SlideShare ist ein Scribd-Unternehmen logo
1 von 127
Social Media & Integrity Creating law without  controlling infrastructure  is #fail
Technology brings theoretical rights within practical reach
There is an ethical dimension to everything
MYTH of NEUTRAL technology Guns don’t kill people…
Spot the ethical problem
THE MEDIUM... SHAPES AND CONTROLS THE SCALE AND FORM OF HUMAN ASSOCIATION AND ACTION McLuhan, M. (1962) The Gutenberg Galaxy
Langford WInner
Regulation of technology is the regulation of democracy
Integrity & Technology
Physical surveillance
Paparazzi (1898)
Advertising (1902) Robertson v. Rochester Folding Box Co (1902) Domstolen accepterade inte Brandeis & Warrens argument om “common law” rättighet
Hidden camera 1928 The execution of Ruth Snyder 1928 Twitter in TPB case
The Right to Privacy That the individual shall have full protection in person and in property is a principle as old as the common law; but it has been necessary from time to time to define anew the exact nature and extent of such protection. Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)
LAW
UNDHR No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. (Art 12)
Art 8 ECHR 1. Everyone has the right to respect for his private and family life, his home and his correspondence.
Background Datalagen (1973) Moores Law Data ProtectionDirective (1995) Personuppgiftslagen 1998
PERSONUPPGIFTSLAGEN(1998:204)
All slags information som direkt eller indirekt kan hänföras till en fysisk person som är vid livet utgör personuppgift. Inte företag Ingen integritet efter döden Personuppgift
Samtycke Godtar behandling Viljeyttring Frivillig Särskild Otvetydig Efter information Inga formkrav 31
Behandling Personuppgifter får behandlas bara för särskilda, uttryckligt angivna ändamål. Uppgifter som man har samlat in för ett visst ändamål får man inte senare behandla på ett sätt som inte är förenligt med ändamålet.
Känsliga uppgifter Förbud gäller behandling av: Ras, etniskt ursprung, politiska åsikter, religiös eller filosofisk övertygelse, hälsa, sexualliv, samt medlemskap i fackförening Förbud gäller inte: Uttrycklig samtycke, offentliggjorda uppgifter, nödvändig behandling, inom ideella org., inom hälso- & sjukvård
bits of INFORMATION
autonomy
And what about Manufacturers responsibility?
Won’t someone think of the CHILDREN
Child Locator GPS Watch
Teen arrive alive
& other interesting toys
Shower AM-FM Mirror Radio 
AM/FM Clock radio wireless hidden camera
System #fail
What is social media?
12 timmar senare
Strategy
Technology	controls how & what we interact, create & THink…
Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Wikipedia Sharing decade
My Space Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Second Life Skype Wikipedia Google c:a 1998
My Space Digg YouTube Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Ning Second Life Skype Facebook Flickr Wikipedia Google c:a 1998
My Space Digg Twitter YouTube Linkedin Blogger 1999 2001 2003 2005 2000 2002 2004 2006 Ning Second Life Spotify Flickr Skype Facebook Wikipedia Google c:a 1998
My Space Digg Twitter iphone YouTube Wikileaks Linkedin Blogger 1999 2007 2009 2001 2003 2005 2000 2002 2004 2006 2008 Farmville Ning Second Life Spotify Flickr Skype Facebook Wikipedia Google c:a 1998
Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.
61
2006 2007
we “leak” INFORMATION
…sometimes we shout…
We apply strategies of information control
COMPARTMENTALIZATION
The problem is not that people know things about us but to limit who knows what…
&
searchability
Delete:The Virtue of Forgetting in the Digital Age Viktor Mayer-Schönberger
New social norms
Convenience is king
Enter the age of FREE
Sökmotor Reader Maps Kalender Scholar Och mycket mer… GRATIS?
The Gmail service includes relevant advertising and related links based on the IP address, content of messages and other information related to your use of Gmail. We provide advertisers only aggregated non-personal information such as the number of times one of their ads was clicked. We do not sell, rent or otherwise share your personal information with any third parties except in the limited circumstances described in the Google Privacy Policy, such as when we believe we are required to do so by law.
Leaking & shouting
So whats new?
If you are not paying for it, you're not the customer; you're the product being sold.
From Orwell to Huxley
Testing a theory
interesting resultS
“Statisk information” Addresser Telefonnummer Inkomster, ekonomi & deklarationer Utbildning
There is a great difference between knowing and understanding: you can know a lot about something and not really understand it. CHARLES KETTERING
Understanding others use The misapplication of information
Some examples
Goodbye Sister MaríaJesúsGalán
Norwegian politician
Medical staff
Parents!
Paul Chambers "Crap! Robin Hood airport is closed. You've got a week and a bit to get your shit together otherwise I'm blowing the airport sky high!"
Navy instructor pilots lose flying status for Lake Tahoe dip
"En dag kvaravveckanpådettadårhus"
MATS MÜGGE ”Jättebrabarnskötare - men textenärinteförenlig med vårverksamhet”
Nakenrektor
You’ve got mail… En berättelse om GU,  Google  & studenternas mail
Why?
The network effect
You know you want to… The design effect
If you’re not the customer you’re the product
Eula trumps rights
Purpose of rights?
Autonomy!
Autonomy without knowledge…
© Matt McKeon
© Matt McKeon
© Matt McKeon
© Matt McKeon
© Matt McKeon
How law fails ,[object Object]
 Respect for Autonomy
 The lost role of the state,[object Object]
Thank you!

Weitere ähnliche Inhalte

Ähnlich wie Social Media & Integrity

Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
Mathias Klang
 
Alla vet allt om dig
Alla vet allt om digAlla vet allt om dig
Alla vet allt om dig
Mathias Klang
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
Johnny Schaefer
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
TanaMaeskm
 
20141125 freeman dec14interiortextfinalaccepted
20141125 freeman dec14interiortextfinalaccepted20141125 freeman dec14interiortextfinalaccepted
20141125 freeman dec14interiortextfinalaccepted
Elsa von Licy
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
Mathias Klang
 

Ähnlich wie Social Media & Integrity (20)

Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWING
 
whistleblowing
whistleblowingwhistleblowing
whistleblowing
 
Alla vet allt om dig
Alla vet allt om digAlla vet allt om dig
Alla vet allt om dig
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
8. Whistle Blowing.pptx By Akshit Jain .
8. Whistle Blowing.pptx By Akshit Jain   .8. Whistle Blowing.pptx By Akshit Jain   .
8. Whistle Blowing.pptx By Akshit Jain .
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)
 
APR Ethics, Law &Technology
APR Ethics, Law &TechnologyAPR Ethics, Law &Technology
APR Ethics, Law &Technology
 
AI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott BarryAI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott Barry
 
20141125 freeman dec14interiortextfinalaccepted
20141125 freeman dec14interiortextfinalaccepted20141125 freeman dec14interiortextfinalaccepted
20141125 freeman dec14interiortextfinalaccepted
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 

Mehr von Mathias Klang

Mehr von Mathias Klang (20)

Surveillance in the Simulacrum
Surveillance in the SimulacrumSurveillance in the Simulacrum
Surveillance in the Simulacrum
 
Web of Introverts and Selfie Culture
Web of Introverts and Selfie CultureWeb of Introverts and Selfie Culture
Web of Introverts and Selfie Culture
 
Klang PSU
Klang PSUKlang PSU
Klang PSU
 
Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?Screens & Maps: Is seeing believing?
Screens & Maps: Is seeing believing?
 
Sharing, oversharing and selfies
Sharing, oversharing and selfiesSharing, oversharing and selfies
Sharing, oversharing and selfies
 
Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts Copyright & Licensing: The progress of science & useful arts
Copyright & Licensing: The progress of science & useful arts
 
FOSS & Society
FOSS & SocietyFOSS & Society
FOSS & Society
 
Academic Writing: Things to think about.
Academic Writing: Things to think about. Academic Writing: Things to think about.
Academic Writing: Things to think about.
 
Civil Disobedience & Technology
Civil Disobedience & TechnologyCivil Disobedience & Technology
Civil Disobedience & Technology
 
Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces Regulating Online Public/Private Spaces
Regulating Online Public/Private Spaces
 
Public/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things togetherPublic/Private Spaces: Pulling things together
Public/Private Spaces: Pulling things together
 
Digital Divides and Net Neutrality
Digital Divides and Net NeutralityDigital Divides and Net Neutrality
Digital Divides and Net Neutrality
 
Design and Access to the city
Design and Access to the cityDesign and Access to the city
Design and Access to the city
 
Cities, Suburbs & Design
Cities, Suburbs & DesignCities, Suburbs & Design
Cities, Suburbs & Design
 
Control by design
Control by designControl by design
Control by design
 
Technologies of control & desire
Technologies of control & desireTechnologies of control & desire
Technologies of control & desire
 
Introduction to Civic Media com371
Introduction to Civic Media com371Introduction to Civic Media com371
Introduction to Civic Media com371
 
Image by Wikipedia?
Image by Wikipedia?Image by Wikipedia?
Image by Wikipedia?
 
Platforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & communityPlatforms of Restraint: News aggregators, open webs & community
Platforms of Restraint: News aggregators, open webs & community
 
Is that your book? On content & carriers
Is that your book? On content & carriersIs that your book? On content & carriers
Is that your book? On content & carriers
 

Social Media & Integrity

Hinweis der Redaktion

  1. Came hameháááá! from R'eyes cc by
  2. Reach from Nick in exsilio cc by ncsa
  3. guns kill by warein.holgado by nc sa
  4. OK, who gave the monkey a ray gun_! by Don Solo cc by nc sa
  5. starling flock by pastaboy sleeps cc byLangford Winner Autonomous Technology
  6. 12-06 by Daniel*1977 cc by nc sa
  7. What are you looking at? by Enjoy Surveillance cc by nc sa
  8. 1888 - Kodak nr 1 FörstamassproduceradelådkameranEnkelattanvändaBärbarKortexponeringstid
  9. Bismarck on his deathbed: Maybe this is the first example of the works of Paperazzi: Max Priester & Willy Wilcke took this picture secretly without consent; the even managed to shift the body so that the face would be more visible and turned the clock back. They sold the pictures until the Bismarck family confiscated the plates. The pictures later appeared in a.o. the Frankfurter Illustrierte
  10. A reporter for the New York Daily News, Thomas Howard, sat in the front row as a womannamed Ruth Snyder sat in the electric chair, in Sing Sing, in 1928; he had a concealed camera onhis ankle, and he took a picture of Snyder as the electricity surged through her body. The picturesold an incredible amount of newspapers
  11. Louis Brandeis & Samuel Warren "The Right to Privacy," 4 Harvard Law Review 193-220 (1890-91)
  12. Archives des députés allemands from hamadryades cc by nc sa
  13. Home Computer (by unknown) from Stijn Vogels cc by nc sa
  14. Police 1920 from Eridony cc by
  15. Protection 4 from Jasmin Cormier cc by nc THIS IMAGE IS USED TWICE ON THE SAME SLIDE
  16. business person from Tim Morgan cc by nc sa
  17. Pressed into Service from horizontal.integration cc by nc sa
  18. I Know I Have Lost from Kevan cc by nc
  19. Wilbur Likes Leaves from mommamia cc by nc sa
  20. can birds have a dog fight? by threecee cc by ncsa
  21. running after pigeons by wrote cc by ncSchoolkid chipping trial 'a success'http://www.theregister.co.uk/2007/10/22/kid_chipping_doncaster_go/
  22. http://www.spyshops.ca/trackerbackpack.htm
  23. http://www.brickhousesecurity.com/wf200.html
  24. LEGO Gears of War Minifigs by Dunechaser by nc sa
  25. http://www.dpl-surveillance-equipment.com/100611.html
  26. http://www.dpl-surveillance-equipment.com/1006177.html
  27. evil cat from gagilas cc by sa
  28. AIR travellers will be invited to take part in "virtual strip searches" [X-rays] at Australian airports when the Federal Government begins trials of security screening measures this month. The measures include a body scanner [X-rays] that can see what lies under a person's clothes. The Government says the scanner could detect weapons and explosives, but critics say it is an invasion of privacy. "It provides detailed images of a person's body … which many people might find highly embarrassing," said Stephen Blanks, of the NSW Council for Civil Liberties.http://publik18.blogspot.com/2008/10/privacy-health-fears-over-airport-body.html
  29. http://www.infowars.com/exposed-naked-body-scanner-images-of-film-star-printed-circulated-by-airport-staff/
  30. 11-23-17 from code poet cc by nc sa
  31. Torsdag 3 februari
  32. Chinese chess from whitecat singapore cc by nc
  33. Orkut Demographics http://www.orkut.com/MembersAllHabbo http://www.sulake.com/habbo/index.html?navi=2.1
  34. https://secure.wikimedia.org/wikipedia/en/wiki/List_of_virtual_communities_with_more_than_100_million_users
  35. green on green with red from Darwin Bell cc by
  36. is he talking to me from Leonard John Matthews cc by nc sa
  37. capítulo 1 by atzu cc by nc sa
  38. Salt pans from dachalan cc by nc sa
  39. Always Look on the Bright Side of... from Jon McGovern cc by nc
  40. My manta ray's alright... by dachalan cc by ncsa
  41. Looking for gators..... from katieb50 cc by
  42. goldfish from a_trotskyite cc by nc sa
  43. New Scientist is getting wet from gagilas cc by sa
  44. Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam.[41][42]Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved.[43]Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical."[44][45]Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death.[4
  45. Consumer Watchdogs Flog Google's Privacy Policy (2008)http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.phpGoogle originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038.[12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used.[12] There is no evidence that Google turns over information to the FBI or the NSA, though some users remain anxious about the possibility.[12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft's Bing, use cookies with distant expiration dates as well.Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government[13]. In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)."[14] Google fought the subpoena, due to concerns about users' privacy.[15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access.[16]Steve Ballmer[17], Liz Figueroa[18], Mark Rasch[19], and the editors of Google Watch[20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements.[21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo, allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services[22][23].Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service.[24][25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy.[26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled.[27]In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking.[28][29]Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key.[30][edit] European UnionEuropean Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection.[31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24)[update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users.[32] The resulting modifications to its privacy policies have been met with praise[33].[edit] NorwayThe Data Inspectorate of Norway (Norway is not a member of the EU) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long.[34]
  46. Seamour Sheep + MacBook from Andy Woo cc by nc sa
  47. as train goes by... from atzu cc by nc sa
  48. secret by MistoAcrilico secret from MistoAcrilico cc by nc
  49. 070_365 -- War Is Peace from matthileo cc by nc sa
  50. Who Else Has A Bright Idea? by nhuisman cc by nc sa
  51. 01 students in anatomy class in lecture hall by blacque_jacques cc by nc sa
  52. line by Bright Tal cc by nc sa
  53. Lincoln in the light by mr_mayer cc by nc sa
  54. Iceberg from sweart cc by nc sa
  55. Before you go, can you read my... from YamiPaperDreams!.- cc by nc sa
  56. no entry from notsogoodphotography cc by
  57. Shop Local from fabbio cc by sa
  58. Get thee to a nunnery from kevindooley cc byMaríaJesúsGalán, dubbed 'Sister Internet', had almost 600 Facebook 'friends'at the time of her eviction  Photo: FACEBOOKThe Telegraph http://www.telegraph.co.uk/technology/facebook/8333810/Spanish-nun-expelled-from-order-over-Facebook-usage.html
  59. Stella MwangiRita Ormbostad, deputy mayor of Aure County on Norway’s west coast, wrote that she would rather have “Sami, polar bears and muskox” as winners and that “that’s what we should sell, not that we are open to asylum seekers!”Ormbostad later added that she had “sharpened a spear and bought bongo drums” in anticipation of the Eurovision finals where Mwangi will represent Norway. “Maybe I’ll travel to Africa and watch from there, where I can eat wildebeest!”Ormbostad tried to brush off her comments as merely a joke, but also told local newspaper TidensKrav that “I believe something originally Norwegian sells more and is more suitable for the Norwegian Grand Prix than a song that has African tendencies.”
  60. the doctor will see you now from CmdrCord cc by ncsa
  61. I'm working.(1) by purprin cc by ncsa
  62. My tweet was silly, but the police reaction was absurdFor one joke on Twitter I've had my civil liberties trampled on, and have now got a criminal record“Unfortunately,yesterday I was found guilty and ordered to pay £1,000 in fines and legal costs, which I have to find along with my own legal costs of another £1,000. I am considering an appeal, though I have no means, having left my job due to the circumstances.”http://www.guardian.co.uk/commentisfree/libertycentral/2010/may/11/tweet-joke-criminal-record-airport
  63. Two Navy instructor pilots from San Diego have been forever stripped of flying status and two student pilots will have to repeat training because of a September incident in which they dipped two $33 million helicopters into Lake Tahoe while trying to take photos for the squadron’s Facebook page, a Navy official said Wednesday.http://www.signonsandiego.com/news/2010/dec/22/no-punishment-navy-pilots-who-dipped-helos-lake-ta/http://www.youtube.com/watch?v=qYExH8hpgXI&feature=player_embedded
  64. nuts from Ednaar cc by nd, skrevmannenpåFacebooki en pauspåjobbetpå Volvo iSkövde. Detkostadehonomjobbet. Illojalt, ansåg Volvo ochskickade hem mannendirekt. http://gt.expressen.se/nyheter/1.2275866/kallade-jobb-darhus-mannen-far-sparken
  65. I just couldn’t live with myself... from Eric "Claptøn" Nelsøn cc by nc sa
  66. Why do you do this every day? from edmittance cc by ncsa
  67. Forest For The Nails from Brandon Heyer cc by ncsa
  68. Prego from marcodede cc by
  69. [قطرةتفاؤل] from [ALHanouf _ Photography's]²º¹¹ cc by
  70. Untitled from Kennedy Garrett cc by
  71. Barbie And Barbie's Boyfrend Use... from kiewic cc by
  72. Eskatol (8 of 12) from Synne Tonidas cc by nc sa
  73. Fancy Glasses by RobertFrancis cc by ncsa
  74. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  75. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  76. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  77. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  78. Graphic by Matt McKeon source http://mattmckeon.com/facebook-privacy/ This image is not CC licensed.
  79. black_face by rent-a-moose cc by ncsa
  80. Blyth beach huts from freefotouk cc by nc
  81. and in last place by ...tim cc by ncnd