Hacking

When usability pioneers have All the Feels about the nature of our creeping technological dystopia, how we got here, and what we might need to do to right the ship, it’s wise to pay attention. Don Norman’s preaching resonated with my choir, and they’ve asked me to sing a summary song of our people in bulleted list format:

  • What seemed like a virtuous thing at the time — building the internet with an ethos of trust and openness — has led to a travesty via lack of security, because no one took bad actors into account.
  • Google, Facebook, et al didn’t have the advertising business model in mind a priori, but sort of stumbled into it and got carried away giving advertisers what they wanted — more information about users — without really taking into consideration the boundary violations of appropriating people’s information. (see Shoshana Zuboff’s definitive new book on Surveillance Capitalism for a lot more on this topic)
  • Tech companies have mined the psychological sciences for techniques that — especially at scale — border on mass manipulation of fundamental human drives to be informed and to belong. Beyond the creepy Orwellian slant of information appropriation and emotional manipulation, the loss of productivity and mental focus from years of constant interruptions takes a toll on society at large.
  • We sign an interminable series of EULAs, ToS’s and other lengthy legalese-ridden agreements just to access the now basic utilities that enable our lives. Experts refer to these as “contracts of adhesion” or “click-wrap,” as a way of connoting the “obvious lack of meaningful consent.” (Zuboff)
  • The “bubble effect” — the internet allows one to surround oneself completely with like-minded opinions and avoid ever being exposed to alternative points of view. This has existential implications for being able to inhabit a shared reality, as well as a deleterious effect on public discourse, civility, and the democratic process itself.
  • The extreme commercialization of almost all of our information sources is problematic, especially in the age of the “Milton Friedman-ification” of the economic world and the skewing of values away from communities and individuals, towards a myopic view of shareholder value and all the attendant perverse incentives that accompany this philosophical business shift over the past 50 years. He notes that the original public-spiritedness of new communication technologies has historically been co-opted by corporate lobbyists via regulatory capture — a subject Tim Wu explores in-depth in his excellent 2011 book, “The Master Switch: The Rise and Fall of Information Empires.

Is it all bleak, Don?! His answer is clear: “yes, maybe, no.” He demurs on positing a definitive answer to all of these issues, but he doesn’t really mince words about a “hunch” that it may in fact involve burning it all down and starting over again.

Pointing to evolution, Norman notes that we cannot eke radical innovation out of incremental changes — and that when radical change does happen it is often imposed unexpectedly from the outside in the form of catastrophic events. Perhaps if we can’t manage to Marie Kondo our way to a more joyful internet, we’ll have to pray for Armageddon soon…?! 😱

https://www.youtube.com/watch?v=uCEeAn6_QJo
Read more

I still see a lot of denialism on this point about the DNC email hacks from the far-left (or the alt-left, depending on your favored terminology), which is a bit devastating to see as it essentially parrots the pro-Russian ideology of the far-right (both the alt-right and the neo-libertarian flavors). Green Party candidate Jill Stein is an especially pernicious promoter of this myth that Vladimir Putin is a poor, innocent, peaceful world leader who is being bullied by NATO (when in fact, Russia has been the aggressor since its annexation of Crimea in 2014).

DNC email hacks forensic evidence

Two separate Russian-affiliated adversaries were behind the attacks, according to a post-mortem by cyber-security firm CrowdStrike when the news of the intrusion first broke in early June, 2016. This has since been confirmed by other independent security firms including Fidelis, Mandiant, SecureWorks, and ThreatConnect as well as corroborated by analysis from Ars Technica and Edward Snowden.

At this point the US intelligence community is confident enough to formally accuse Russia of involvement in the hacks, and are currently investigating other breaches of voter registration databases in Arizona and Illinois as well as in Floridaβ€Šβ€”β€Šthe key battleground state from the 2000 election that handed GWB an unfortunate victory. Elsewhere, there is ample evidence of Putin’s extensive disinformation campaign being waged online (including several experiences I have myself witnessed), which is the continuation of a long through line of wielding propaganda as a tool from the former head of the KGB.

Related:

  • A timeline of recent Russian aggression
  • A RussiaGate Dictionary: Lexicon for the New Cold War
  • A RussiaGate Bestiary: Principal actors and related extras in the 2016 election scandal
  • The Russian Mafia State: How the former USSR has become a sclerotic kleptocracy under the rule of former KGB agent Vladimir Putin, who vowed revenge on the West after his station in Dresden, East Germany was overrun by angry citizens during the month leading up to the fall of the Berlin Wall.
Read more