KatherineHammFirstEssay 4 - 11 Jan 2016 - Main.KatherineHamm
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < | Title: Censorship Then and Now | > > | Arming Yourself Against Surveillance: An Experiment in Operational Security | | | |
< < | -- By KatherineHamm - 03 Nov 2015 | > > | “Liberty is the possibility of doubting, the possibility of making a mistake, the possibility of searching and experimenting, the possibility of saying No to any authority — literary, artistic, philosophical, religious, social, and even political.”
― Ignazio Silone | | | |
> > | -- By KatherineHamm - UPDATED ESSAY | | | |
< < | I. Censorship: A Very Brief History | | | |
< < | Throughout history, censorship has been a tool for political dominance and control. In 399 B.C., Socrates was forced to drink poisonous hemlock for spreading his philosophy and allegedly corrupting the youth of Athens. In 213 B.C., Chinese emperor Qin Shi Huangdi ordered that Confucian texts be burned and its scholars buried alive. In 443 B.C., the ancient Romans first introduced the government position of censor. The censor’s job was to keep count of citizens as well as supervise and regulate public morality. The governing bodies of ancient civilizations practiced routine censorship of texts as a means of controlling citizens by quashing revolutionary ideas. | > > | I. The Experiment: Practicing Saying No to Any Authority, Even Political | | | |
< < | Unfortunately for us, not enough has changed since then. Powerful contemporary governments continue to use censorship to suppress the free exchange of ideas. Press censorship and government propaganda were common in both free and unfree nations up until the 20th century. By the 20th Century, the notion of independence had become so rooted in most Western countries that censorship as a unified government objective fell out of favor, giving way to a fragmented campaign of individual and localized battles. Grassroots censors in the United States waged a moral campaign against offensive books. It became the responsibility of librarians, schoolteachers, parents, and community groups to keep immoral books off the library shelves and away from children whose malleable minds they might corrupt. | > > | After learning about the myriad threats to our digital privacy over the course of the semester, you may be wondering (like I am) how best to protect yourself from these threats. You may feel overwhelmed, frustrated, confused, or even hopeless at the prospect of trying to effect change. I have certainly felt all of these things. You may have rejected the majority of what was said in class because either you couldn’t understand it or couldn’t believe it. Or perhaps, you simply needed to find ready solutions to balance the looming dangers. Here are some I’ve found. | | | |
< < | In unfree nations, governments banned subversive books that threatened their political hold. Formal censorship in Russia was practiced throughout the Russian Empire and persisted in the USSR until the late 1980s. In Nazi Germany, books were routinely and publicly burned, giving credence to German-Jewish poet Heinrich Heine’s prediction that “where they have burned books, they will end in burning human beings.” Government-sponsored censorship continues to be rampant in China. In order to publish there, authors may need to revise nearly a quarter of their contents, including key plot points and characters. Consequently, many publications have gone underground. The current ratio of official-to-pirated books is estimated to be 40/60. | > > | In the experiment, I will explain several “user-friendly” solutions and test them personally, providing my user experience feedback in the hopes that you may be better informed to make your choices as a result. The idea is to highlight a few options that are out there, not to pass judgment. | | | |
< < | Modern standards of personal freedom and individual expression demanded by Western culture do not support outright censorship in contemporary society. But why censor when you can surveil? With the enhanced ability of technology to power mass data collection, modern governments no longer have to censor what we’re reading. Instead, they can track and record everything we look at. | | | |
> > | II. Technology Created the Problem and Offers the Fastest Solutions | | | |
< < | II. Censorship Today: Self-Censorship, Mass Data Collection, and the USA Freedom Act | > > | In class we often discussed the pillars supporting our current regime of digital surveillance: technology, politics, and law. Of these three, technology enabled the tracking and surveillance of individuals and made it profitable by helping companies target ads. By studying their web-browsing and purchasing habits, individual companies created unique profiles of users to extract profits through targeted marketing. Social media sites fueled the consumer economy by inspiring envy and offering platforms for tailored ads. | | | |
< < | On June 2 of this year, the United States government re-approved NSA bulk data collection, a practice originally premised on Section 215 of the Patriot Act, which lapsed on June 1. The new bill, known as the USA Freedom Act, permits the collection of bulk data, or “metadata,” on a temporary basis and imposes a new time limit of six months for keeping the data. (Historically, metadata could be collected for up to 5 years.) Metadata already collected by the NSA will be preserved "until civil litigation regarding the program is resolved, or the relevant courts relieve NSA of such obligations." After that, the data will be destroyed. | > > | Corporate surveillance might seem nefarious and invasive enough to have caused concern from a consumer’s perspective, but the scope of the problem was much larger than the average consumer could have known due to the interconnectedness of the system and its unregulated nature. Particularly because once surveillance technology was available, the government employed it for its own purposes without citizens’ knowledge or consent (e.g. NSA activities , location data , data storage , tracking on social media , third party sharing ). Thus, surveillance technology grew from the consumer economy unsupervised and it evaded the traditional regulatory checks of law and politics by expertly aligning the profit-maximizing incentives of corporations with the political agenda (surveillance, classification, and control). | | | |
< < | Bulk data collection activities fall under the auspices of the Foreign Intelligence Surveillance Court “FISC” or FISA Court. The Court reviews all applications for FISA warrants, which enable the lawful collection of metadata. However, little is known about the FISC’s review process, and it has been the subject of considerable controversy. A few key features of the FISC are notable. First, the Chief Justice uses his sole discretion to appoint Judges to the FISC, without traditional Congressional oversight or confirmation. Second, the Court sits ex parte and hears cases in complete secrecy due to their sensitive nature. Finally, since data shows that approximately 99% of warrant applications are approved, the FISC appears to have no meaningful level of review. Indeed, a former judge on the FISA Court of Review noted that effectively no applications were ever denied, though a handful required amendment before approval. It’s no wonder that critics have referred to the FISC as a kangaroo court. | > > | As tech industry leaders have reminded us, we are the last generation that has a choice about what the landscape of data privacy and individual liberty will look like in the future. Many of these solutions will need to be regulatory changes, but technology permits us each to take steps immediately.
III. Freedom is Individual Choice
To begin, I’ll outline some suggestions made by Edward Snowden in an interview he gave last month to Micah Lee. Snowden believes that encryption is important for everyone because, as we now know, the NSA is collecting data on everyone. He suggests is using an app called Signal (formerly RedPhone? ) to encrypt phone calls and text messages. Download and usability were easy; however, because Signal requires encryption on both ends of the communication, you can only access contacts that already have the app. Therefore, you’re going to need to convince your friends and family members to download the app individually before it can replace your usual methods of communication.
To keep passwords secure, Snowden suggests that we consider using a password manager, which generates unique passwords for every site you use without requiring you to memorize them. In this way, the password manager prevents the situation where a hacker obtains your password from one account and then is able to hack all of your accounts that use the same password. This is a relatively easy way to keep your accounts from getting hacked that requires minimal effort.
Another way to keep passwords secure is to use two-factor authentication before logging in—where the provider sends a message to your phone or other secondary device that you must enter in addition to logging in on the computer. Two-factor authentication prevents against a situation where a physical computer gets corrupted such as an “evil maid attack” . You may have used two-factor authentication in the workplace before. I think it’s a bit of a hassle for personal daily use. However, if you’re handling secure documents, such as legal documents, it seems like a reasonable measure to take to protect that highly sensitive information.
A quick and easy thing to do is to put a post-it over your webcam. I’ve been doing this for years without really knowing why. With the availability of remote access tools (“RATs”), hackers can turn on your webcam remotely without your knowledge. One particular program was distributed to “thousands” of people by an organization called Blackshades and has affected over 700,000 victims since 2010. You probably don’t want to be one of them .
Other personal choices you might consider are turning off location data on your smartphone (including on your camera), deactivating social media sites, using a more secure email server than Gmail, installing an ad-blocker , using anonymous transportation , and limiting your use of electronic payments both to prevent fraud and theft and to limit consumer profiling and price discrimination.
IV. Global Solutions: FreedomBox and TOR
While making some of the changes above will improve your personal operational security, widespread solutions are necessary to reverse the direction of the surveillance state. Currently two solutions stand out for creating secure communication over the net. The Onion Router or TOR is a network that enables secure communication by (onion) routing through disparate nodes that an adversary has difficulty tracking. Another solution is FreedomBox , a technology that promotes everything from free software to secure social networking.
The principle behind both of these technologies is community. They are networks that rely on users like us to opt in. Therefore, we must consider whether tightening personal operational security satisfies us fully and whether we’re ready to take the next step toward building anonymous, secure, and truly free virtual communities.
References
https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
http://www.darkreading.com/risk-management/7-facts-about-geolocation-privacy/d/d-id/1105877?
http://www.wired.com/2012/03/ff_nsadatacenter/
http://fox59.com/2015/07/24/privacy-of-users-social-media-accounts-are-now-at-risk/
http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/
https://theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy/
https://whispersystems.org
https://www.aclu.org/blog/five-ways-keep-your-data-safe-right-now
http://www.trustedcomputinggroup.org/resources/evil_maid_attacks_on_encrypted_hard_drives
http://www.motherjones.com/politics/2014/05/blackshades-malware-remote-access-webcam-fbi
http://arstechnica.com/tech-policy/2013/03/rat-breeders-meet-the-men-who-spy-on-women-through-their-webcams/
http://www.wnyc.org/story/ad-blocker-bloodbath/
http://techcrunch.com/2015/07/29/how-uber-can-protect-consumer-privacy/
https://www.mainstreet.com/article/consumers-dont-trust-mobile-payments-cash-remains-most-secure-payment-method/page/4
http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029
http://freedomboxfoundation.org/ | | | |
< < | The FISC will continue to review warrant applications under the Freedom Act, permitting mass data collection for the next six months. More troubling is the fact that Section 702 of the FISA Amendments Act also authorizes the collection of mass data—and doesn’t expire until 2017. Scarier still is the FISC’s authority under pen/register trap and trace and Section 214 to collect Internet metadata; this authority is permanent. Given the FISC’s opaque administration and thin level of review, it may choose to interpret the Freedom Act differently than Congress intended. Indeed, according to one former FISC Judge, mass data collection could be interpreted broadly to permit the collection of physical objects, such as library books. | | | |
< < | III. Where’s the Harm in That? | | | |
< < | Proponents of mass data collection argue that it does not unconstitutionally invade the privacy rights of American citizens because (1) it targets non-U.S. citizens; and (2) it doesn’t target content. I’m unconvinced. We know now that the NSA collects domestic call information between suspected terrorists and U.S. citizens. Though U.S. citizens may not be targeted specifically, they aren’t exempt. Furthermore, while collected phone data does not include content, plenty of information is conveyed from location of callers to time of call. | | | |
< < | As a former English major, I’ve always believed that we should read as much as we can and that content should be freely available to everyone. As a libertarian, I’ve always valued my privacy. If it’s true that you are what you read, then the NSA and U.S. Government know us intimately. Given the invasiveness of mass data collection and the uncertainty of its limits, why would contemporary authors risk making content public when they can limit their exposure by privatizing and self-censoring? | |
|
|
KatherineHammFirstEssay 3 - 16 Nov 2015 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < | It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. | | Title: Censorship Then and Now | | As a former English major, I’ve always believed that we should read as much as we can and that content should be freely available to everyone. As a libertarian, I’ve always valued my privacy. If it’s true that you are what you read, then the NSA and U.S. Government know us intimately. Given the invasiveness of mass data collection and the uncertainty of its limits, why would contemporary authors risk making content public when they can limit their exposure by privatizing and self-censoring? | |
> > |
Okay, everything you've always thought is right. That makes it convenient to move on to something new. The factual discussion of the metadata colllection program and the FISA court doesn't really make good copy here, because it's too compressed to be accurate and too small a part of the overall picture to be worth the space you're giving it. But if you've always thought all this, and we don't have to be weighed down with small details or phony versions of THE history of censorship, what is the central idea? Let's try a draft that leaves all that decoration on the cutting room floor, and goes straight to the new idea. No general rhetoric, only the most immediately material facts, and a single central idea, of yours not someone else's, whose development we can watch and whose consequences we can ponder.
| |
|
|
KatherineHammFirstEssay 2 - 04 Nov 2015 - Main.KatherineHamm
|
|
META TOPICPARENT | name="FirstEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. |
|
KatherineHammFirstEssay 1 - 03 Nov 2015 - Main.KatherineHamm
|
|
> > |
META TOPICPARENT | name="FirstEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Title: Censorship Then and Now
-- By KatherineHamm - 03 Nov 2015
I. Censorship: A Very Brief History
Throughout history, censorship has been a tool for political dominance and control. In 399 B.C., Socrates was forced to drink poisonous hemlock for spreading his philosophy and allegedly corrupting the youth of Athens. In 213 B.C., Chinese emperor Qin Shi Huangdi ordered that Confucian texts be burned and its scholars buried alive. In 443 B.C., the ancient Romans first introduced the government position of censor. The censor’s job was to keep count of citizens as well as supervise and regulate public morality. The governing bodies of ancient civilizations practiced routine censorship of texts as a means of controlling citizens by quashing revolutionary ideas.
Unfortunately for us, not enough has changed since then. Powerful contemporary governments continue to use censorship to suppress the free exchange of ideas. Press censorship and government propaganda were common in both free and unfree nations up until the 20th century. By the 20th Century, the notion of independence had become so rooted in most Western countries that censorship as a unified government objective fell out of favor, giving way to a fragmented campaign of individual and localized battles. Grassroots censors in the United States waged a moral campaign against offensive books. It became the responsibility of librarians, schoolteachers, parents, and community groups to keep immoral books off the library shelves and away from children whose malleable minds they might corrupt.
In unfree nations, governments banned subversive books that threatened their political hold. Formal censorship in Russia was practiced throughout the Russian Empire and persisted in the USSR until the late 1980s. In Nazi Germany, books were routinely and publicly burned, giving credence to German-Jewish poet Heinrich Heine’s prediction that “where they have burned books, they will end in burning human beings.” Government-sponsored censorship continues to be rampant in China. In order to publish there, authors may need to revise nearly a quarter of their contents, including key plot points and characters. Consequently, many publications have gone underground. The current ratio of official-to-pirated books is estimated to be 40/60.
Modern standards of personal freedom and individual expression demanded by Western culture do not support outright censorship in contemporary society. But why censor when you can surveil? With the enhanced ability of technology to power mass data collection, modern governments no longer have to censor what we’re reading. Instead, they can track and record everything we look at.
II. Censorship Today: Self-Censorship, Mass Data Collection, and the USA Freedom Act
On June 2 of this year, the United States government re-approved NSA bulk data collection, a practice originally premised on Section 215 of the Patriot Act, which lapsed on June 1. The new bill, known as the USA Freedom Act, permits the collection of bulk data, or “metadata,” on a temporary basis and imposes a new time limit of six months for keeping the data. (Historically, metadata could be collected for up to 5 years.) Metadata already collected by the NSA will be preserved "until civil litigation regarding the program is resolved, or the relevant courts relieve NSA of such obligations." After that, the data will be destroyed.
Bulk data collection activities fall under the auspices of the Foreign Intelligence Surveillance Court “FISC” or FISA Court. The Court reviews all applications for FISA warrants, which enable the lawful collection of metadata. However, little is known about the FISC’s review process, and it has been the subject of considerable controversy. A few key features of the FISC are notable. First, the Chief Justice uses his sole discretion to appoint Judges to the FISC, without traditional Congressional oversight or confirmation. Second, the Court sits ex parte and hears cases in complete secrecy due to their sensitive nature. Finally, since data shows that approximately 99% of warrant applications are approved, the FISC appears to have no meaningful level of review. Indeed, a former judge on the FISA Court of Review noted that effectively no applications were ever denied, though a handful required amendment before approval. It’s no wonder that critics have referred to the FISC as a kangaroo court.
The FISC will continue to review warrant applications under the Freedom Act, permitting mass data collection for the next six months. More troubling is the fact that Section 702 of the FISA Amendments Act also authorizes the collection of mass data—and doesn’t expire until 2017. Scarier still is the FISC’s authority under pen/register trap and trace and Section 214 to collect Internet metadata; this authority is permanent. Given the FISC’s opaque administration and thin level of review, it may choose to interpret the Freedom Act differently than Congress intended. Indeed, according to one former FISC Judge, mass data collection could be interpreted broadly to permit the collection of physical objects, such as library books.
III. Where’s the Harm in That?
Proponents of mass data collection argue that it does not unconstitutionally invade the privacy rights of American citizens because (1) it targets non-U.S. citizens; and (2) it doesn’t target content. I’m unconvinced. We know now that the NSA collects domestic call information between suspected terrorists and U.S. citizens. Though U.S. citizens may not be targeted specifically, they aren’t exempt. Furthermore, while collected phone data does not include content, plenty of information is conveyed from location of callers to time of call.
As a former English major, I’ve always believed that we should read as much as we can and that content should be freely available to everyone. As a libertarian, I’ve always valued my privacy. If it’s true that you are what you read, then the NSA and U.S. Government know us intimately. Given the invasiveness of mass data collection and the uncertainty of its limits, why would contemporary authors risk making content public when they can limit their exposure by privatizing and self-censoring?
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|