and very informative. Here are Read More ...","og_url":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/","og_site_name":"Education and Technology Hub","article_published_time":"2009-06-22T02:39:34+00:00","og_image":[{"url":"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg","type":"","width":"","height":""}],"author":"mtadros","twitter_card":"summary_large_image","twitter_misc":{"Written by":"mtadros","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/","url":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/","name":"State of Play: Surveillance and Security in VW - Education and Technology Hub","isPartOf":{"@id":"https:\/\/virtualactivism.org\/education\/#website"},"primaryImageOfPage":{"@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage"},"image":{"@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage"},"thumbnailUrl":"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg","datePublished":"2009-06-22T02:39:34+00:00","author":{"@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b"},"breadcrumb":{"@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#primaryimage","url":"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg","contentUrl":"http:\/\/hakawitech.files.wordpress.com\/2009\/06\/security_panel2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/virtualactivism.org\/education\/state-of-play-surveillance-and-security-in-vw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/virtualactivism.org\/education\/"},{"@type":"ListItem","position":2,"name":"State of Play: Surveillance and Security in VW"}]},{"@type":"WebSite","@id":"https:\/\/virtualactivism.org\/education\/#website","url":"https:\/\/virtualactivism.org\/education\/","name":"Education and Technology Hub","description":"Technology and Education Resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/virtualactivism.org\/education\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/a58d2f8787e73e2be26217913d0bd72b","name":"mtadros","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtualactivism.org\/education\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a259b1d62c18a7fccf8e70573e8c7aeb?s=96&d=mm&r=g","caption":"mtadros"},"url":"https:\/\/virtualactivism.org\/education\/author\/mtadros\/"}]}},"_links":{"self":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/comments?post=157"}],"version-history":[{"count":0,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/posts\/157\/revisions"}],"wp:attachment":[{"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/media?parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/categories?post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtualactivism.org\/education\/wp-json\/wp\/v2\/tags?post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}