|
META TOPICPARENT | name="FirstEssay" |
-- DavidKellam | |
< < | As household internet access was popularized in the United States during the 90’s, a debate of which only the early-adopters and fathers of modern day internet were aware or equipped to engage in was aroused. This debate was over encryption, and several parties had dramatically different fantasies concerning the privacy of our online future. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals, and that anonymity would foreclose the possibility of surveillance with which the internet enticed law enforcement and the politicians representing their interests. | | | |
< < | This debate was simultaneous with the affectionately captioned Crypto Wars, the international struggle in which, among other things, the United States, intent on encrypting their own confidential information, irrespective of whether encryption was made available to Americans by and large, implemented export controls on strong encryption software to keep online protective latitude out of the hands of the international community, and, essentially, to fill their networks with substandard encryption to which the U.S. would have access. When privacy advocates had domestic success in the encryption debate, remnant regulatory barriers still remained hindering the international dissemination of this now pseudo-standard American encryption software. While many of these barriers were ultimately reversed towards the end of Clinton’s presidency and the (alleged) end of the Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations-- namely protocols meant to enable the U.S. government to backdoor certain networks-- remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these no-longer-sophisticated vulnerabilities. | > > |
Academia has long considered itself a platform for change and revolutionary thought. However, some disastrous failure has resulted in the obviation of the most important conversation of our time. A critical discussion involving the current trajectory of internet privacy and data consumption has not been explored sufficiently in the academic setting in which it might best be had. | | | |
< < | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of the privacy advocates of the preceding decade until 2013, and still unbeknownst to most, the NSA continues to undermine encryption standards. Whether through these formerly implemented backdoors, intrusion into VPNs, or merely misuse of our apparent modern disdain for our own privacy, the privacy advocates of old are realizing that their victories were for naught in the current system. Furthermore, federally accepted and oftentimes supported channels of data mining and sharing have constructed economies of our private information and their respective market-leaders will fight tooth-and-nail, as did the great Tobacco companies decades ago, to protect the most lucrative retail operation in human existence. | > > | This is evident in my generation’s mainstream attitude towards the impending extinction of privacy and the internet activity that empowers it: sure, we are tracked and monitored; our online identity is auctioned to interests we will not identify with motives we cannot know. So what? I’m not doing anything wrong. | | | |
< < | When corporate and government greed intersects as holistically as it does with respect to monitoring and marketing our private behavior, it seems that nebulous options are all that remain. Fortunately, however, the Courts could conceivably leverage our constitutional rights against both corporate and government interests.
The Courts have built considerable stare decisis surrounding the notion of an American right to privacy. By supplanting the logic of Lawrence v. Texas into the conversation surrounding internet anonymity, the vulnerabilities preeminent in the systems on which our internet relies can assume a legal barrier. While our current internet may not support such a requirement, a federally mandated network of encrypted nodes, necessitated by a judicial decree respecting a fundamental right to privacy within one’s home, could overhaul the current system enough to render age-old vulnerabilities innocuous- when input data or payment information cannot be designated to a particular individual, its value will drop. | > > | Unfortunately, this is about as robust a conversation on data privacy as one will find in a university hallway. This lethal acquiescence has taken place because the potential misuse of our personal information is not a topic with which my contemporaries are informed. However, some historical highlights of our internet, and our government’s attitude towards it, might make the smart-phone generation a bit less trusting of the current scheme. | | | |
< < | This solution, however, would require a recognition that not only does a right to privacy within one’s home extend to their online behavior, but, that given the insecurities built into the current network, a form of protection other than an anonymizing network is not more easily achieved. This appears to be the case; many internet users opt into encrypted virtual networks and many more undoubtedly would if their use wasn’t inconvenient, unconventional, and even taboo. Furthermore, a mainstream ignorance of the current network could cause policy-makers to turn to privacy experts if required to do so by the Courts, and these privacy experts can illustrate the manageability and functionality of currently existing private networks of encrypted nodes and can argue the value of a national, encrypted virtual network hosted in state and government facilities throughout the United States and even throughout the nations in which our presence and diplomatic relationships would accommodate such an offering. | > > | Examples of Federal and Corporate Misuse | | | |
< < | It may be argued that any such decree would place an undue restrictive barrier on the commercial practices of the companies that collect our information and feed it to the federal government, however, based on the growing influence that online services have on our life and the comparative disadvantage that arises when we opt out of restrictive online contracts concerning our data, it is increasingly important not that the Courts create novel commercial restrictions, but that the Courts simply realize that this activity has been in violation of our precedentially recognized right to privacy, and thereby illegal, since the beginning. | > > | During the 90’s, several parties had dramatically different fantasies concerning the privacy of our online future, and the debate over encryption took its first form. Generally, privacy advocates argued for accessible encryption to offset the consequences of an inherently insecure structure, while others feared that an encrypted internet would provide too available a platform for organized criminals. Ultimately, it appeared, privacy advocates were successful, and a new standard was born on the U.S. network. | | | |
< < | In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one’s home, should remain assumed and necessary for our liberties to be or even appear protected. If a state’s alleged interests are insufficient to intrude upon the sexual rights of a minority of consenting adults, commercial interests and poorly articulated federal interests must be insufficient to allow for an equal intrusion on every American. As soon as our online identities became as central to our lives as our residence, marriage, lodging, transportation and the purchasing of goods, access to online privacy protection should have become as judicially cognizable as protection to the access of these other central channels. And, as the Courts have ensured access to protection of these other channels, even in the face of completely private businesses seeking to employ discriminatory practices and of a systematic governmental approach to protecting these discriminatory practices, it is time that access to true privacy is given equal regard on our menu constitutional principles. | > > | However, the United States implemented export controls on new encryption software to keep it from the international community, and, essentially, to fill other networks with substandard encryption to which the U.S. would have access. While many of these policies were reversed towards the end of Clinton’s presidency and the (alleged) end of the pyrric Crypto Wars, international consumers are still subject to insecurity because protocols stemming from these regulations remain in the default settings of many online systems, and commonplace cybercriminals are now able to exploit these vulnerabilities. | | | |
> > | It isn’t just the vestige of 90’s security vulnerabilities that negatively impact our modern internet environment. Unbeknownst to many of my peers, the NSA continues to undermine encryption standards through these formerly implemented backdoors, intrusion into VPNs, NSA roving bugs, etcetera. Furthermore, federally accepted channels of data merchandising have constructed economies of our most private information, and, generally, none of our browsing, purchasing behavior, or information gathering goes unmonitored. | | | |
< < | | > > | Academic Arrogance and Millennial Apathy | | | |
< < | What this draft most needs is an uncompromising tightening. Each sentence should be reconsidered: what does it mean to say, and how can it do so in the fewest possible words? A sentence like "In a new world, in which the internet has fundamentally altered the nature of human interaction, the basic assumption of privacy, at least within the confines of one's home, should remain assumed and necessary for our liberties to be or even appear protected," makes it impossible to think clearly whatever thought it carries. | > > | The above examples of federal disregard for our online interests, and of federal support of corporations that attack our privacy and censor our access to information, are among many that should make my generation wary. However, while the government has been criticized for these practices, particularly since 2013, these criticisms have not built enough momentum for substantive impact to occur because the former privacy advocates are being replaced with a generation either blind or indifferent to the consequences. The fact that we haven’t taken to the streets over Ajit Pai’s recently approved plan as we have over other contemporary political issues makes clear that our hierarchy of priorities does not include concerns over disastrous internet regulation. And, while the gutting of net neutrality will be bound in the same judicial red-tape as the initiative that it undermined, it couldn’t be more obvious now that the federal government has no intention to accommodate our growing need for online protection. | | | |
< < | Once you have found out what's in here, I suspect it will need
reorganizing. There's an argument here about secrecy, and one about
anonymity, and they are tangled up somewhat in the history of the
crypto wars (part one only, really). I think once you have put each
idea clearly you will see better how to sequence them. Then we can
figure out how to use the space you have gained in order to make the
argument richer. | > > | Social Awareness through Academic Channels | | | |
< < | | > > | Unfortunately, mainstream media is subservient to the data trade and financially interested in the possibility of having their messages augmented by service providers who can silence competing small-scale media outfits. Thus, any movement to reverse the trend in policy that undermines our private access to information will lack an important channel. | |
\ No newline at end of file | |
> > | However, while not immune to the corporate reach that has motivated these policies, academia may have a chance, but is currently too busy overregulating professors and uninviting controversial speakers to engage in the discourse necessary to resist federal and corporate abuse of the internet. My inbox has been bombarded all year with university and student organization statements on contentious protests, disputed speakers, safespaces and the like, but not a word has been given on the concerted executive and legislative movement that may enable service providers to censor any online information with which their corporate interests are inconsistent.
However, the millennial generation and those succeeding it will bear much of the negative impact of a new, completely controlled infobahn. As such, academia should restructure its priorities and provide the educational resources necessary for our otherwise uninformed generation to add data privacy to the list of concerns. If these concerns were to manifest in a cognizable movement, society by-and-large might begin to disapprove of legislators that are bought and sold by service providers, Google, and Facebook.
Unfortunately, however, the millennials that could initiate such a movement do nearly all of their mobilization on the platforms that these titans control. Thus, it is not only necessary to make us aware of the current threat, but also to discourage the use of platforms that contribute to them. If mobilization could again occur outside of Facebook, and instead, on anonymous forums run by organizations with privacy in mind, there could be some hope of slowing the implementation of policy that may take away our ability to mobilize altogether.
If academia is to be successful in this, millennials may demand new anonymous forums, and a new market could form. With the formation of this new market, Facebook and Google’s bilateral data-control structure, as well as the ISPs, will certainly respond with more pressure on legislators. However, they will do so with fewer resources and a less certain market future. Furthermore, if the movement grows to its necessary size, incumbents subservient to corporate interests could be replaced with those subservient to their now-privacy-conscious constituency, and policy may move towards my ultimate goal of online freedom and anonymity, rather than swiftly away from it.
|
|