Remove story our-democracy-depends-on-secure-elections
article thumbnail

Governance, Technology, and Capitalism.

John Battelle's Searchblog

But as we begin to lose faith in the icons of our former narratives, a nagging and increasingly urgent question arises: In a world where we imaging merging with technology, what makes us uniquely human? Our lives are now driven in large part by data, code, and processing, and by the governance of algorithms.

article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

Some context: Since 1986, I’ve spent my life chased one story: The impact of technology on society. Wired was kind of a first album, as it were, and it focused on the story broadly told. A huge story – the very same story, just expanded – is once again rising. Let’s unpack that and define our terms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

More important, McKay’s work demonstrated that computer models can predict the likely fate of proposed legislative amendments, as well as the paths by which lobbyists can most effectively secure their desired outcomes. In some cases, the objective of that money is obvious. There are three basic challenges involved.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

In our manifesto at the general election we committed to provide people with the ability to require major social media platforms to delete information held about them, especially when that information related to their childhood. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically.

GDPR 120
article thumbnail

Vint Cerf: Maybe We Need an Internet Driver’s License

John Battelle's Searchblog

I had the honor of interviewing Dr. Cerf last month as part of the “ Rebooting Democracy in the Age of AI” lecture series hosted by the Burnes Center for Social Change at Northeastern University. Below is a transcript of our conversation, which, caveat emptor , is an edited version of AI-assisted output. What does that translate into?

article thumbnail

Influence Operations Kill Chain

Schneier on Security

Basically, we know it when we see it, from bots controlled by the Russian Internet Research Agency to Saudi attempts to plant fake stories and manipulate political debate. Since the 2016 US presidential election, there have been an endless series of ideas about how countries can defend themselves.

article thumbnail

Propaganda and the Weakening of Trust in Government

Schneier on Security

On November 4, 2016, the hacker "Guccifer 2.0,: a front for Russia's military intelligence service, claimed in a blogpost that the Democrats were likely to use vulnerabilities to hack the presidential elections. On November 9, 2018, President Donald Trump started tweeting about the senatorial elections in Florida and Arizona.