Quotulatiousness

August 7, 2013

Bruce Schneier – “it’s becoming clear that we can’t trust anything anyone official says about these programs”

Filed under: Government, Media, USA — Tags: , , , , , , — Nicholas @ 08:39

Bruce Schneier talks about the need to restore trust in government and the internet after all the proof we’ve had lately that “they” are lying to us pretty much all the time:

In July 2012, responding to allegations that the video-chat service Skype — owned by Microsoft — was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company’s blog to deny it.

Turns out that wasn’t quite true.

Or at least he — or the company’s lawyers — carefully crafted a statement that could be defended as true while completely deceiving the reader. You see, Skype wasn’t changing its protocols to make it possible for the government to eavesdrop on users, because the government was already able to eavesdrop on users.

At a Senate hearing in March, Director of National Intelligence James Clapper assured the committee that his agency didn’t collect data on hundreds of millions of Americans. He was lying, too. He later defended his lie by inventing a new definition of the word “collect,” an excuse that didn’t even pass the laugh test.

As Edward Snowden’s documents reveal more about the NSA’s activities, it’s becoming clear that we can’t trust anything anyone official says about these programs.

Google and Facebook insist that the NSA has no “direct access” to their servers. Of course not; the smart way for the NSA to get all the data is through sniffers.

Apple says it’s never heard of PRISM. Of course not; that’s the internal name of the NSA database. Companies are publishing reports purporting to show how few requests for customer-data access they’ve received, a meaningless number when a single Verizon request can cover all of their customers. The Guardian reported that Microsoft secretly worked with the NSA to subvert the security of Outlook, something it carefully denies. Even President Obama’s justifications and denials are phrased with the intent that the listener will take his words very literally and not wonder what they really mean.

[…]

Ronald Reagan once said “trust but verify.” That works only if we can verify. In a world where everyone lies to us all the time, we have no choice but to trust blindly, and we have no reason to believe that anyone is worthy of blind trust. It’s no wonder that most people are ignoring the story; it’s just too much cognitive dissonance to try to cope with it.

This sort of thing can destroy our country. Trust is essential in our society. And if we can’t trust either our government or the corporations that have intimate access into so much of our lives, society suffers. Study after study demonstrates the value of living in a high-trust society and the costs of living in a low-trust one.

August 6, 2013

The Electronic Frontier Foundation on reforming the NSA

Filed under: Government, Law, Liberty, USA — Tags: , , , , — Nicholas @ 11:36

The EFF has a few suggestions on how to go about reining-in the NSA:

While we still believe that the best first step is a modern Church Committee, an independent, public investigation and accounting of the government’s surveillance programs that affect Americans, members of Congress seem determined to try to enact fixes now. Almost a dozen bills have already been introduced or will be introduced in the coming weeks.

While we’re also waiting to see what the various bills will look like before endorsing anything, here’s — in broad strokes — what we’d like to see, and what should be avoided or opposed as a false response. We know full well that the devil is in the details when it comes to legislation, so these are not set in stone and they aren’t exhaustive. But as the debate continues in Congress, here are some key guideposts.

This first post focuses on surveillance law reform. In later posts we’ll discuss transparency, secret law and the FISA Court as well as other topics raised by the ongoing disclosures. In short, there’s much Congress can and should do here, but we also need to be on the lookout for phony measures dressed as reform that either don’t fix things or take us backwards.

August 4, 2013

New tools for the surveillance state

Filed under: Government, Liberty, USA — Tags: , , , , — Nicholas @ 11:01

James Miller on token attempts to roll back the security state by local governments and other groups:

New surveillance technology lowers the barrier of effort needed to soak the productive class of the surplus fruits of its labor. From monitoring backyards to ensure taxes are being paid on swimming pools to spying on farmers who violate agricultural regulations, states across the globe are already using new spy tools to extort more loot from the greater public.

All the while, the political class gives an assurance that the technological innovation will not be abused. Newspaper editors parrot the message and paint any critic as a tinfoil hat loon who thinks Big Brother sleeps under their bed. And then there are the television intellectuals who take great joy in making flippant remarks about conspiracy theorists. Each of these personalities pictures him or herself as sitting a few ladder rungs above the horde of bumbling mass-men.

One has to be either lying or painfully ignorant to believe government will not abuse surveillance drones. State officials have rarely failed to use their capacity to terrify the populace. Just recently, journalist Glenn Greenwald and the Guardian revealed that the National Security Agency sweeps up the internet activity of all U.S. residents absent any warrants. Prior to the leak, those politicians in charge of overseeing the government’s oversight activities claimed the snooping was done in the public good and not as widespread as suspected. The new details of the program contradict the assurance, as the NSA’s spy activity is more intrusive – and prone to abuse – than originally thought.

A sterling record of misconduct is still not enough to convince enlightened thinkers and academics of the state’s propensity to terrorize. There are still a handful of civil liberty organizations calling attention to the dangers of the widespread use of surveillance drones and data gathering. But their beef is focused more on the right to privacy rather than a usurpation of basic property rights.

August 1, 2013

“That kind of grassroots power tends to make government officials jittery”

Filed under: Law, Media, USA — Tags: , , — Nicholas @ 12:34

J.D. Tuccille looks at the rise of Twitter … not so much its rise in users, but the rise in government interest and interference:

Twitter information requests 2012-13You know you’ve arrived as an online media operation when governments take an interest in who is speaking out, and make efforts to muzzle what’s published. That’s definitely the case with Twitter, the microblogging platform that started as an outlet for exhibitionist ADHD sufferers, only to become a powerful medium for sharing news and grassroots organizing. According to the company’s latest transparency report, governments around the world are issuing ever-more demands for information about the service’s users, and stepping up efforts to suppress tweeted content.

From January 1 through June 30 of this year, Twitter received 1,157 government requests for private information about users and accounts, up from 849 during the same period in 2012. Of those, authorities in the United States were responsible for 902 requests. Twitter complied in whole or part with 55 percent of all requests — 67 percent of those originating in the U.S.

Interestingly, roughly 20 percent of information requests issued by American authorities were “under seal,” meaning that Twitter was forbidden to fulfill its usual policy of informing users about requests for their private information.

July 31, 2013

The congressional defenders of privacy

Filed under: Government, Law, Liberty, USA — Tags: , , , , , — Nicholas @ 11:12

Jacob Sullum in Reason:

“This is not a game,” Mike Rogers angrily warned last week, urging his colleagues in the House to vote against an amendment that would have banned the mass collection of telephone records by the National Security Agency (NSA). “This is real. It will have real consequences.”

I hope Rogers is right. Despite the Michigan Republican’s best efforts to portray the amendment as a terrifying threat to national security, it failed by a surprisingly narrow margin that could signal the emergence of a bipartisan coalition willing to defend civil liberties against the compromises supported by leaders of both parties.

Rogers was not surprised by the recent revelation that the NSA routinely collects information about every phone call Americans make, just in case it may prove useful in the future. As chairman of the House Intelligence Committee, he knew about the program for years, and he had no problem with it.

Not so two other Michigan congressmen: Justin Amash, a 33-year-old libertarian Republican serving his second term, and John Conyers, an 84-year-old progressive Democrat first elected in 1965. These two legislators, conventionally viewed as occupying opposite ends of the political spectrum, were outraged by the NSA’s data dragnet, especially since representatives of the Bush and Obama administrations had repeatedly denied that any such program existed.

The measure that Amash and Conyers proposed as an amendment to a military spending bill would have required that records demanded under Section 215 of the PATRIOT Act, which authorizes secret court orders seeking “any tangible things” deemed “relevant” to a terrorism investigation, be connected to particular targets. Although it was a pretty mild reform, leaving in place the wide powers granted by Section 215 while repudiating the Obama administration’s even broader, heretofore secret interpretation of that provision, the amendment was viewed as a quixotic effort.

July 30, 2013

The return of “lawful access”

Filed under: Cancon, Law, Liberty, Media, Technology — Tags: , , , , — Nicholas @ 07:56

Michael Geist on the Canadian implications of some information that was published in a Buzzfeed article about a Utah ISP and the NSA’s installation of a “little black box” in their network:

The article describes how a Foreign Intelligence Service Act (FISA) warrant allowed the NSA to monitor the activities of an ISP subscriber by inserting surveillance equipment directly within the ISP’s network. The experience in Utah appears to have been replicated in many other Internet and technology companies, who face secret court orders to install equipment on their systems.

The U.S. experience should raise some alarm bells in Canada, since the now defeated lawful access bill envisioned similar legal powers. Section 14(4) of the bill provided:

    The Minister may provide the telecommunications service provider with any equipment or other thing that the Minister considers the service provider needs to comply with an order made under this section.

That provision would have given the government the power to decide what specific surveillance equipment must be installed on private ISP and telecom networks by allowing it to simply take over the ISP or telecom network and install its own equipment. This is no small thing: it literally means that law enforcement (including CSIS) would have had the power to ultimately determine not only surveillance capabilities but the surveillance equipment itself.

While Bill C-30 is now dead, the government may be ready resurrect elements of it. Earlier this month, a cyber-bullying report included recommendations that are lifted straight from the lawful access package.

July 14, 2013

Unwanted contact

Filed under: Liberty, Randomness — Tags: , , — Nicholas @ 09:52

At Samizdata, Natalie Solent had a rather strong reaction to an unwanted form of contact the other day:

Discussion point: the ethical issues surrounding unsolicited sales phone calls

Is it better to just hang them or should we draw and quarter first?

A few days on, and she’s a bit more philosophical about it:

Before being overwhelmed by phone-induced homicidal rage the other day, I had intended to discuss a subject that has been interesting me lately, namely how difficult it is to specify in advance rules for social interaction. More specifically, I was pondering how hard it is to lay down rules for dealing with unwanted contact. Cold calling is one form of that; what are traditionally described as “unwanted advances” are another.

The problem is that word “unwanted”. To say, as the organisational psychologist quoted in this article does, that “An unwanted advance is a form of injustice”, strikes me as unfair. We are not telepaths. Quite often the only way one can find out that unwanted contact is unwanted is to ask, that is, to initiate unwanted contact. On the other hand while we may not have telepathy, we most of us do have empathy to help us guess in advance when advances might be unwelcome. Phone sales companies know to the fifth decimal place exactly how likely their calls are to be welcome. They know that the first four of those decimal places are filled by zeros, scumbags that they are. Few men asking a woman out have quite such a large database of prior results upon which to draw. I’m glad I’m not a guy! That last breath before you open your mouth to begin the sentence that might get you rejected cruelly or rejected kindly must be painful.

July 4, 2013

Bonfire of the civil liberties

Filed under: Liberty, Media, Politics, USA — Tags: , , , , , , — Nicholas @ 11:06

A recent article by Dan Gillmore in the Guardian was reposted on Alternet yesterday:

No one with common sense believes Obama is planning to become a dictator. But the mail list question was indeed not paranoid — because Obama, building on the initiatives of his immediate predecessors, has helped create the foundation for a future police state. This has happened with bipartisan support from patriotic but short-sighted members of Congress and, sad to say, the general public.

The American media have played an essential role. For decades, newspaper editors and television programmers, especially local ones, have chased readers and ratings by spewing panic-inducing “journalism” and entertainment that helped foster support for anti-liberty policies. Ignorance, sometimes willful, has long been part of the media equation. Journalists have consistently highlighted the sensational. They’ve ignored statistical realities to hype anecdotal — and extremely rare — events that invite us to worry about vanishingly tiny risks and while shrugging off vastly more likely ones. And then, confronted with evidence of a war on journalism by the people running our government, powerful journalists suggest that their peers — no, their betters — who had the guts to expose government crimes are criminals. Do they have a clue why the First Amendment is all about? Do they fathom the meaning of liberty?

The founders, for all their dramatic flaws, knew what liberty meant. They created a system of power-sharing and competition, knowing that investing too much authority in any institution was an invitation to despotism. Above all, they knew that liberty doesn’t just imply taking risks; it absolutely requires taking risks. Among other protections, the Bill of Rights enshrined an unruly but vital free press and guaranteed that some criminals would escape punishment in order to protect the rest of us from too much government power. How many of those first 10 amendments would be approved by Congress and the states today? Depressingly few, one suspects. We’re afraid.

America has gone through spasms of liberty-crushing policies before, almost always amid real or perceived national emergencies. We’ve come out of them, to one degree or another, with the recognition that we had a Constitution worth protecting and defending, to paraphrase the oath federal office holders take but have so casually ignored in recent years.

What’s different this time is the surveillance infrastructure, plus the countless crimes our lawmakers have invented in federal and state codes. As many people have noted, we can all be charged with something if government wants to find something — the Justice Department under Bush and Obama has insisted that simply violating an online terms of service is a felony, for example. And now that our communications are being recorded and stored (you should take that for granted, despite weaselly government denials), those somethings will be available to people looking for them if they decide you are a nuisance. That is the foundation for tyranny, maybe not in the immediate future but, unless we find a way to turn back, someday soon enough.

H/T to Tim O’Reilly for the link.

July 1, 2013

Positive developments in Canadian government digital policy

Filed under: Cancon, Law, Technology — Tags: , , , , — Nicholas @ 11:59

Micheal Geist rounds up some good news for Canada Day:

As Canadians grapple with news of widespread secret surveillance, trade agreements that could upend intellectual property policy, and the frustrations of a failed wireless policy, there are plenty of digital policy concerns. Yet on Canada Day, my weekly technology law column argues that it is worth celebrating the many positive developments that dot the Canadian digital policy landscape. Eight of the best include:

1. The Supreme Court of Canada’s strong affirmation of user rights and technological neutrality in copyright. [. . .]

2. The Canadian Radio-television and Telecommunications Commission’s policy on network neutrality. [. . .]

3. The defeat of the government’s lawful access legislation. [. . .]

4. Canada’s promotion of user generated content. [. . .]

5. The CRTC’s pro-consumer agenda. [. . .]

6. The Privacy Commissioner of Canada’s aggressive investigations of top Internet companies. [. . .]

7. Canada’s notice-and-notice system for Internet providers. [. . .]

8. Canada’s balanced patent law standards. [. . .]

June 29, 2013

Jeff Jarvis calls for private encryption

Filed under: Liberty, Media, Technology — Tags: , , , — Nicholas @ 10:27

In the Guardian, Jeff Jarvis makes the case for internet communications to be protected by encryption:

Assuring the security of private communications regardless of platform — email, VOIP, direct message — should be a top priority of the internet industry in the aftermath of Edward Snowden’s revelations that US and UK governments are tapping into the net’s traffic.

The industry needs to at least come together to offer encryption for private communications as protection against government surveillance.

Guarantee of private communications should be a matter of law already. But, of course, it is not. In the US, only our first-class physical mail is protected from government surveillance without a warrant. In the UK, it was a case of opened mail that led to the closing of the Secret Department of the Post Office. As a matter of principle, the protection afforded our physical mail should extend to any private communication using any means. Just because the authors of the Fourth Amendment could not anticipate the internet and email, let alone Facebook, that should not grant government spies a loophole from the founders’ intent.

That protection could come from Congress, but it won’t. It could come from the courts, but it hasn’t.

I argued in my book Public Parts that government may try to portray itself as the protector of our privacy, but it is instead the most dangerous enemy of privacy, for it can gather our information without our knowledge and consent — that is the lesson of Snowden’s leaks — and has the power to use it against us.

June 25, 2013

Snowden’s character doesn’t matter – Snowden’s revelations matter a great deal

Filed under: Government, Law, Liberty, Technology — Tags: , , , , , — Nicholas @ 15:08

Gene Healy says that it doesn’t matter what you think about Edward Snowden, you should care a lot about what he’s revealed:

Here, the most disturbing aspect of the Snowden revelations is the NSA’s comprehensive, multiyear call-records database, with communication and phone-location information on millions of Americans. Especially if combined with metadata on emails, website visits and financial transactions that the agency is also amassing, that information is a potential treasure trove for political abuse — it can be used to ferret out the sort of information governments have historically used to blackmail and neutralize political opponents: who’s leaking, who’s organizing, who’s having an affair. The potential abuse of that information represents a grave threat to American liberty and privacy regardless of Snowden’s character and motivations.

In an post last week, Buzzfeed‘s Ben Smith makes the key point: “You Don’t Have to Like Edward Snowden.” Snowden, Smith argues, is “a source,” and the information sources convey is far more important than their “moral status” or the “fate of [their] eternal soul[s].”

Smith mentions Mark Felt, the FBI honcho who served as Woodward and Bernstein’s “Deep Throat” during their investigation of the Watergate burglary and cover-up. Felt, it turned out, was simply settling scores in a bureaucratic power struggle. He had no scruples against criminal violations of privacy — in 1980 he was convicted of conspiring to violate the constitutional rights of Americans through warrantless break-ins as part of the FBI’s COINTELPRO program.

It was important for Americans to know that their president was a crook. That Mark Felt was also a crook is neither here nor there. As Smith puts it, “who cares?”

June 21, 2013

“Nobody is listening to your calls” … because the metadata is far more useful

Filed under: Government, Liberty, Technology, USA — Tags: , , , , , — Nicholas @ 09:50

John Naughton explains why the calming statement that “nobody is listening to your calls” is far from re-assuring:

‘To be remembered after we are dead,” wrote Hazlitt, “is but poor recompense for being treated with contempt while we are living.” Cue President “George W” Obama in the matter of telephone surveillance by his National Security Agency. The fact that for the past seven years the agency has been collecting details of every telephone call placed in the United States without a warrant was, he intoned, no reason for Americans to be alarmed. “Nobody is listening to your telephone calls,” he cooed. The torch was then passed to Dianne Feinstein, chair of the Senate intelligence committee, who was likewise on bromide-dispensing duty. “This is just metadata,” she burbled, “there is no content involved.”

At which point the thought uppermost in one’s mind is: what kind of idiots do they take us for? Of course there’s no content involved, for the simple reason that content is a pain in the butt from the point of view of modern surveillance. First, you have to listen to the damned recordings, and that requires people (because even today, computers are not great at understanding everyday conversation) and time. And although Senator Feinstein let slip that the FBI already employs 10,000 people “doing intelligence on counter-terrorism”, even that Stasi-scale mob isn’t a match for the torrent of voice recordings that Verizon and co could cough up daily for the spooks.

So in this business at least, content isn’t king. It’s the metadata — the call logs showing who called whom, from which location and for how long — that you want. Why? Because that’s the stuff that is machine-readable, and therefore searchable. Imagine, for a moment, that you’re an NSA operative in Fort Meade, Maryland. You have a telephone number of someone you regard as potentially “interesting”. Type the number into a search box and up comes a list of every handset that has ever called, or been called by, it. After that, it’s a matter of seconds before you have a network graph of second-, third- or fourth-degree connections to that original number. Map those on to electronic directories to get names and addresses, obtain a secret authorisation from the Fisa court (which has 11 federal judges so that it can sit round the clock, seven days a week), then dispatch a Prism subpoena to Facebook and co and make some coffee while waiting for the results. Repeat the process with the resulting email contact lists and — bingo! — you have a mass surveillance programme as good as anything Vladimir Putin could put together. And you’ve never had to sully your hands — or your conscience — with that precious “content” that civil libertarians get so worked up about.

June 15, 2013

Cory Doctorow explains why you should care about PRISM

Filed under: Britain, Government, Liberty, Technology — Tags: , , , — Nicholas @ 09:28

In the Guardian, Cory Doctorow spells out a few good reasons why you should be bothered by PRISM and other governmental data-trawling efforts:

The revelations about Prism and other forms of NSA dragnet surveillance has got some people wondering what all the fuss is. When William Hague tells us that the innocent have nothing to fear from involuntary disclosure, it raises questions about exactly what harms might come about from being spied upon. Here are some reasons you should care about privacy, disclosure and surveillance.

We’re bad at privacy because the consequences of privacy disclosures are separated by a lot of time and space from the disclosures themselves. It’s like trying to get good at cricket by swinging the bat, closing your eyes before you see where the ball is headed, and then being told, months later, somewhere else, where the ball went. So of course we’re bad at privacy: almost all our privacy disclosures do no harm, and some of them cause grotesque harm, but when this happens, it happens so far away from the disclosure that we can’t learn from it.

You should care about privacy because privacy isn’t secrecy. I know what you do in the toilet, but that doesn’t mean you don’t want to close the door when you go in the stall.

You should care about privacy because if the data says you’ve done something wrong, then the person reading the data will interpret everything else you do through that light. Naked Citizens, a short, free documentary, documents several horrifying cases of police being told by computers that someone might be up to something suspicious, and thereafter interpreting everything they learn about that suspect as evidence of wrongdoing. For example, when a computer programmer named David Mery entered a tube station wearing a jacket in warm weather, an algorithm monitoring the CCTV brought him to the attention of a human operator as someone suspicious. When Mery let a train go by without boarding, the operator decided it was alarming behaviour. The police arrested him, searched him, asked him to explain every scrap of paper in his flat. A doodle consisting of random scribbles was characterised as a map of the tube station. Though he was never convicted of a crime, Mery is still on file as a potential terrorist eight years later, and can’t get a visa to travel abroad. Once a computer ascribes suspiciousness to someone, everything else in that person’s life becomes sinister and inexplicable.

Hiding your data in plain sight

Filed under: Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 09:12

Ronald Bailey gathers up some resources you might want to investigate if you’d prefer not to have the NSA or other government agencies watching your online activities:

First, consider not putting so much stuff out there in the first place. Wuergler devised a program he calls Stalker that can siphon off nearly all of your digital information to put together an amazingly complete portrait of your life and pretty much find out where you are at all times. Use Facebook if you must, but realize you’re making it easy for the government to track and find you when they choose to do so.

A second step toward increased privacy is to use a browser like DuckDuckGo, which does not collect the sort of information — say, your IP address — that can identify you with your Internet searches. Thus, if the government bangs on their doors to find out what you’ve been up to, DuckDuckGo has nothing to hand over. I have decided to make DuckDuckGo my default for general browsing, turning to Google only for items such as breaking news and scholarly articles. (Presumably, the NSA would be able to tap into my searches on DuckDuckGo in real time.)

Third, TOR offers free software and a network of relays that can shield your location from prying eyes. TOR operates by bouncing your emails and files around the Internet through encrypted relays. Anyone intercepting your message once it exits a TOR relay cannot trace it back to your computer and your physical location. TOR is used by dissidents and journalists around the world. On the downside, in my experience it operates more slowly than, say, Google.

Fourth, there is encryption. An intriguing one-stop encryption solution is Silent Circle. Developed by Phil Zimmerman, the inventor of the Pretty Good Privacy encryption system, Silent Circle enables users to encrypt their text messages, video, and phone calls, as well as their emails. Zimmerman and his colleagues claim that they, or anyone else, cannot decrypt our messages across their network, period. As Wuergler warned, this security doesn’t come free. Silent Circle charges $10 per month for its encryption services.

However, your mobile phone is a beacon that can’t be easily masked or hidden:

Now for some bad news. Telephone metadata of the sort the NSA acquired from Verizon is hard — read: impossible — to hide. As the ACLU’s Soghoian notes, you can’t violate the laws of physics: In order to connect your mobile phone, the phone company necessarily needs to know where you are located. Of course, you can avoid being tracked through your cell phone by removing its batteries (unless you have an iPhone), but once you slot it back in, there you are.

For lots more information on how to you might be able to baffle government monitoring agencies, check out the Electronic Frontier Foundation’s Surveillance Self-Defense Web pages.

June 11, 2013

New privacy options on Facebook

Filed under: Humour, Liberty, Media — Tags: , , , — Nicholas @ 12:39

Facebook's new privacy options

H/T to KA-CHING! for the image.

« Newer PostsOlder Posts »

Powered by WordPress