[liberationtech] Current libtech funding initiatives

2014-02-03 Thread Marcin de Kaminski
Hi all,

Is there a comprehensive list of current initiatives funding libtech (and 
related) projects? If not, what initiatives do you know of that are currently 
(or soon) taking applications or are interested in discussing interesting 
projects?

Best,
Marcin

-- 
Marcin de Kaminski
PhDc Sociology of Law, University of Lund
Lund University Internet Institute, Cybernorms Research Group
Personal homepage - www.dekaminski.se

Phone#: +46-(0)768-045151

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] parallel construction hack

2014-02-03 Thread Jonathan Wilkes

Hi list,
 Reflecting a bit on parallel construction, it seems to me that no 
matter how sophisticated the system, you _cannot_ have a perfect 
firewall between the illegal surveillance used to target an individual 
and the officers who appear to use legal means in order to make the 
arrest.  Here are the reasons why:


* somehow, someone must communicate to the arresting officers where to 
go and what to look for, and that is almost certainly not part of their 
normal patrol
* having a perfect firewall would potentially put the arresting officers 
in danger.  If the officers truly have no idea that the "random" stop 
they are instructed to make is going to be a drug kingpin, they aren't 
going to be too crazy about participating.

* people like to talk

What if defense lawyers banded together, read through the leaked 
documents about parallel construction, and created a standardized series 
of questions to ask officers on the stand for cases where parallel 
construction is a possibility?  These questions could be cleverly 
constructed to have a broad application-- succinctly covering most of 
the known and likely scenarios-- while at the same time requiring direct 
yes-or-no answers from the officers.  If they cover their bases then 
officers who made the arrests using parallel construction would either 
have to a) be evasive and dodge some of the questions or b) perjure 
themselves.


Now nobody wants to perjure themselves in a courtroom.  But even more 
than that, nobody wants to be part of a group that is systematically 
perjuring themselves in the courtroom.  The more members of the group 
there are, the more any particular member of the group may be subject to 
unpredictable repercussions.  So either the testimony in cases that use 
parallel construction becomes ineffectual due to chronic evasiveness, 
_or_ the cost to the officers testifying becomes too great for them to 
willingly participate in the program.  Or maybe a little of both.


Finally, this wouldn't have any harmful effect on officers who make 
arrests that aren't part of parallel constructions.  They'd just 
continue doing their jobs.


Best,
Jonathan
--
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change 
to digest, or change password by emailing moderator at compa...@stanford.edu.


Re: [liberationtech] New IT security measures underway

2014-02-03 Thread Jonathan Wilkes

On 02/03/2014 06:09 PM, John Adams wrote:

[...]

Additionally, your statement of: "Closed-Source software cannot be 
secured" -- I prefer open source software but I disagree that it 
cannot completely be secured. It depends only on the motivation, 
financial resources, and merit of the company attempting to secure 
said software. Just because you don't happen to get a look at the 
source code doesn't make this a definitive statement. There are 
numerous examples of commercial software being immensely hard to defeat.


I don't know the name for it, but there's definitely a misleading (or 
misled) rhetorical device in the paragraph above.  I see it everytime 
someone mentions the truism about free software being the obvious 
foundation for security software.  I'm not a security expert so let me 
explain with an analogy:


Because of an injury, Django Reinhardt only used two fingers of his left 
hand to play guitar.  He's a pioneering jazz guitarist.  That's a pretty 
cool anecdote.


On an unrelated note, go to any serious guitar studio and you will find 
that students are taught to use more than two fingers when trying to 
master the guitar.  There isn't a guitar teacher in the world that would 
knowingly limit his/her students to develop with _fewer_ resources than 
they actually have.


But I bet if there were a large number of guitar teachers who-- for 
historical reasons-- had tragically been taught to play with only two 
fingers, they'd constantly be reminded everyone else that you _can_ 
indeed become a great guitarist even with a horrible technique.  That'd 
be a detriment to guitar pedagogy, as I believe it's a detriment to 
creating and maintaining security software.


-Jonathan
--
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change 
to digest, or change password by emailing moderator at compa...@stanford.edu.


Re: [liberationtech] New IT security measures underway

2014-02-03 Thread John Adams
On Mon, Feb 3, 2014 at 3:43 AM, Rich Kulawiec  wrote:

> On Fri, Jan 31, 2014 at 09:01:06AM -0800, Yosem Companys quoted:
> > "One of these mandates includes having employees with Windows XP
> > laptops and desktops migrate to Windows 7 Enterprise or Ultimate, or
> > Windows 8 Pro or Enterprise, by April 8. Employees will be able to
> > download the latest Microsoft software for free under a new campus-wide
> > license obtained in November 2013."
>
> Let's stop right there.
>
> If this entire initiative was actually about security in any way,
> shape or form, then this paragraph would not be present.  Closed-source
> software cannot be secured, and changing from one insecure version
> of Windows to another is merely an expensive, time-consuming exercise
> that achieves nothing of significance.


Disclaimer: I can't stand windows and I've nearly banned it from work place.

Reality: You don't understand business nor threat modeling.

Microsoft is, unfortunately, the backbone of most world-wide business.
There are a host of applications from finance, to statistical modeling, HR
planning and otherwise that only run on Windows. You can't easily kill it
off. When and if we manage to kill it off, attackers will move to the new
thing (say. Mac OS) and focus efforts there.

So, for the users that must run Windows on a daily basis, they're electing
to offer free upgrades. Good on them. The older versions (such as XP) are
reaching end of life for support (and security support) and potentially
will become a source of indefinite zero-days. Calling this
action meaningless due to your implicit bias against commercial software
and windows is a fallacy.  Properly implemented, it will result in a
reduction of the overall threat to the University.

Unfortunately, their implementation process isn't very good. I don't agree
with the open-ended nature of their solution. Relying on the users to
upgrade themselves means generally that the upgrade will never occur. A
compliance-enforcing approach, such as those used in the Cisco and Juniper
VPN clients would be better. For example, "You have 30 days to upgrade to
Windows 7 or VPN and 802.1X will block you from joining our network" is
much better than "Go secure yourselves, we'll be over here"

Additionally, your statement of: "Closed-Source software cannot be secured"
-- I prefer open source software but I disagree that it cannot completely
be secured. It depends only on the motivation, financial resources, and
merit of the company attempting to secure said software. Just because you
don't happen to get a look at the source code doesn't make this a
definitive statement. There are numerous examples of commercial software
being immensely hard to defeat.

-john
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] "The Family of Man" and the Politics of Attention in Cold War America - Program on Liberation Technology

2014-02-03 Thread Yosem Companys
http://liberationtechnology.stanford.edu/events/the_family_of_man_and_the_politics_of_attention_in_cold_war_america/

"The Family of Man" and the Politics of Attention in Cold War America  

CDDRL Seminar Series

DATE AND TIME
February 6, 2014
4:30 PM - 6:00 PM

AVAILABILITY
Open to the public
No RSVP required

SPEAKER
Fred Turner - Associate Professor of Communication and Director of the Program 
in Science, Technology, and Society at Stanford University

Abstract
In 1955, the Museum of Modern Art mounted one of the most widely seen – and 
widely excoriated – photography exhibitions of all time, The Family of Man. For 
the last forty years, critics have decried the show as a model of the 
psychological and political repression of cold war America. This talk 
challenges that view. It shows how the immersive, multi-image aesthetics of the 
exhibition emerged not from the cold war, but from the World War II fight 
against fascism. It then demonstrates that The Family of Man aimed to liberate 
the senses of visitors and especially, to enable them to embrace racial, sexual 
and cultural diversity – even as it enlisted their perceptual faculties in new 
modes of collective self-management. For these reasons, the talk concludes, the 
exhibition became an influential prototype of the immersive, multi-media 
environments of the 1960s – and of our own multiply mediated social world today.

Fred Turner is Associate Professor of Communication and Director of the Program 
in Science, Technology, and Society at Stanford. He is the author of several 
books on media technology and American cultural history. In January, the 
University of Chicago Press published The Democratic Surround: Multimedia and 
American Liberalism from World War II to the Psychedelic Sixties, from which 
this talk is drawn.
 
LOCATION
Wallenberg Theater
Wallenberg Hall
450 Serra Mall, Building 160
Stanford, Ca 94305-2055

FSI CONTACT
Kathleen Barcos -- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] 3 Job Openings at Syria Justice & Accountability Center

2014-02-03 Thread Peter Fein
I'm helping IREX (irex.org) and the Syria Justice & Accountability
Center (syriaaccountability.org) with technical hiring for the 3
positions listed below: Technology Officer, Web Developer & System
Administrator.

For any questions or to apply, please contact Andrew White awh...@irex.org

Technology Officer

Position Summary

IREX, an international nonprofit organization, seeks a Technology
Officer for the Syrian Justice & Accountability Centre (SJAC). SJAC
promotes justice and accountability in Syria by ensuring that
violations of international criminal, humanitarian, and human rights
law are documented to serve as a deterrent to continuing abuses and
for future accountability and transitional justice efforts. The
officer will use their expertise to lead the center's IT strategy and
systems development and implementations.


Required Qualifications

Bachelor's degree in Information Management, Computer Science,
Computer Engineering or related field. Significant work experience in
IT may be acceptable in lieu of formal degree

At least 3 years of experience in managing IT projects, staff,
contracts and infrastructure

Knowledge of Python, Django, Solr & MySQL

Experience architecting distributed systems supporting large
heterogenous data sets

Deep understanding of web development, data modelling and software testing

RFP writing skills and proposals evaluation and vendors management


Preferred Qualifications

Cyber security background is preferred

Familiarity with Javascript, AJAX, AWS, video and image processing,
geographic data

Ability to handle confidential information

Arabic language is a plus


System Administrator
--
Position Summary

IREX, an international nonprofit organization, seeks a System
Administrator for the Syrian Justice & Accountability Centre (SJAC).
SJAC promotes justice and accountability in Syria by ensuring that
violations of international criminal, humanitarian, and human rights
law are documented to serve as a deterrent to continuing abuses and
for future accountability and transitional justice efforts. The
sysadmin will use their expertise to manage, update, backup, debug and
ensure security of all systems, platforms and infrastructure within
the SJAC.


Required Qualifications

Bachelor's degree in Information Management, Computer Science,
Computer Engineering or related field. Significant work experience
with IT infrastructures may be acceptable in lieu of formal degree

Deep knowledge of Linux operating systems (Fedora, CentOS, Ubuntu) is a must.

Strong knowledge in Bash scripting

Experience in administering databases, web servers and security
services such as SSH, VPN, Nginx, Apache, Solr, MySQL & RabbitMQ

Cyber security background and experience.

Familiarity with AWS and other cloud services.


Preferred Qualifications

Familiarity in Python is a plus.

Experience with modern devops tools (Chef, Ansible, Salt) is desirable.

Ability to handle confidential information.

Arabic language familiarity is a plus



Web Developer
---
Position Summary

IREX, an international nonprofit organization, seeks a Web Developer
for the Syrian Justice & Accountability Centre (SJAC). SJAC promotes
justice and accountability in Syria by ensuring that violations of
international criminal, humanitarian, and human rights law are
documented to serve as a deterrent to continuing abuses and for future
accountability and transitional justice efforts.The developer will use
their expertise to design, develop, implement and debug solutions,
websites and web application within the SJAC.


Required Qualifications

Bachelor's degree in Information Management, Computer Science,
Computer Engineering or related field. Significant work experience in
web development may be acceptable in lieu of formal degree

At least 2 years web development experience in a best practices
environment, including testing and documentation

Strong programming skills in Python and Javascript.

Deep understanding and previous experience in Django, Solr, MySQL,
haystack, celery, Backbone

Strong understanding of AJAX and responsive design

Good understanding of modern web stacks, including caching, web server
configuration and database design and querying


Preferred Qualifications

Familiarity in AWS, video and image processing, geographic data is a plus

Ability to handle confidential information

Arabic language familiarity is a plus


-- 
Peter Fein | wearpants.org | @wearpants

I read email at the start and end of each day. IM if urgent.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Who is taking part in #Hack4Good 0.5?

2014-02-03 Thread Kyle Maxwell
I hope to be able to participate. Not enough of these support online/remote
participation, so when one does, I want to encourage them! :)


On Mon, Feb 3, 2014 at 7:06 AM, Security First  wrote:

> Hi everyone,
>
> Just wondering who on the list is taking part in #Hack4good this weekend?
>
> Some of the Security First team in London are going to be taking part and
> it would be great to meet anyone on the LiberationTech list who is gonna be
> there / have a chat on Skype for those online :)
>
> If your interested in contributing some code over the weekend, our project
> team page on Geeklist is here:
>
> https://geekli.st/hackathon/52c49d837689332d5f19/project/52ea5534b3b6fb4d00b1c51e
>
> All the best!
> -SF
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> compa...@stanford.edu.
>



-- 
Kyle Maxwell [krmaxw...@gmail.com]
Twitter: @kylemaxwell
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Who is taking part in #Hack4Good 0.5?

2014-02-03 Thread Security First
Hi everyone,

Just wondering who on the list is taking part in #Hack4good this weekend?

Some of the Security First team in London are going to be taking part and
it would be great to meet anyone on the LiberationTech list who is gonna be
there / have a chat on Skype for those online :)

If your interested in contributing some code over the weekend, our project
team page on Geeklist is here:
https://geekli.st/hackathon/52c49d837689332d5f19/project/52ea5534b3b6fb4d00b1c51e

All the best!
-SF
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] New IT security measures underway

2014-02-03 Thread Rich Kulawiec
On Fri, Jan 31, 2014 at 09:01:06AM -0800, Yosem Companys quoted:
> "One of these mandates includes having employees with Windows XP
> laptops and desktops migrate to Windows 7 Enterprise or Ultimate, or
> Windows 8 Pro or Enterprise, by April 8. Employees will be able to
> download the latest Microsoft software for free under a new campus-wide
> license obtained in November 2013."

Let's stop right there.

If this entire initiative was actually about security in any way,
shape or form, then this paragraph would not be present.  Closed-source
software cannot be secured, and changing from one insecure version
of Windows to another is merely an expensive, time-consuming exercise
that achieves nothing of significance.

If that statement isn't clear:


https://mailman.stanford.edu/pipermail/liberationtech/2013-March/007499.html

So the people behind this farsical exercise at Stanford either don't
understand security or don't care about it.  If they actually did,
then they would *ban* Windows from the environment and phase out every
system currently running it.

That is not, by the way, equivalent to a claim that banning Windows fixes
all the security problems.  Of course it doesn't.  But it's a great
first step, and it facilitates many subsequent steps which, in combination,
could substantially raise the bar that attackers have to clear.  And that
would of course go a long way toward protecting PII from a multitude of
attack vectors.

But as long as Stanford sticks with an operating system that is not
only insecure, but insecurable (see above link), they have chosen a
path that inevitably leads to failure.

Which raises the question: what, exactly, are they playing at here?
Is this just a campus-wide CYA?  So that when the next breach, and
the next one, and the next one come along they can say "but see? look
at all the things we did!" and do the usual "nobody could have foreseen"
PR schtick?  Why doesn't Stanford *really* care about security
instead of just pretending that it does?

---rsk
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Developer and project staff positions available at FrontlineSMS

2014-02-03 Thread Laura Walker Hudson
Hi all

Apologies for cross-posting. 

We’re hiring! We’re currently looking for developers to join our awesome 
Nairobi-based team, working on our new suite of products including new 
FrontlineSMS, FrontlineCloud and a new Android app, among other things… also 
hiring project staff for mobile money and governance projects.

Check out the full list here: 
www.frontlinesms.com/connect-with-us/jobs-and-internships/

Thank you!

Laura


--

Laura Walker Hudson
Chief Executive Officer

Social Impact Lab Foundation
The Makers of FrontlineSMS 
\o/
 
ke m: +254 (0)707 181522
uk m: +44 (0) 7771 592970
us m: +1 (646) 460 5853

e: la...@frontlinesms.com
skype: laurawhudson
twitter: @laurawhudson
 
www.frontlinesms.com

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.