DavidKellamFirstEssay 6 - 06 May 2018 - Main.DavidKellam
|
|
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam
| |
< < | Academia has long considered itself a platform for change and revolutionary thought. However, some disastrous failure has resulted in the obviation of the most important conversation of our time. A critical discussion involving the current trajectory of internet privacy and data consumption has not been explored sufficiently in the academic setting in which it might best be had. | > > | The Increasing Need for Young Privacy Advocates and the Campus Where They May Be Born | | | |
< < | This is evident in my generation’s mainstream attitude towards the impending extinction of privacy and the internet activity that empowers it: sure, we are tracked and monitored; our online identity is auctioned to interests we will not identify with motives we cannot know. So what? I’m not doing anything wrong. | > > | Academia has long considered itself a platform for change and revolutionary thought. However, some disastrous failure has resulted in the obviation of the most important conversation of our time. A critical discussion involving the current trajectory of internet privacy and data consumption has not been explored sufficiently on the campus setting in which it might best be had.
This is evident in my generation’s mainstream attitude towards the impending extinction of privacy and the internet activity that empowers it: sure, we are tracked and monitored; our online identity is auctioned to interests we will not identify with motives we cannot know. So what? I'm not doing anything wrong. | | Unfortunately, this is about as robust a conversation on data privacy as one will find in a university hallway. This lethal acquiescence has taken place because the potential misuse of our personal information is not a topic with which my contemporaries are informed. However, some historical highlights of our internet, and our government’s attitude towards it, might make the smart-phone generation a bit less trusting of the current scheme. | |
< < | Examples of Federal and Corporate Misuse | > > | Federal and Corporate Misuse | | | |
< < | During the 90’s, several parties had dramatically different fantasies concerning the privacy of our online future, and the debate over encryption took its first form. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals. Ultimately, it appeared, privacy advocates were successful, and a new standard was born on the U.S. network. | > > | During the 90’s, several parties had different fantasies concerning the privacy of our online future, and the debate over encryption took its first form. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals. Ultimately, it appeared, privacy advocates were successful, and a new standard was born on the U.S. network. | | However, the United States implemented export controls on new encryption software to keep it from the international community, and, essentially, to fill other networks with substandard encryption to which the U.S. would have access. While many of these policies were reversed towards the end of Clinton’s presidency and the (alleged) end of the Pyrrhic Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these vulnerabilities. | |
< < | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of my peers, the NSA continues to undermine encryption standards through these formerly implemented backdoors, intrusion into VPNs, NSA roving bugs, etcetera. Furthermore, federally accepted channels of data merchandising have constructed economies of our most private information, and, generally, none of our browsing, purchasing behavior, or information gathering goes unmonitored.
Academic Arrogance and Millennial Apathy
The above examples of federal disregard for our online interests, and of federal support of corporations that attack our privacy and censor our access to information, are among many that should make my generation wary. However, while the government has been criticized for these practices, particularly since 2013, these criticisms have not built enough momentum for substantive impact to occur because the former privacy advocates are being replaced with a generation either blind or indifferent to the consequences. The fact that we haven’t taken to the streets over Ajit Pai’s recently approved plan as we have over other contemporary political issues makes clear that our hierarchy of priorities does not include concerns over disastrous internet regulation. And, while the gutting of net neutrality will be bound in the same judicial red-tape as the initiative that it undermined, it couldn’t be more obvious now that the federal government has no intention to accommodate our growing need for online protection.
Social Awareness through Academic Channels
Unfortunately, mainstream media is subservient to the data trade and financially interested in the possibility of having their messages augmented by service providers who can silence competing small-scale media outfits. Thus, any movement to reverse the trend in policy that undermines our private access to information will lack an important channel.
However, while not immune to the corporate reach that has motivated these policies, academia may have a chance, but is currently too busy overregulating professors and uninviting controversial speakers to engage in the discourse necessary to resist federal and corporate abuse of the internet. My inbox has been bombarded all year with university and student organization statements on contentious protests, disputed speakers, safespaces and the like, but not a word has been given on the concerted executive and legislative movement that may enable service providers to censor any online information with which their corporate interests are inconsistent.
However, the millennial generation and those succeeding it will bear much of the negative impact of a new, completely controlled infobahn. As such, academia should restructure its priorities and provide the educational resources necessary for our otherwise uninformed generation to add data privacy to the list of concerns. If these concerns were to manifest in a cognizable movement, society by-and-large might begin to disapprove of legislators that are bought and sold by service providers, Google, and Facebook. | > > | Worse than cybercriminals, however, is the potential for corporate and federal misuse that a poorly encrypted internet and low regulatory hurdles has created. Unbeknownst to many of my peers, the NSA continues to undermine encryption standards through these formerly implemented backdoors, intrusion into VPNs, NSA roving bugs, etcetera. Furthermore, federally accepted channels of data merchandising have constructed economies of our most private information, and, generally, none of our browsing, purchasing behavior, or information gathering goes unmonitored by corporations like Facebook who compile tremendous datasets composed of heavily categorized individuals and sell it to the highest bidder. From this comprehensive matrix of information, the federal government and the corporations that control social media can know everything about us, from our personal curiosities and political leanings, to our closest friends and where we spend our time. So what? I’m not doing anything wrong. | | | |
< < | Unfortunately, however, the millennials that could initiate such a movement do nearly all of their mobilization on the platforms that these titans control. Thus, it is not only necessary to make us aware of the current threats, but also to discourage the use of platforms that contribute to them. If mobilization could again occur outside of Facebook, and instead, on anonymous forums run by organizations with privacy in mind, there could be some hope of slowing the implementation of policy that may take away our ability to mobilize altogether. | > > | A Change in Perspective | | | |
< < | If academia is to be successful in this, millennials may demand new anonymous forums, and a new market could form. With the formation of this new market, Facebook and Google’s bilateral data-control structure, as well as the ISPs, will certainly respond with more pressure on legislators. However, they will do so with fewer resources and a less certain market future. Furthermore, if the movement grows to its necessary size, incumbents subservient to corporate interests could be replaced with those subservient to their now-privacy-conscious constituency, and policy may move towards my ultimate goal of online freedom and anonymity, rather than swiftly away from it.
| > > | To each new-generation social media user that believes privacy is a non-issue because they aren’t doing anything wrong online, it must be made clear that ‘wrong’ is a shifting goalpost. If one doesn’t care about extensive online dossiers concerning their private life, they must at least care that both ‘wrongness’ and legality are historically unstable precepts subject to change once social hysteria or governmental authority decides that the goalpost must move. News gathering can and has fallen under such a shadow. Personal education, social mobilization and group participation are likewise subject to shifting moral and legal attitudes. Thus, millennials who believe that they are not doing anything illegal by visiting certain websites or participating in certain discussions might soon find that this online behavior may be used against them when the axioms of wrongness change. You aren’t doing anything wrong now, but what you do is recorded, and may be wrong enough in the future to warrant retroactive retaliation. | | | |
< < | I'm not sure why the
focus here is so much on the failure of "academia," as though the
primary reason people who don't go to schools about technology or
privacy aren't learning something about technology or privacy were
that sociology (or even law) professors weren't doing their jobs
right. This could be true: I'm pretty sure they aren't doing their
jobs right in some respect or another, because I'm not. But nothing
said here makes it the teachers' fault. | > > | It seems, then, that the best solution is informing new-generation internet users. Awareness of the breadth of the privacy violations written into commonplace services must be made in the current generation of social media captives, but unless they can conceptualize potential consequences, they have no reason to back away from the online platforms that have been shaping their identity for a decade. | | | |
< < | As for the much-criticized "mainstream media," it too has many
faults. Mostly, I think, the recent past is littered with bad
compromises with platform companies who controlled advertising.
This can hardly be blamed altogether on companies that previously
used advertising revenue to fund their journalism. And what I
thought when I wrote "The Invisible Barbecue" I still think: the
problem of how to report what happened at the end of the 20th
century was not solved by institutions that a decade later were in
danger of not wanting to solve it anymore. The 2016 election and
its fallout changed all that, maybe completely. | > > | The Campus | | | |
< < | So I think the best route to improvement here would be to
concentrate less on who is not doing the relevant teaching than on
how to overcome the "I'm not doing anything wrong so why should I
care?" argument at the street level, where your teaching is. | > > | One domain in which this knowledge can be spread is the campus; it is the current generation of students that will soon take the mantle of policy and that is the most affected by the consequences of failure. Students that are already privacy minded must inform their peers of the depth of surveillance that exists online, and work with administrators to form data privacy groups or to broaden preexisting technology groups to include education on the rudiments of data privacy. | | | |
< < | | > > | There are undoubtedly a handful of individuals with knowledge and experience on data privacy studying at many university campuses. If emboldened by a group of likeminded individuals and a supportive administration, this group can make information available to their peers sufficient to attract other students to the cause. While many will inevitably choose Instagram over autonomy, some will not, and helping the latter individuals to reset and audit their digital footprint will, at most, contribute to a movement towards a more privacy minded regulatory environment and, at least, aid individuals in obtaining online anonymity even if their contemporaries choose not to follow suit. | |
\ No newline at end of file | |
> > | After the atmospherics of the issue are more well-known on campus, it will not be hard to motivate those willing and informed to take personal steps towards reducing their presence on publicly sold datasets. Anyone able to see the consequences of their data contribution may take steps to reduce it. When they are equipped with the existing resources available to browse and communicate privately, they will have a freedom that they have never experienced, and a taste of this freedom may begin to snowball into a generational change in perspective towards privacy. |
|
DavidKellamFirstEssay 5 - 22 Apr 2018 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam | | During the 90’s, several parties had dramatically different fantasies concerning the privacy of our online future, and the debate over encryption took its first form. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals. Ultimately, it appeared, privacy advocates were successful, and a new standard was born on the U.S. network. | |
< < | However, the United States implemented export controls on new encryption software to keep it from the international community, and, essentially, to fill other networks with substandard encryption to which the U.S. would have access. While many of these policies were reversed towards the end of Clinton’s presidency and the (alleged) end of the pyrric Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these vulnerabilities. | > > | However, the United States implemented export controls on new encryption software to keep it from the international community, and, essentially, to fill other networks with substandard encryption to which the U.S. would have access. While many of these policies were reversed towards the end of Clinton’s presidency and the (alleged) end of the Pyrrhic Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these vulnerabilities. | | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of my peers, the NSA continues to undermine encryption standards through these formerly implemented backdoors, intrusion into VPNs, NSA roving bugs, etcetera. Furthermore, federally accepted channels of data merchandising have constructed economies of our most private information, and, generally, none of our browsing, purchasing behavior, or information gathering goes unmonitored. | | If academia is to be successful in this, millennials may demand new anonymous forums, and a new market could form. With the formation of this new market, Facebook and Google’s bilateral data-control structure, as well as the ISPs, will certainly respond with more pressure on legislators. However, they will do so with fewer resources and a less certain market future. Furthermore, if the movement grows to its necessary size, incumbents subservient to corporate interests could be replaced with those subservient to their now-privacy-conscious constituency, and policy may move towards my ultimate goal of online freedom and anonymity, rather than swiftly away from it.
\ No newline at end of file | |
> > | I'm not sure why the
focus here is so much on the failure of "academia," as though the
primary reason people who don't go to schools about technology or
privacy aren't learning something about technology or privacy were
that sociology (or even law) professors weren't doing their jobs
right. This could be true: I'm pretty sure they aren't doing their
jobs right in some respect or another, because I'm not. But nothing
said here makes it the teachers' fault.
As for the much-criticized "mainstream media," it too has many
faults. Mostly, I think, the recent past is littered with bad
compromises with platform companies who controlled advertising.
This can hardly be blamed altogether on companies that previously
used advertising revenue to fund their journalism. And what I
thought when I wrote "The Invisible Barbecue" I still think: the
problem of how to report what happened at the end of the 20th
century was not solved by institutions that a decade later were in
danger of not wanting to solve it anymore. The 2016 election and
its fallout changed all that, maybe completely.
So I think the best route to improvement here would be to
concentrate less on who is not doing the relevant teaching than on
how to overcome the "I'm not doing anything wrong so why should I
care?" argument at the street level, where your teaching is.
| | \ No newline at end of file |
|
DavidKellamFirstEssay 4 - 30 Dec 2017 - Main.DavidKellam
|
|
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam | | However, the millennial generation and those succeeding it will bear much of the negative impact of a new, completely controlled infobahn. As such, academia should restructure its priorities and provide the educational resources necessary for our otherwise uninformed generation to add data privacy to the list of concerns. If these concerns were to manifest in a cognizable movement, society by-and-large might begin to disapprove of legislators that are bought and sold by service providers, Google, and Facebook. | |
< < | Unfortunately, however, the millennials that could initiate such a movement do nearly all of their mobilization on the platforms that these titans control. Thus, it is not only necessary to make us aware of the current threat, but also to discourage the use of platforms that contribute to them. If mobilization could again occur outside of Facebook, and instead, on anonymous forums run by organizations with privacy in mind, there could be some hope of slowing the implementation of policy that may take away our ability to mobilize altogether. | > > | Unfortunately, however, the millennials that could initiate such a movement do nearly all of their mobilization on the platforms that these titans control. Thus, it is not only necessary to make us aware of the current threats, but also to discourage the use of platforms that contribute to them. If mobilization could again occur outside of Facebook, and instead, on anonymous forums run by organizations with privacy in mind, there could be some hope of slowing the implementation of policy that may take away our ability to mobilize altogether. | | If academia is to be successful in this, millennials may demand new anonymous forums, and a new market could form. With the formation of this new market, Facebook and Google’s bilateral data-control structure, as well as the ISPs, will certainly respond with more pressure on legislators. However, they will do so with fewer resources and a less certain market future. Furthermore, if the movement grows to its necessary size, incumbents subservient to corporate interests could be replaced with those subservient to their now-privacy-conscious constituency, and policy may move towards my ultimate goal of online freedom and anonymity, rather than swiftly away from it.
|
|
DavidKellamFirstEssay 3 - 27 Dec 2017 - Main.DavidKellam
|
|
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam | |
< < | As household internet access was popularized in the United States during the 90’s, a debate of which only the early-adopters and fathers of modern day internet were aware or equipped to engage in was aroused. This debate was over encryption, and several parties had dramatically different fantasies concerning the privacy of our online future. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals, and that anonymity would foreclose the possibility of surveillance with which the internet enticed law enforcement and the politicians representing their interests. | | | |
< < | This debate was simultaneous with the affectionately captioned Crypto Wars, the international struggle in which, among other things, the United States, intent on encrypting their own confidential information, irrespective of whether encryption was made available to Americans by and large, implemented export controls on strong encryption software to keep online protective latitude out of the hands of the international community, and, essentially, to fill their networks with substandard encryption to which the U.S. would have access. When privacy advocates had domestic success in the encryption debate, remnant regulatory barriers still remained hindering the international dissemination of this now pseudo-standard American encryption software. While many of these barriers were ultimately reversed towards the end of Clinton’s presidency and the (alleged) end of the Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations-- namely protocols meant to enable the U.S. government to backdoor certain networks-- remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these no-longer-sophisticated vulnerabilities. | > > |
Academia has long considered itself a platform for change and revolutionary thought. However, some disastrous failure has resulted in the obviation of the most important conversation of our time. A critical discussion involving the current trajectory of internet privacy and data consumption has not been explored sufficiently in the academic setting in which it might best be had. | | | |
< < | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of the privacy advocates of the preceding decade until 2013, and still unbeknownst to most, the NSA continues to undermine encryption standards. Whether through these formerly implemented backdoors, intrusion into VPNs, or merely misuse of our apparent modern disdain for our own privacy, the privacy advocates of old are realizing that their victories were for naught in the current system. Furthermore, federally accepted and oftentimes supported channels of data mining and sharing have constructed economies of our private information and their respective market-leaders will fight tooth-and-nail, as did the great Tobacco companies decades ago, to protect the most lucrative retail operation in human existence. | > > | This is evident in my generation’s mainstream attitude towards the impending extinction of privacy and the internet activity that empowers it: sure, we are tracked and monitored; our online identity is auctioned to interests we will not identify with motives we cannot know. So what? I’m not doing anything wrong. | | | |
< < | When corporate and government greed intersects as holistically as it does with respect to monitoring and marketing our private behavior, it seems that nebulous options are all that remain. Fortunately, however, the Courts could conceivably leverage our constitutional rights against both corporate and government interests.
The Courts have built considerable stare decisis surrounding the notion of an American right to privacy. By supplanting the logic of Lawrence v. Texas into the conversation surrounding internet anonymity, the vulnerabilities preeminent in the systems on which our internet relies can assume a legal barrier. While our current internet may not support such a requirement, a federally mandated network of encrypted nodes, necessitated by a judicial decree respecting a fundamental right to privacy within one’s home, could overhaul the current system enough to render age-old vulnerabilities innocuous- when input data or payment information cannot be designated to a particular individual, its value will drop. | > > | Unfortunately, this is about as robust a conversation on data privacy as one will find in a university hallway. This lethal acquiescence has taken place because the potential misuse of our personal information is not a topic with which my contemporaries are informed. However, some historical highlights of our internet, and our government’s attitude towards it, might make the smart-phone generation a bit less trusting of the current scheme. | | | |
< < | This solution, however, would require a recognition that not only does a right to privacy within one’s home extend to their online behavior, but, that given the insecurities built into the current network, a form of protection other than an anonymizing network is not more easily achieved. This appears to be the case; many internet users opt into encrypted virtual networks and many more undoubtedly would if their use wasn’t inconvenient, unconventional, and even taboo. Furthermore, a mainstream ignorance of the current network could cause policy-makers to turn to privacy experts if required to do so by the Courts, and these privacy experts can illustrate the manageability and functionality of currently existing private networks of encrypted nodes and can argue the value of a national, encrypted virtual network hosted in state and government facilities throughout the United States and even throughout the nations in which our presence and diplomatic relationships would accommodate such an offering. | > > | Examples of Federal and Corporate Misuse | | | |
< < | It may be argued that any such decree would place an undue restrictive barrier on the commercial practices of the companies that collect our information and feed it to the federal government, however, based on the growing influence that online services have on our life and the comparative disadvantage that arises when we opt out of restrictive online contracts concerning our data, it is increasingly important not that the Courts create novel commercial restrictions, but that the Courts simply realize that this activity has been in violation of our precedentially recognized right to privacy, and thereby illegal, since the beginning. | > > | During the 90’s, several parties had dramatically different fantasies concerning the privacy of our online future, and the debate over encryption took its first form. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals. Ultimately, it appeared, privacy advocates were successful, and a new standard was born on the U.S. network. | | | |
< < | In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one’s home, should remain assumed and necessary for our liberties to be or even appear protected. If a state’s alleged interests are insufficient to intrude upon the sexual rights of a minority of consenting adults, commercial interests and poorly articulated federal interests must be insufficient to allow for an equal intrusion on every American. As soon as our online identities became as central to our lives as our residence, marriage, lodging, transportation and the purchasing of goods, access to online privacy protection should have become as judicially cognizable as protection to the access of these other central channels. And, as the Courts have ensured access to protection of these other channels, even in the face of completely private businesses seeking to employ discriminatory practices and of a systematic governmental approach to protecting these discriminatory practices, it is time that access to true privacy is given equal regard on our menu constitutional principles. | > > | However, the United States implemented export controls on new encryption software to keep it from the international community, and, essentially, to fill other networks with substandard encryption to which the U.S. would have access. While many of these policies were reversed towards the end of Clinton’s presidency and the (alleged) end of the pyrric Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these vulnerabilities. | | | |
> > | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of my peers, the NSA continues to undermine encryption standards through these formerly implemented backdoors, intrusion into VPNs, NSA roving bugs, etcetera. Furthermore, federally accepted channels of data merchandising have constructed economies of our most private information, and, generally, none of our browsing, purchasing behavior, or information gathering goes unmonitored. | | | |
< < | | > > | Academic Arrogance and Millennial Apathy | | | |
< < | What this draft most needs is an uncompromising tightening. Each sentence should be reconsidered: what does it mean to say, and how can it do so in the fewest possible words? A sentence like "In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one's home, should remain assumed and necessary for our liberties to be or even appear protected," makes it impossible to think clearly whatever thought it carries. | > > | The above examples of federal disregard for our online interests, and of federal support of corporations that attack our privacy and censor our access to information, are among many that should make my generation wary. However, while the government has been criticized for these practices, particularly since 2013, these criticisms have not built enough momentum for substantive impact to occur because the former privacy advocates are being replaced with a generation either blind or indifferent to the consequences. The fact that we haven’t taken to the streets over Ajit Pai’s recently approved plan as we have over other contemporary political issues makes clear that our hierarchy of priorities does not include concerns over disastrous internet regulation. And, while the gutting of net neutrality will be bound in the same judicial red-tape as the initiative that it undermined, it couldn’t be more obvious now that the federal government has no intention to accommodate our growing need for online protection. | | | |
< < | Once you have found out what's in here, I suspect it will need
reorganizing. There's an argument here about secrecy, and one about
anonymity, and they are tangled up somewhat in the history of the
crypto wars (part one only, really). I think once you have put each
idea clearly you will see better how to sequence them. Then we can
figure out how to use the space you have gained in order to make the
argument richer. | > > | Social Awareness through Academic Channels | | | |
< < | | > > | Unfortunately, mainstream media is subservient to the data trade and financially interested in the possibility of having their messages augmented by service providers who can silence competing small-scale media outfits. Thus, any movement to reverse the trend in policy that undermines our private access to information will lack an important channel. | |
\ No newline at end of file | |
> > | However, while not immune to the corporate reach that has motivated these policies, academia may have a chance, but is currently too busy overregulating professors and uninviting controversial speakers to engage in the discourse necessary to resist federal and corporate abuse of the internet. My inbox has been bombarded all year with university and student organization statements on contentious protests, disputed speakers, safespaces and the like, but not a word has been given on the concerted executive and legislative movement that may enable service providers to censor any online information with which their corporate interests are inconsistent.
However, the millennial generation and those succeeding it will bear much of the negative impact of a new, completely controlled infobahn. As such, academia should restructure its priorities and provide the educational resources necessary for our otherwise uninformed generation to add data privacy to the list of concerns. If these concerns were to manifest in a cognizable movement, society by-and-large might begin to disapprove of legislators that are bought and sold by service providers, Google, and Facebook.
Unfortunately, however, the millennials that could initiate such a movement do nearly all of their mobilization on the platforms that these titans control. Thus, it is not only necessary to make us aware of the current threat, but also to discourage the use of platforms that contribute to them. If mobilization could again occur outside of Facebook, and instead, on anonymous forums run by organizations with privacy in mind, there could be some hope of slowing the implementation of policy that may take away our ability to mobilize altogether.
If academia is to be successful in this, millennials may demand new anonymous forums, and a new market could form. With the formation of this new market, Facebook and Google’s bilateral data-control structure, as well as the ISPs, will certainly respond with more pressure on legislators. However, they will do so with fewer resources and a less certain market future. Furthermore, if the movement grows to its necessary size, incumbents subservient to corporate interests could be replaced with those subservient to their now-privacy-conscious constituency, and policy may move towards my ultimate goal of online freedom and anonymity, rather than swiftly away from it.
|
|
DavidKellamFirstEssay 2 - 04 Dec 2017 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < | | | -- DavidKellam
As household internet access was popularized in the United States during the 90’s, a debate of which only the early-adopters and fathers of modern day internet were aware or equipped to engage in was aroused. This debate was over encryption, and several parties had dramatically different fantasies concerning the privacy of our online future. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals, and that anonymity would foreclose the possibility of surveillance with which the internet enticed law enforcement and the politicians representing their interests. | | It may be argued that any such decree would place an undue restrictive barrier on the commercial practices of the companies that collect our information and feed it to the federal government, however, based on the growing influence that online services have on our life and the comparative disadvantage that arises when we opt out of restrictive online contracts concerning our data, it is increasingly important not that the Courts create novel commercial restrictions, but that the Courts simply realize that this activity has been in violation of our precedentially recognized right to privacy, and thereby illegal, since the beginning.
In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one’s home, should remain assumed and necessary for our liberties to be or even appear protected. If a state’s alleged interests are insufficient to intrude upon the sexual rights of a minority of consenting adults, commercial interests and poorly articulated federal interests must be insufficient to allow for an equal intrusion on every American. As soon as our online identities became as central to our lives as our residence, marriage, lodging, transportation and the purchasing of goods, access to online privacy protection should have become as judicially cognizable as protection to the access of these other central channels. And, as the Courts have ensured access to protection of these other channels, even in the face of completely private businesses seeking to employ discriminatory practices and of a systematic governmental approach to protecting these discriminatory practices, it is time that access to true privacy is given equal regard on our menu constitutional principles.
\ No newline at end of file | |
> > |
What this draft most needs is an uncompromising tightening. Each sentence should be reconsidered: what does it mean to say, and how can it do so in the fewest possible words? A sentence like "In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one's home, should remain assumed and necessary for our liberties to be or even appear protected," makes it impossible to think clearly whatever thought it carries.
Once you have found out what's in here, I suspect it will need
reorganizing. There's an argument here about secrecy, and one about
anonymity, and they are tangled up somewhat in the history of the
crypto wars (part one only, really). I think once you have put each
idea clearly you will see better how to sequence them. Then we can
figure out how to use the space you have gained in order to make the
argument richer.
| | \ No newline at end of file |
|
DavidKellamFirstEssay 1 - 14 Nov 2017 - Main.DavidKellam
|
|
> > |
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam
As household internet access was popularized in the United States during the 90’s, a debate of which only the early-adopters and fathers of modern day internet were aware or equipped to engage in was aroused. This debate was over encryption, and several parties had dramatically different fantasies concerning the privacy of our online future. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals, and that anonymity would foreclose the possibility of surveillance with which the internet enticed law enforcement and the politicians representing their interests.
This debate was simultaneous with the affectionately captioned Crypto Wars, the international struggle in which, among other things, the United States, intent on encrypting their own confidential information, irrespective of whether encryption was made available to Americans by and large, implemented export controls on strong encryption software to keep online protective latitude out of the hands of the international community, and, essentially, to fill their networks with substandard encryption to which the U.S. would have access. When privacy advocates had domestic success in the encryption debate, remnant regulatory barriers still remained hindering the international dissemination of this now pseudo-standard American encryption software. While many of these barriers were ultimately reversed towards the end of Clinton’s presidency and the (alleged) end of the Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations-- namely protocols meant to enable the U.S. government to backdoor certain networks-- remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these no-longer-sophisticated vulnerabilities.
It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of the privacy advocates of the preceding decade until 2013, and still unbeknownst to most, the NSA continues to undermine encryption standards. Whether through these formerly implemented backdoors, intrusion into VPNs, or merely misuse of our apparent modern disdain for our own privacy, the privacy advocates of old are realizing that their victories were for naught in the current system. Furthermore, federally accepted and oftentimes supported channels of data mining and sharing have constructed economies of our private information and their respective market-leaders will fight tooth-and-nail, as did the great Tobacco companies decades ago, to protect the most lucrative retail operation in human existence.
When corporate and government greed intersects as holistically as it does with respect to monitoring and marketing our private behavior, it seems that nebulous options are all that remain. Fortunately, however, the Courts could conceivably leverage our constitutional rights against both corporate and government interests.
The Courts have built considerable stare decisis surrounding the notion of an American right to privacy. By supplanting the logic of Lawrence v. Texas into the conversation surrounding internet anonymity, the vulnerabilities preeminent in the systems on which our internet relies can assume a legal barrier. While our current internet may not support such a requirement, a federally mandated network of encrypted nodes, necessitated by a judicial decree respecting a fundamental right to privacy within one’s home, could overhaul the current system enough to render age-old vulnerabilities innocuous- when input data or payment information cannot be designated to a particular individual, its value will drop.
This solution, however, would require a recognition that not only does a right to privacy within one’s home extend to their online behavior, but, that given the insecurities built into the current network, a form of protection other than an anonymizing network is not more easily achieved. This appears to be the case; many internet users opt into encrypted virtual networks and many more undoubtedly would if their use wasn’t inconvenient, unconventional, and even taboo. Furthermore, a mainstream ignorance of the current network could cause policy-makers to turn to privacy experts if required to do so by the Courts, and these privacy experts can illustrate the manageability and functionality of currently existing private networks of encrypted nodes and can argue the value of a national, encrypted virtual network hosted in state and government facilities throughout the United States and even throughout the nations in which our presence and diplomatic relationships would accommodate such an offering.
It may be argued that any such decree would place an undue restrictive barrier on the commercial practices of the companies that collect our information and feed it to the federal government, however, based on the growing influence that online services have on our life and the comparative disadvantage that arises when we opt out of restrictive online contracts concerning our data, it is increasingly important not that the Courts create novel commercial restrictions, but that the Courts simply realize that this activity has been in violation of our precedentially recognized right to privacy, and thereby illegal, since the beginning.
In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one’s home, should remain assumed and necessary for our liberties to be or even appear protected. If a state’s alleged interests are insufficient to intrude upon the sexual rights of a minority of consenting adults, commercial interests and poorly articulated federal interests must be insufficient to allow for an equal intrusion on every American. As soon as our online identities became as central to our lives as our residence, marriage, lodging, transportation and the purchasing of goods, access to online privacy protection should have become as judicially cognizable as protection to the access of these other central channels. And, as the Courts have ensured access to protection of these other channels, even in the face of completely private businesses seeking to employ discriminatory practices and of a systematic governmental approach to protecting these discriminatory practices, it is time that access to true privacy is given equal regard on our menu constitutional principles. |
|
|