About forty minutes into Risk, Laura Poitras’s messy documentary portrait of Julian Assange, the filmmaker addresses the viewer from off-camera. “This is not the film I thought I was making,” she says. “I thought I could ignore the contradictions. I thought they were not part of the story. I was so wrong. They are becoming the story.” By the time she makes this confession, Poitras has been filming Assange, on and off, for six years. He has gone from a bit player on the international stage to one of its dramatic leads.
Prototype Politics: Technology-Intensive Campaigning and the Data of Democracy
by Daniel Kreiss
Hacking the Electorate: How Campaigns Perceive Voters
by Eitan D. Hersh
That the Republicans didn’t lose can be attributed in large measure to their expert manipulation of social media: Donald Trump is our first Facebook president. His team figured out how to use all the marketing tools of Facebook, as well as Google, the two biggest advertising platforms in the world, to successfully sell a candidate that the majority of Americans did not want. They understood that some numbers matter more than others—in this case the number of angry, largely rural, disenfranchised potential Trump voters—and that Facebook, especially, offered effective methods for pursuing and capturing them.
From its first issue in 1963, Robert Silvers was either co-editor with Barbara Epstein or, after her death in 2006, editor of The New York Review. Bob worked almost to the very end of his life, which would be no surprise to those who knew him well, including those who have written these brief memoirs.
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
by Cathy O’Neil
Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy
by Ariel Ezrachi and Maurice E. Stucke
It would be naive to think that there is a firewall between commercial surveillance and government surveillance. There is not. Many of us have been concerned about digital overreach by our governments, especially after the Snowden revelations. But the consumerist impulse that feeds the promiscuous divulgence of personal information similarly threatens our rights as individuals and our collective welfare.
The recent news that voting machines had been hacked for sport at the Def Con hackers’ conference, should not have been news at all. Since computerized voting was introduced more than two decades ago, it has been shown again and again to have significant vulnerabilities that put a central tenet of American democracy—free and fair elections—at risk.
In the waning days of the 2016 campaign Trump’s data team knew exactly which voters in which states they needed to persuade on Facebook and Twitter and precisely what messages to use. The question is: How did the Russians know this, too? Largely ignored in this discussion is one possibility: that the Russians themselves, through their hacking of Democratic Party records, had better information than Trump.
Given what the files in the recent WikiLeaks release contain, and given that they’ve landed in the hands of Julian Assange, WikiLeaks’s press release might be read more as a threat than an invitation. Julian Assange has not destroyed the source codes that came to him with Vault 7, the algorithms that run these programs, and he has not ruled out releasing them into the wild, where they would be available to any cyber-criminal, state actor, or random hacker. This means that Assange is not just a fugitive as he often calls himself, he is a fugitive who is armed and dangerous.