Thu Apr 25 18:13:05 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2014-05-01

HANGOUT

2024-04-25 | 2024-03-25 | 2024-02-25 | 2024-01-25 | 2023-12-25 | 2023-11-25 | 2023-10-25 | 2023-09-25 | 2023-08-25 | 2023-07-25 | 2023-06-25 | 2023-05-25 | 2023-04-25 | 2023-03-25 | 2023-02-25 | 2023-01-25 | 2022-12-25 | 2022-11-25 | 2022-10-25 | 2022-09-25 | 2022-08-25 | 2022-07-25 | 2022-06-25 | 2022-05-25 | 2022-04-25 | 2022-03-25 | 2022-02-25 | 2022-01-25 | 2021-12-25 | 2021-11-25 | 2021-10-25 | 2021-09-25 | 2021-08-25 | 2021-07-25 | 2021-06-25 | 2021-05-25 | 2021-04-25 | 2021-03-25 | 2021-02-25 | 2021-01-25 | 2020-12-25 | 2020-11-25 | 2020-10-25 | 2020-09-25 | 2020-08-25 | 2020-07-25 | 2020-06-25 | 2020-05-25 | 2020-04-25 | 2020-03-25 | 2020-02-25 | 2020-01-25 | 2019-12-25 | 2019-11-25 | 2019-10-25 | 2019-09-25 | 2019-08-25 | 2019-07-25 | 2019-06-25 | 2019-05-25 | 2019-04-25 | 2019-03-25 | 2019-02-25 | 2019-01-25 | 2018-12-25 | 2018-11-25 | 2018-10-25 | 2018-09-25 | 2018-08-25 | 2018-07-25 | 2018-06-25 | 2018-05-25 | 2018-04-25 | 2018-03-25 | 2018-02-25 | 2018-01-25 | 2017-12-25 | 2017-11-25 | 2017-10-25 | 2017-09-25 | 2017-08-25 | 2017-07-25 | 2017-06-25 | 2017-05-25 | 2017-04-25 | 2017-03-25 | 2017-02-25 | 2017-01-25 | 2016-12-25 | 2016-11-25 | 2016-10-25 | 2016-09-25 | 2016-08-25 | 2016-07-25 | 2016-06-25 | 2016-05-25 | 2016-04-25 | 2016-03-25 | 2016-02-25 | 2016-01-25 | 2015-12-25 | 2015-11-25 | 2015-10-25 | 2015-09-25 | 2015-08-25 | 2015-07-25 | 2015-06-25 | 2015-05-25 | 2015-04-25 | 2015-03-25 | 2015-02-25 | 2015-01-25 | 2014-12-25 | 2014-11-25 | 2014-10-25 | 2014-09-25 | 2014-08-25 | 2014-07-25 | 2014-06-25 | 2014-05-25 | 2014-04-25 | 2014-03-25 | 2014-02-25 | 2014-01-25 | 2013-12-25 | 2013-11-25 | 2013-10-25 | 2013-09-25 | 2013-08-25 | 2013-07-25 | 2013-06-25 | 2013-05-25 | 2013-04-25 | 2013-03-25 | 2013-02-25 | 2013-01-25 | 2012-12-25 | 2012-11-25 | 2012-10-25 | 2012-09-25 | 2012-08-25 | 2012-07-25 | 2012-06-25 | 2012-05-25 | 2012-04-25 | 2012-03-25 | 2012-02-25 | 2012-01-25 | 2011-12-25 | 2011-11-25 | 2011-10-25 | 2011-09-25 | 2011-08-25 | 2011-07-25 | 2011-06-25 | 2011-05-25 | 2011-04-25 | 2011-03-25 | 2011-02-25 | 2011-01-25 | 2010-12-25 | 2010-11-25 | 2010-10-25 | 2010-09-25 | 2010-08-25 | 2010-07-25 | 2010-06-25 | 2010-05-25 | 2010-04-25 | 2010-03-25 | 2010-02-25 | 2010-01-25 | 2009-12-25 | 2009-11-25 | 2009-10-25 | 2009-09-25 | 2009-08-25 | 2009-07-25 | 2009-06-25 | 2009-05-25 | 2009-04-25 | 2009-03-25 | 2009-02-25 | 2009-01-25 | 2008-12-25 | 2008-11-25 | 2008-10-25 | 2008-09-25 | 2008-08-25 | 2008-07-25 | 2008-06-25 | 2008-05-25 | 2008-04-25 | 2008-03-25 | 2008-02-25 | 2008-01-25 | 2007-12-25 | 2007-11-25 | 2007-10-25 | 2007-09-25 | 2007-08-25 | 2007-07-25 | 2007-06-25 | 2007-05-25 | 2007-04-25 | 2007-03-25 | 2007-02-25 | 2007-01-25 | 2006-12-25 | 2006-11-25 | 2006-10-25 | 2006-09-25 | 2006-08-25 | 2006-07-25 | 2006-06-25 | 2006-05-25 | 2006-04-25 | 2006-03-25 | 2006-02-25 | 2006-01-25 | 2005-12-25 | 2005-11-25 | 2005-10-25 | 2005-09-25 | 2005-08-25 | 2005-07-25 | 2005-06-25 | 2005-05-25 | 2005-04-25 | 2005-03-25 | 2005-02-25 | 2005-01-25 | 2004-12-25 | 2004-11-25 | 2004-10-25 | 2004-09-25 | 2004-08-25 | 2004-07-25 | 2004-06-25 | 2004-05-25 | 2004-04-25 | 2004-03-25 | 2004-02-25 | 2004-01-25 | 2003-12-25 | 2003-11-25 | 2003-10-25 | 2003-09-25 | 2003-08-25 | 2003-07-25 | 2003-06-25 | 2003-05-25 | 2003-04-25 | 2003-03-25 | 2003-02-25 | 2003-01-25 | 2002-12-25 | 2002-11-25 | 2002-10-25 | 2002-09-25 | 2002-08-25 | 2002-07-25 | 2002-06-25 | 2002-05-25 | 2002-04-25 | 2002-03-25 | 2002-02-25 | 2002-01-25 | 2001-12-25 | 2001-11-25 | 2001-10-25 | 2001-09-25 | 2001-08-25 | 2001-07-25 | 2001-06-25 | 2001-05-25 | 2001-04-25 | 2001-03-25 | 2001-02-25 | 2001-01-25 | 2000-12-25 | 2000-11-25 | 2000-10-25 | 2000-09-25 | 2000-08-25 | 2000-07-25 | 2000-06-25 | 2000-05-25 | 2000-04-25 | 2000-03-25 | 2000-02-25 | 2000-01-25 | 1999-12-25

Key: Value:

Key: Value:

MESSAGE
DATE 2014-05-29
FROM Ruben Safir
SUBJECT Re: [NYLXS - HANGOUT] where to put this.
Honestly, this is a very long winded and not very useful or insightful
analysis of the situation.

I read for 20 minutes and relized i was only a quarter of the way through
with no useful point being made.

:(



On Thu, May 29, 2014 at 04:28:19PM -0400, Redpill wrote:
> Wonderful essay to counter Kerry?s asinine remarks from our old friend Ebin:
>
> http://www.theguardian.com/technology/2014/may/27/-sp-privacy-under-attack-n
> sa-files-revealed-new-threats-democracy
>
>
>
> Privacy under attack: the NSA files revealed new threats to democracy
>
>
>
> Thanks to Edward Snowden, we know the apparatus of repression has been
> covertly attached to the democratic state. However, our struggle to retain
> privacy is far from hopeless
>
>
>
> Eben Moglen
>
> Tuesday 27 May 2014 06.00 EDT
>
>
>
> In the third chapter of his History of the Decline and Fall of the Roman
> Empire, Edward Gibbon gave two reasons why the slavery into which the Romans
> had tumbled under Augustus and his successors left them more wretched than
> any previous human slavery. In the first place, Gibbon said, the Romans had
> carried with them into slavery the culture of a free people: their language
> and their conception of themselves as human beings presupposed freedom. And
> thus, says Gibbon, for a long time the Romans preserved the sentiments ? or
> at least the ideas ? of a freeborn people. In the second place, the empire
> of the Romans filled all the world, and when that empire fell into the hands
> of a single person, the world was a safe and dreary prison for his enemies.
> As Gibbon wrote, to resist was fatal, and it was impossible to fly.
>
>
>
> The power of that Roman empire rested in its leaders' control of
> communications. The Mediterranean was their lake. Across their European
> empire, from Scotland to Syria, they pushed roads that 15 centuries later
> were still primary arteries of European transportation. Down those roads the
> emperor marched his armies. Up those roads he gathered his intelligence. The
> emperors invented the posts to move couriers and messages at the fastest
> possible speed.
>
>
>
> Using that infrastructure, with respect to everything that involved the
> administration of power, the emperor made himself the best-informed person
> in the history of the world.
>
>
>
> That power eradicated human freedom. "Remember," said Cicero to Marcellus in
> exile, "wherever you are, you are equally within the power of the
> conqueror."
>
>
>
> The empire of the United States after the second world war also depended
> upon control of communications. This was more evident when, a mere 20 years
> later, the United States was locked in a confrontation of nuclear
> annihilation with the Soviet Union. In a war of submarines hidden in the
> dark below the continents, capable of eradicating human civilisation in less
> than an hour, the rule of engagement was "launch on warning". Thus the
> United States valued control of communications as highly as the Emperor
> Augustus. Its listeners too aspired to know everything.
>
>
>
> We all know that the United States has for decades spent as much on its
> military might as all other powers in the world combined. Americans are now
> realising what it means that we applied to the stealing of signals and the
> breaking of codes a similar proportion of our resources in relation to the
> rest of the world.
>
>
>
> The US system of listening comprises a military command controlling a large
> civilian workforce. That structure presupposes the foreign intelligence
> nature of listening activities. Military control was a symbol and guarantee
> of the nature of the activity being pursued. Wide-scale domestic
> surveillance under military command would have violated the fundamental
> principle of civilian control.
>
>
>
> Instead what it had was a foreign intelligence service responsible to the
> president as military commander-in-chief. The chain of military command
> absolutely ensured respect for the fundamental principle "no listening
> here". The boundary between home and away distinguished the permissible from
> the unconstitutional.
>
>
>
> The distinction between home and away was at least technically credible,
> given the reality of 20th-century communications media, which were
> hierarchically organised and very often state-controlled.
>
>
>
> When the US government chose to listen to other governments abroad ? to
> their militaries, to their diplomatic communications, to their policymakers
> where possible ? they were listening in a world of defined targets. The
> basic principle was: hack, tap, steal. We listened, we hacked in, we traded,
> we stole.
>
>
>
> In the beginning we listened to militaries and their governments. Later we
> monitored the flow of international trade as far as it engaged American
> national security interests.
>
>
>
> Last century we desperately fought and died against systems in which the
> state listened to every telephone conversation
>
>
>
> The regime that we built to defend ourselves against nuclear annihilation
> was restructured at the end of the 20th century. In the first place, the
> cold war ended and the Soviet Union dissolved. An entire establishment of
> national security repurposed itself. We no longer needed to spy upon an
> empire with 25,000 nuclear weapons pointed at us. Now we spied on the entire
> population of the world, in order to locate a few thousand people intent on
> various kinds of mass murder. Hence, we are told, spying on entire societies
> is the new normal.
>
>
>
> In the second place, the nature of human communication changed. We built a
> system for attacking fixed targets: a circuit, a phone number, a licence
> plate, a locale. The 20th-century question was how many targets could be
> simultaneously followed in a world where each of them required hack, tap,
> steal. But we then started to build a new form of human communication. From
> the moment we created the internet, two of the basic assumptions began to
> fail: the simplicity of "one target, one circuit" went away, and the
> difference between home and abroad vanished too.
>
>
>
> That distinction vanished in the United States because so much of the
> network and associated services, for better and worse, resided there. The
> question "Do we listen inside our borders?" was seemingly reduced to "Are we
> going to listen at all?"
>
>
>
> At this point, a vastly imprudent US administration intervened. Their
> defining characteristic was that they didn't think long before acting.
> Presented with a national calamity that also constituted a political
> opportunity, nothing stood between them and all the mistakes that haste can
> make for their children's children to repent at leisure. What they did ? in
> secret, with the assistance of judges appointed by a single man operating in
> secrecy, and with the connivance of many decent people who believed
> themselves to be acting to save the society ? was to unchain the listeners
> from law.
>
>
>
> Not only had circumstances destroyed the simplicity of "no listening
> inside", not only had fudging with the foreign intelligence surveillance act
> carried them where law no longer provided useful landmarks, but they
> actually wanted to do it. Their view of the nature of human power was
> Augustan, if not august. They wanted what it is forbidden to wise people to
> take unto themselves. And so they fell, and we fell with them.
>
>
>
> Our journalists failed. The New York Times allowed the 2004 election not to
> be informed by what it knew about the listening. Its decision to censor
> itself was, like all censorship and self-censorship, a mortal wound
> inflicted on democracy. We the people did not demand the end at the
> beginning. And now we're a long way in.
>
>
>
> Our military listeners have invaded the centre of an evolving net, where
> conscriptable digital superbrains gather intelligence on the human race for
> purposes of bagatelle and capitalism. In the US, the telecommunications
> companies have legal immunity for their complicity, thus easing the way
> further.
>
>
>
> The invasion of our net was secret, and we did not know that we should
> resist. But resistance developed as a fifth column among the listeners
> themselves.
>
>
>
> In Hong Kong, Edward Snowden said something straightforward and useful:
> analysts, he said, are not bad people, and they don't want to think of
> themselves that way. But they came to calculate that if a programme produced
> anything useful, it was justified.
>
>
>
> It was not the analysts' job to weigh the fundamental morality for us.
>
>
>
> In a democracy, that task is given by the people to the leaders they elect.
> These leaders fell ? and we fell with them ? because they refused to adhere
> to the morality of freedom. The civilian workers in their agencies felt
> their failure first. From the middle of last decade, people began to blow
> whistles all over the field. These courageous workers sacrificed their
> careers, frightened their families, sometimes suffered personal destruction,
> to say that there was something deeply wrong.
>
>
>
> The response was rule by fear. Two successive US administrations sought to
> deal with the whistleblowers among the listeners by meting out the harshest
> possible treatment.
>
>
>
> Snowden said in Hong Kong that he was sacrificing himself in order to save
> the world from a system like this one, which is "constrained only by policy
> documents". The political ideas of Snowden are worthy of our respect and our
> deep consideration. But for now it is sufficient to say that he was not
> exaggerating the nature of the difficulty.
>
>
>
> Because of Snowden, we now know that the listeners undertook to do what they
> repeatedly promised respectable expert opinion they would never do. They
> always said they would not attempt to break the crypto that secures the
> global financial system.
>
>
>
> That was false.
>
>
>
> When Snowden disclosed the existence of the NSA's Bullrun programme we
> learned that NSA had lied for years to the financiers who believe themselves
> entitled to the truth from the government they own. The NSA had not only
> subverted technical standards, attempting to break the encryption that holds
> the global financial industry together, it had also stolen the keys to as
> many vaults as possible. With this disclosure the NSA forfeited respectable
> opinion around the world. Their reckless endangerment of those who don't
> accept danger from the United States government was breathtaking.
>
>
>
> The empire of the United States was the empire of exported liberty. What it
> had to offer all around the world was liberty and freedom. After
> colonisation, after European theft, after forms of state-created horror, it
> promised a world free from state oppression.
>
>
>
> Last century we were prepared to sacrifice many of the world's great cities
> and tens of millions of human lives. We bore those costs in order to smash
> regimes we called "totalitarian", in which the state grew so powerful and so
> invasive that it no longer recognised any border of private life. We
> desperately fought and died against systems in which the state listened to
> every telephone conversation and kept a list of everybody every troublemaker
> knew.
>
>
>
> Snowden spied on behalf of the human race. As he said, only the American
> people could decide if his sacrifice was worth it.
>
>
>
> But in the past 10 years, after the morality of freedom was withdrawn, the
> state has begun fastening the procedures of totalitarianism on the substance
> of democratic society.
>
>
>
> There is no historical precedent for the proposition that the procedures of
> totalitarianism are compatible with the system of enlightened, individual
> and democratic self-governance. Such an argument would be doomed to failure.
> It is enough to say in opposition that omnipresent invasive listening
> creates fear. And that fear is the enemy of reasoned, ordered liberty.
>
>
>
> It is utterly inconsistent with the American ideal to attempt to fasten
> procedures of totalitarianism on American constitutional self-governance.
> But there is an even deeper inconsistency between those ideals and the
> subjection of every other society on earth to mass surveillance.
>
>
>
> Some of the system's servants came to understand that it was being sustained
> not with, but against, democratic order. They knew their vessel had come
> unmoored in the dark, and was sailing without a flag. When they blew the
> whistle, the system blew back at them. In the end ? at least so far, until
> tomorrow ? there was Snowden, who saw everything that happened and watched
> the fate of others who spoke up.
>
>
>
> He understood, as Chelsea Manning also always understood, that when you wear
> the uniform you consent to the power. He knew his business very well. Young
> as he was, as he said in Hong Kong, "I've been a spy all my life." So he did
> what it takes great courage to do in the presence of what you believe to be
> radical injustice. He wasn't first, he won't be last, but he sacrificed his
> life as he knew it to tell us things we needed to know. Snowden committed
> espionage on behalf of the human race. He knew the price, he knew the
> reason. But as he said, only the American people could decide, by their
> response, whether sacrificing his life was worth it.
>
>
>
> So our most important effort is to understand the message: to understand its
> context, purpose, and meaning, and to experience the consequences of having
> received the communication.
>
>
>
> Even once we have understood, it will be difficult to judge Snowden, because
> there is always much to say on both sides when someone is greatly right too
> soon.
>
>
>
> In the United States, those who were "premature anti-fascists" suffered. It
> was right to be right only when all others were right. It was wrong to be
> right when only people we disagreed with held the views that we were later
> to adopt ourselves.
>
>
>
> Snowden has been quite precise. He understands his business. He has spied on
> injustice for us and has told us what we require in order to do the job and
> get it right. And if we have a responsibility, then it is to learn, now,
> before somebody concludes that learning should be prohibited.
>
>
>
> In considering the political meaning of Snowden's message and its
> consequences, we must begin by discarding for immediate purposes pretty much
> everything said by the presidents, the premiers, the chancellors and the
> senators. Public discussion by these "leaders" has provided a remarkable
> display of misdirection, misleading and outright lying. We need instead to
> focus on the thinking behind Snowden's activities. What matters most is how
> deeply the whole of the human race has been ensnared in this system of
> pervasive surveillance.
>
>
>
> We begin where the leaders are determined not to end, with the question of
> whether any form of democratic self-government, anywhere, is consistent with
> the kind of massive, pervasive surveillance into which the United States
> government has led not only its people but the world.
>
>
>
> This should not actually be a complicated inquiry.
>
>
>
> For almost everyone who lived through the 20th century ? at least its middle
> half ? the idea that freedom was consistent with the procedures of
> totalitarianism was self-evidently false. Hence, as we watch responses to
> Snowden's revelations we see that massive invasion of privacy triggers
> justified anxiety among the survivors of totalitarianism about the fate of
> liberty. To understand why, we need to understand more closely what our
> conception of "privacy" really contains.
>
>
>
> Our concept of "privacy" combines three things: first is secrecy, or our
> ability to keep the content of our messages known only to those we intend to
> receive them. Second is anonymity, or secrecy about who is sending and
> receiving messages, where the content of the messages may not be secret at
> all. It is very important that anonymity is an interest we can have both in
> our publishing and in our reading. Third is autonomy, or our ability to make
> our own life decisions free from any force that has violated our secrecy or
> our anonymity. These three ? secrecy, anonymity and autonomy ? are the
> principal components of a mixture we call "privacy".
>
>
>
> Without secrecy, democratic self-government is impossible. Without secrecy,
> people may not discuss public affairs with those they choose, excluding
> those with whom they do not wish to converse.
>
>
>
> Anonymity is necessary for the conduct of democratic politics. Not only must
> we be able to choose with whom we discuss politics, we must also be able to
> protect ourselves against retaliation for our expressions of political
> ideas. Autonomy is vitiated by the wholesale invasion of secrecy and
> privacy. Free decision-making is impossible in a society where every move is
> monitored, as a moment's consideration of the state of North Korea will
> show, as would any conversation with those who lived through 20th-century
> totalitarianisms, or any historical study of the daily realities of American
> chattel slavery before our civil war.
>
>
>
> In other words, privacy is a requirement of democratic self-government. The
> effort to fasten the procedures of pervasive surveillance on human society
> is the antithesis of liberty. This is the conversation that all the "don't
> listen to my mobile phone!" misdirection has not been about. If it were up
> to national governments, the conversation would remain at this phoney level
> forever.
>
>
>
> The US government and its listeners have not advanced any convincing
> argument that what they do is compatible with the morality of freedom, US
> constitutional law or international human rights. They will instead attempt,
> as much as possible, to change the subject, and, whenever they cannot change
> the subject, to blame the messenger.
>
>
>
> One does not need access to classified documents to see how the military and
> strategic thinkers in the United States adapted to the end of the cold war
> by planning pervasive surveillance of the world's societies. From the early
> 1990s, the public literature of US defence policy shows, strategic and
> military planners foresaw a world in which the United States had no
> significant state adversary. Thus, we would be forced to engage in a series
> of "asymmetric conflicts", meaning "guerrilla wars" with "non-state actors".
>
>
>
> In the course of that redefinition of US strategic posture, the military
> strategists and their intelligence community colleagues came to regard US
> rights to communications privacy as the equivalent of sanctuary for
> guerrillas. They conceived that it would be necessary for the US military,
> the listeners, to go after the "sanctuaries".
>
>
>
> Then, at the opening of the 21st century, a US administration that will go
> down in history for its tendency to think last and shoot first bought ?
> hook, line and sinker ? the entire "denying sanctuary", pervasive
> surveillance, "total information awareness" scheme. Within a very short time
> after January 2002, mostly in secret, they put it all together.
>
>
>
> The consequences around the world were remarkably uncontroversial. By and
> large, states approved or accepted. After September 2001, the United States
> government used quite extraordinary muscle around the world: you were either
> with us or against us. Moreover, many other governments had come to base
> their national security systems crucially on cooperation with American
> listening.
>
>
>
> By the time the present US administration had settled into office, senior
> policymakers thought there was multilateral consensus on listening to other
> societies: it could not be stopped and therefore it shouldn't be limited.
> The Chinese agreed. The US agreed. The Europeans agreed; their position was
> somewhat reluctant, but they were dependent on US listening and hadn't a lot
> of power to object.
>
>
>
> Nobody told the people of the world. By the end of the first decade of the
> 21st century, a gap opened between what the people of the world thought
> their rights were and what their governments had given away in return for
> intelligence useful only to the governments themselves. This gap was so
> wide, so fundamental to the meaning of democracy, that those who operated
> the system began to disbelieve in its legitimacy. As they should have done.
>
>
>
> Snowden saw what happened to other whistleblowers, and behaved accordingly.
> His political theory has been quite exact and entirely consistent. He says
> the existence of these programmes, undisclosed to the American people, is a
> fundamental violation of American democratic values. Surely there can be no
> argument with that.
>
>
>
> Snowden's position is that efforts so comprehensive, so overwhelmingly
> powerful, and so conducive to abuse, should not be undertaken save with
> democratic consent. He has expressed recurrently his belief that the
> American people are entitled to give or withhold that informed consent. But
> Snowden has also identified the fastening of those programmes on the global
> population as a problematic act, which deserves a form of moral and ethical
> analysis that goes beyond mere raison d'?tat.
>
>
>
> Hopelessness is merely the condition they want you to catch, not one you
> have to have
>
>
>
> I think Snowden means that we should make those decisions not in the narrow,
> national self-interest, but with some heightened moral sense of what is
> appropriate for a nation that holds itself out as a beacon of liberty to
> humanity.
>
>
>
> We can speak, of course, about American constitutional law and about the
> importance of American legal phenomena ? rules, protections, rights, duties
> ? with respect to all of this. But we should be clear that, when we talk
> about the American constitutional tradition with respect to freedom and
> slavery, we're talking about more than what is written in the law books.
>
>
>
> We face two claims ? you meet them everywhere you turn ? that summarise the
> politics against which we are working. One argument says: "It's hopeless,
> privacy is gone, why struggle?" The other says: "I'm not doing anything
> wrong, why should I care?"
>
>
>
> These are actually the most significant forms of opposition that we face in
> doing what we know we ought to do.
>
>
>
> In the first place, our struggle to retain our privacy is far from hopeless.
> Snowden has described to us what armour still works. His purpose was to
> distinguish between those forms of network communication that are hopelessly
> corrupted and no longer usable, those that are endangered by a continuing
> assault on the part of an agency gone rogue, and those that, even with their
> vast power, all their wealth, and all their misplaced ambition,
> conscientiousness and effort, they still cannot break.
>
>
>
> Hopelessness is merely the condition they want you to catch, not one you
> have to have.
>
>
>
> So far as the other argument is concerned, we owe it to ourselves to be
> quite clear in response: "If we are not doing anything wrong, then we have a
> right to resist."
>
>
>
> If we are not doing anything wrong, then we have a right to do everything we
> can to maintain the traditional balance between us and power that is
> listening. We have a right to be obscure. We have a right to mumble. We have
> a right to speak languages they do not get. We have a right to meet when and
> where and how we please.
>
>
>
> We have an American constitutional tradition against general warrants. It
> was formed in the 18th century for good reason. We limit the state's ability
> to search and seize to specific places and things that a neutral magistrate
> believes it is reasonable to allow.
>
>
>
> That principle was dear to the First Congress, which put it in our bill of
> rights, because it was dear to British North Americans; because in the
> course of the 18th century they learned what executive government could do
> with general warrants to search everything, everywhere, for anything they
> didn't like, while forcing local officials to help them do it. That was a
> problem in Massachusetts in 1761 and it remained a problem until the end of
> British rule in North America. Even then, it was a problem, because the
> presidents, senators and chancellors were also unprincipled in their
> behaviour. Thomas Jefferson, too, like the president now, talked a better
> game than he played.
>
>
>
> This principle is clear enough. But there are only nine votes on the US
> supreme court, and only they count right now. We must wait to see how many
> of them are prepared to face the simple unconstitutionality of a rogue
> system much too big to fail. But because those nine votes are the only votes
> that matter, the rest of us must go about our business in other ways.
>
>
>
> The American constitutional tradition we admire was made mostly by people
> who had fled Europe and come to North America in order to be free. It is
> their activity, politically and intellectually, that we find deposited in
> the documents that made the republic.
>
>
>
> But there is a second constitutional tradition. It was made by people who
> were brought here against their will, or who were born into slavery, and who
> had to run away, here, in order to be free. This second constitutional
> tradition is slightly different in its nature from the first, although it
> conduces, eventually, to similar conclusions.
>
>
>
> We face two claims. One says: 'It's hopeless, privacy is gone, why
> struggle?' The other: 'I'm not doing anything wrong, why should I care?'.
> These are actually the most significant forms of opposition we face.
>
>
>
> Running away from slavery is a group activity. Running away from slavery
> requires the assistance of those who believe that slavery is wrong. People
> in the United States have forgotten how much of our constitutional tradition
> was made in the contact between people who needed to run away in order to be
> free and people who knew that they needed to help, because slavery is wrong.
>
>
>
> We have now forgotten that in the summer of 1854, when Anthony Burns ? who
> had run away from slavery in Richmond, Virginia ? was returned to slavery by
> a state judge acting as a federal commissioner under the second fugitive
> slave act, Boston itself had to be placed under martial law for three whole
> days. Federal troops lined the streets, as Burns was marched down to Boston
> Harbor and put aboard a ship to be sent back to slavery. If Boston had not
> been held down by force, it would have risen.
>
>
>
> When Frederick Douglass ran away from slavery in 1838, he had the help of
> his beloved Anna Murray, who sent him part of her savings and the sailor's
> clothing that he wore. He had the help of a free black seaman who gave him
> identity papers. Many dedicated people risked much to help him reach New
> York.
>
>
>
> Our constitutional tradition is not merely contained in the negative rights
> found in the bill of rights. It is also contained in the history of a
> communal, often formally illegal, struggle for liberty against slavery. This
> part of our tradition says that liberty from oppressive control must be
> accorded people everywhere, as a right. It says that slavery is simply
> wrong, that it cannot be tolerated or justified by the master's fear or need
> for security.
>
>
>
> So the constitutional tradition Americans should be defending now is a
> tradition that extends far beyond whatever boundary the fourth amendment has
> in space, place, or time. Americans should be defending not merely a right
> to be free from the oppressive attentions of the national government, not
> merely fighting for something embodied in the due process clause of the 14th
> amendment. We should rather be fighting against the procedures of
> totalitarianism because slavery is wrong. Because fastening the surveillance
> of the master on the whole human race is wrong. Because providing the
> energy, the money, the technology, the system for subduing everybody's
> privacy around the world ? for destroying sanctuary in American freedom of
> speech ? is wrong.
>
>
>
> Snowden has provided the most valuable thing that democratic self-governing
> people can have, namely information about what is going on. If we are to
> exercise our rights as self-governing people, using the information he has
> given us, we should have clear in our minds the political ideas upon which
> we act. They are not parochial, or national, or found in the records of
> supreme court decisions alone.
>
>
>
> A nation conceived in liberty, and dedicated to the proposition that all men
> are created equal, enslaved millions of people. It washed away that sin in a
> terrible war. Americans should learn from that, and are called upon now to
> do so.
>
>
>
> Knowing what we know, thanks to Snowden, citizens everywhere must demand two
> things of their governments: "In the first place," we must say to our
> rulers, "you have a responsibility, a duty, to protect our rights by
> guarding us against the spying of outsiders." Every government has that
> responsibility.
>
>
>
> It must protect the rights of its citizens to be free from intrusive mass
> surveillance by other states. No government can pretend to sovereignty and
> responsibility unless it makes every effort within its power and its means
> to ensure that outcome.
>
>
>
> In the second place, every government must subject its domestic listening to
> the rule of law. The overwhelming arrogance of the listeners and the
> foolishness of the last administration has left the US government in an
> unnecessary hole. Until the last administration unchained the listeners from
> law, the US government could have held up its head before the world,
> proclaiming that only its listeners were subject to the rule of law. It
> would have been an accurate boast.
>
>
>
> For almost nothing, history will record, they threw that away.
>
>
>
> To the citizens of the United States, a greater responsibility is given. The
> government is projecting immensities of power into the destruction of
> privacy in the world's other societies. It is doing so without any
> democratic check or control, and its people must stop it. Americans' role as
> the beacon of liberty in the world requires no less of us.
>
>
>
> Freedom has been hunted round the globe. Asia and Africa have long expelled
> her. Europe has been bullied into treating her like a stranger and Britain
> would arrest her at Heathrow if she arrived. The president of the United
> States has demanded that no one shall receive the fugitive, and maybe only
> the Brazilian president, Dilma Rousseff, wants to prepare in time an asylum
> for mankind.
>
>
>
> Political leaders around the world have had much to say since Snowden began
> his revelations, but not one statement that consisted of "I regret
> subjecting my own people to these procedures". The German chancellor, though
> triumphantly re-elected with not a cloud in her political sky, is in no
> position to say, "I agreed with the Americans to allow 40m telephone calls a
> day to be intercepted in Germany; I just want them to stop listening to my
> phone!"
>
>
>
> The US listeners are having a political crisis beyond their previous
> imagining. They do not like to appear in the spotlight, or indeed to be
> visible at all. Now they have lost their credibility with the cybersecurity
> industry, which has realised that they have broken their implicit promises
> about what they would not hack. The global financial industry is overwhelmed
> with fear at what they've done. The other US government agencies they
> usually count on for support are fleeing them.
>
>
>
> We will never again have a similar moment of political disarray on the side
> that works against freedom. Not only have they made the issue clear to
> everybody ? not only have they created martyrs in our comrades at Fort
> Leavenworth, at the Ecuadorian embassy in London and at an undisclosed
> location in Moscow ? not only have they lit this fire beyond the point where
> they can piss it out, but they have lost their armour. They stand before us
> in the fullness of who they really are. It is up to us to show that we
> recognise them.
>
>
>
> What they have done is to build a state of permanent war into the net.
> Twelve years into a war that never seems to end, they are making the net a
> wartime place forever. We must reimagine what a net at peace would look
> like: cyberpeace. Young people around the world now working on the theory of
> cyberpeace are doing the most important political work of our time. We will
> now have to provide what democracies provide best, which is peace. We have
> to be willing to declare victory and go home. When we do, we have to leave
> behind a net that is no longer in a state of war, a net which no longer uses
> surveillance to destroy the privacy that founds democracy.
>
>
>
> This is a matter of international public law. In the end this is about
> something like prohibiting chemical weapons, or landmines. A matter of
> disarmament treaties. A matter of peace enforcement.
>
>
>
> What if every book for the past 500 years had been reporting its readers
> at headquarters?
>
>
>
> The difficulty is that we have not only our good and patriotic fellow
> citizens to deal with, for whom an election is a sufficient remedy, but we
> have also an immense structure of private surveillance that has come into
> existence. This structure has every right to exist in a free market, but is
> now creating ecological disaster from which governments alone have
> benefited.
>
>
>
> We have to consider not only, therefore, what our politics are with respect
> to the states, but also with respect to the enterprises.
>
>
>
> Instead we are still at a puppet show in which the people who are the
> legitimate objects of international surveillance ? namely politicians, heads
> of state, military officers, and diplomats ? are screaming about how they
> should not be listened to. As though they were us and had a right to be left
> alone.
>
>
>
> And that, of course, is what they want. They want to confuse us. They want
> us to think that they are us ? that they're not the people who allowed this
> to happen, who cheered it on, who went into business with it.
>
>
>
> We must cope with the problems their deceptions created. Our listeners have
> destroyed the internet freedom policy of the US government. They had a good
> game so long as they could play both sides. But now we have comrades and
> colleagues around the world who are working for the freedom of the net in
> dangerous societies; they have depended upon material support and assistance
> from the United States government, and they now have every reason to be
> frightened.
>
>
>
> What if the underground railroad had been constantly under efforts of
> penetration by the United States government on behalf of slavery?
>
>
>
> What if every book for the past 500 years had been reporting its readers at
> headquarters?
>
>
>
> The bad news for the people of the world is we were lied to thoroughly by
> everybody for nearly 20 years. The good news is that Snowden has told us the
> truth.
>
> A server room at Facebook
>
>
>
> Edward Snowden has revealed problems for which we need solutions. The vast
> surveillance-industrial state that has grown up since 2001 could not have
> been constructed without government contractors and the data-mining
> industry. Both are part of a larger ecological crisis brought on by
> industrial overreaching. We have failed to grasp the nature of this crisis
> because we have misunderstood the nature of privacy. Businesses have sought
> to profit from our confusion, and governments have taken further advantage
> of it, threatening the survival of democracy itself.
>
>
>
> In this context, we must remember that privacy is about our social
> environment, not about isolated transactions we individually make with
> others. When we decide to give away our personal information, we are also
> undermining the privacy of other people. Privacy is therefore always a
> relation among many people, rather than a transaction between two.
>
>
>
> Many people take money from you by concealing this distinction. They offer
> you free email service, for example. In return, they want you to let them
> read all the mail. Their stated purpose is advertising to you. It's just a
> transaction between two parties. Or, they offer you free web hosting for
> your social communications, and then they watch everybody looking at
> everything.
>
>
>
> This is convenient, for them, but fraudulent. If you accept this supposedly
> bilateral offer, to provide email service to you for free as long as it can
> all be read, then everybody who corresponds with you is subjected to this
> bargain. If your family contains somebody who receives mail at Gmail, then
> Google gets a copy of all correspondence in your family. If another member
> of your family receives mail at Yahoo, then Yahoo receives a copy of all the
> correspondence in your family as well.
>
>
>
> Perhaps even this degree of corporate surveillance of your family's email is
> too much for you. But as Snowden's revelations showed, to the discomfiture
> of governments and companies alike, the companies are also sharing all that
> mail with power ? which is buying it, getting courts to order it turned
> over, or stealing it ? whether the companies like it or not.
>
>
>
> The same will be true if you decide to live your social life on a website
> where the creep who runs it monitors every social interaction, keeping a
> copy of everything said, and also watching everybody watch everybody else.
> If you bring new "friends" to the service, you are attracting them to the
> creepy inspection, forcing them to undergo it with you.
>
>
>
> This is an ecological problem, because our individual choices worsen the
> condition of the group as a whole. The service companies' interest, but not
> ours, is to hide this view of the problem, and concentrate on getting
> individual consent. From a legal perspective, the essence of transacting is
> consent. If privacy is transactional, your consent to surveillance is all
> the commercial spy needs. But if privacy is correctly understood, consent is
> usually irrelevant, and focusing on it is fundamentally inappropriate.
>
>
>
> We do not, with respect to clean air and clean water, set the limits of
> tolerable pollution by consent. We have socially established standard of
> cleanliness, which everybody has to meet.
>
>
>
> Environmental law is not law about consent. But with respect to privacy we
> have been allowed to fool ourselves.
>
>
>
> We've lost the ability to read anonymously. Without anonymity in reading
> there is no freedom of mind, there's literally slavery
>
>
>
> What is actually a subject of environmental regulation has been sold to us
> as a mere matter of bilateral bargaining. The facts show this is completely
> untrue.
>
>
>
> An environmental devastation has been produced by the ceaseless pursuit of
> profit from data-mining in every legal way imaginable. Restraints that
> should have existed in the interest of protection against environmental
> degradation have never been imposed.
>
>
>
> There is a tendency to blame oversharing. We are often told that the real
> problem of privacy is that kids are just sharing too darn much. When you
> democratise media, which is what we are doing with the net, ordinary people
> will naturally say more than they ever said before. This is not the problem.
> In a free society people should be protected in their right to say as much
> or as little as they want.
>
>
>
> The real problem is that we are losing the anonymity of reading, for which
> nobody has contracted at all.
>
>
>
> We have lost the ability to read anonymously, but the loss is concealed from
> us because of the way we built the web. We gave people programs called
> "browsers" that everyone could use, but we made programs called "web
> servers" that only geeks could use ? very few people have ever read a web
> server log. This is a great failing in our social education about
> technology. It's equivalent to not showing children what happens if cars
> collide and people aren't wearing seat belts.
>
>
>
> We don't explain to people how a web server log captures in detail the
> activity of readers, nor how much you can learn about people, because of
> what and how they read. From the logs, you can learn how long each reader
> spends on each page, how she reads it, where she goes next, what she does or
> searches for on the basis of what she's just read. If you can collect all
> that information in the logs, then you are beginning to possess what you
> ought not to have.
>
>
>
> Without anonymity in reading there is no freedom of the mind. Indeed, there
> is literally slavery. Reading was the pathway, the abolitionist Frederick
> Douglass wrote, from slavery to freedom. Writing his memoir of his own
> journey, Douglass recalled that when one of his owners tried to prevent him
> from reading, "I now understood what had been to me a most perplexing
> difficulty ? to wit, the white man's power to enslave the black man."
>
>
>
> But what if every book and newspaper he touched had reported him?
>
>
>
> If you have a Facebook account, Facebook is surveilling every single moment
> you spend there. Moreover, much more importantly, every web page you touch
> that has a Facebook "like" button on it which, whether you click the button
> or not, will report your reading of that page to Facebook.
>
>
>
> If the newspaper you read every day has Facebook "like" buttons or similar
> services' buttons on those pages, then Facebook or the other service watches
> you read the newspaper: it knows which stories you read and how long you
> spent on them.
>
>
>
> Every time you tweet a URL, Twitter is shortening the URL for you. But it is
> also arranging that anybody who clicks on that URL will be monitored by
> Twitter as they read. You are not only helping people know what's on the
> web, but also helping Twitter read over everybody's shoulder everything you
> recommend.
>
>
>
> This isn't transactional, this is ecological. This is an environmental
> destruction of other people's freedom to read. Your activity is designed to
> help them find things they want to read. Twitter's activity is to disguise
> the surveillance of the resulting reading from everybody.
>
>
>
> We allowed this system to grow up so quickly around us that we had no time
> to understand its implications. By the time the implications have been
> thought about, the people who understand are not interested in talking,
> because they have got an edge, and that edge is directed at you.
>
>
>
> Commercial surveillance then attracts government attention, with two results
> that Snowden has documented for us: complicity and outright thievery.
>
>
>
> The data-mining companies believed, they say, that they were merely in a
> situation of complicity with government. Having created unsafe technological
> structures that mined you, they thought they were merely engaged in
> undisclosed bargaining over how much of what they had on you they should
> deliver. This was, of course, a mingled game of greed and fear.
>
>
>
> What the US data-mining companies basically believed, or wanted us to
> believe they believed until Snowden woke them, was that by complicity they
> had gained immunity from actual thievery. But we have now learned their
> complicity bought them nothing. They sold us out halfway, and government
> stole the rest.
>
>
>
> They discovered that what they had expected by way of honesty from the US
> listeners, the NSA and other agencies, they hadn't got at all. The US
> listeners' attitude evidently was: "What's ours is ours, and what's yours is
> negotiable. Unless we steal it first."
>
>
>
> Like the world financial industry, the great data-mining companies took the
> promises of the US military listeners too seriously. That, at any rate, is
> the charitable interpretation of their conduct. They thought there were
> limits to what power would do.
>
>
>
> Thanks to Snowden, for the data-miners, as for the US listeners, the
> situation is no longer politically controllable. They have lost their
> credibility, their trustworthiness, before the world. If they fail to regain
> their customers' trust, notwithstanding how convenient, even necessary,
> their services may seem to us, they are finished.
>
>
>
> Environmental problems ? such as climate change, water pollution, slavery,
> or the destruction of privacy ? are not solved transactionally by
> individuals.
>
>
>
> It takes a union to destroy slavery. The essence of our difficulty, too, is
> union.
>
>
>
> Another characteristic of the great data-miners is that there is no union
> within or around them.
>
>
>
> They are now public corporations, but the union of shareholders is
> ineffective in controlling their environmental misdoing. These companies are
> remarkably opaque with respect to all that they actually do, and they are so
> valuable that shareholders will not kill the goose that lays the golden egg
> by inquiring whether their business methods are ethical. A few powerful
> individuals control all the real votes in these companies. Their workforces
> do not have a collective voice.
>
>
>
> Snowden has been clear all along that the remedy for this environmental
> destruction is democracy. But he has also repeatedly pointed out that, where
> workers cannot speak up and there is no collective voice, there is no
> protection for the public's right to know.
>
>
>
> When there is no collective voice for those who are within structures that
> deceive and oppress, then somebody has to act courageously on his own.
> Before Augustus, the Romans of the late republic knew the secrecy of the
> ballot was essential to the people's right.
>
>
>
> In every country in the world that holds meaningful elections, Google knows
> how you are going to vote. It's already shaping your political coverage for
> you, in your customised news feed, based upon what you want to read, and who
> you are, and what you like. Not only does it know how you're going to vote,
> it's helping to confirm you in your decision to vote that way ? unless some
> other message has been purchased by a sponsor.
>
>
>
> Without the anonymity of reading there is no democracy. I mean of course
> that there aren't fair and free elections, but much more deeply than that I
> mean there is no such thing as free self-governance.
>
>
>
> And we are still very ill-informed, because there are no unions seeking to
> raise ethical issues inside the data-miners, and we have too few Snowdens.
>
>
>
> The futures of the data-miners are not all the same. Google as an
> organisation has concerned itself with the ethical issues of what it does
> from the very beginning. Larry Page and Sergey Brin [the founders of Google]
> did not stumble randomly on the idea that they had a special obligation not
> to be evil. They understood the dangerous possibilities implicit in the
> situation they were creating.
>
>
>
> It is technically feasible for Google to make Gmail into a system that is
> truly secure and secret, though not anonymous, for its users.
>
>
>
> Mail could be encrypted ? using public keys in a web of trust ? within
> users' own computers, in their browsers; email at rest at Gmail could be
> encrypted using algorithms to which the user, rather than Google, has the
> relevant keys.
>
>
>
> Google would be forgoing Gmail's scant profit, but its actions would be
> consistent with the idea that the net belongs to its users throughout the
> world. In the long run it is good for Google to be seen not only to believe,
> but to act upon, this idea, for it is the only way for it to regain those
> users' trust. There are many thoughtful, dedicated people at Google who must
> choose between doing what is right and blowing the whistle on what is wrong.
>
>
>
> The situation at Facebook is different. Facebook is strip-mining human
> society. Watching everyone share everything in their social lives and
> instrumenting the web to surveil everything they read outside the system is
> inherently unethical.
>
>
>
> But we need no more from Facebook than truth in labelling. We need no rules,
> no punishments, no guidelines. We need nothing but the truth. Facebook
> should lean in and tell its users what it does.
>
>
>
> It should say: "We watch you every minute that you're here. We watch every
> detail of what you do. We have wired the web with 'like' buttons that inform
> on your reading automatically."
>
>
>
> To every parent Facebook should say: "Your children spend hours every day
> with us. We spy upon them much more efficiently than you will ever be able
> to. And we won't tell you what we know about them."
>
>
>
> Only that, just the truth. That will be enough. But the crowd that runs
> Facebook, that small bunch of rich and powerful people, will never lean in
> close enough to tell you the truth.
>
>
>
> Mark Zuckerberg recently spent $30m (?18m) buying up all the houses around
> his own in Palo Alto, California. Because he needs more privacy.
>
>
>
> So do we. We need to make demands for that privacy on both governments and
> companies alike. Governments, as I have said, must protect us against spying
> by other governments, and must subject their own domestic listening to the
> rule of law. Companies, to regain our trust, must be truthful about their
> practices and their relations with governments. We must know what they
> really do, so we can decide whether to give them our data.
>
>
>
> The president must end this war in the net, which deprives us of civil
> liberties under the guise of depriving foreign bad people of sanctuary
>
>
>
> A great deal of confusion has been created by the distinction between data
> and metadata, as though there were a difference and spying on metadata were
> less serious.
>
>
>
> Illegal interception of the content of a message breaks your secrecy.
> Illegal interception of the metadata of a message breaks your anonymity. It
> isn't less, it's just different. Most of the time it isn't less, it's more.
>
>
>
> In particular, the anonymity of reading is broken by the collection of
> metadata. It wasn't the content of the newspaper Douglass was reading that
> was the problem ? it was that he, a slave, dared to read it.
>
>
>
> The president can apologise to people for the cancellation of their health
> insurance policies, but he cannot merely apologise to the people for the
> cancellation of the constitution. When you are president of the United
> States, you cannot apologise for not being on Frederick Douglass's side.
>
>
>
> Nine votes in the US supreme court can straighten out what has happened to
> our law. But the US president has the only vote that matters concerning the
> ending of the war. All the governmental destruction of privacy that has been
> placed atop the larger ecological disaster created by industry, all of this
> spying is wartime stuff. The president must end this war in the net, which
> deprives us of civil liberties under the guise of depriving foreign bad
> people of sanctuary.
>
>
>
> A man who brings evidence to democracy of crimes against freedom is a hero.
> A man who steals the privacy of societies for his profit is a villain. We
> have sufficient villainy and not enough heroism. We have to name that
> difference strongly enough to encourage others to do right.
>
>
>
> We have seen that, with the relentlessness of military operation, the
> listeners in the US have embarked on a campaign against the privacy of the
> human race. They have compromised secrecy, destroyed anonymity, and
> adversely affected the autonomy of billions of people.
>
>
>
> They are doing this because they have been presented with a mission by an
> extraordinarily imprudent US administration, which ? having failed to
> prevent a very serious attack on civilians at home, largely by ignoring
> warnings ? decreed that it would never again be put in a position where it
> "should have known".
>
>
>
> The UK government must cease to vitiate the civil liberties of its
> people. It must cease to deny the freedom of the press
>
>
>
> The fundamental problem was the political, not the military, judgment
> involved. When military leaders are given objectives, they achieve them at
> whatever collateral cost they are not explicitly prohibited from incurring.
> That is why we regard civilian control of the military as a sine qua non of
> democracy. Democracy also requires an informed citizenry.
>
>
>
> About this, Snowden agrees with Thomas Jefferson [the chief author of
> America's Declaration of Independence], and pretty much everybody else who
> has ever seriously thought about the problem. Snowden has shown us the
> immense complicity of all governments. He has shown, in other words, that
> everywhere the policies the people want have been deliberately frustrated by
> their governments. They want to be protected against the spying of
> outsiders. They want their own government's national security surveillance
> activities to be conducted under the independent scrutiny that characterises
> the rule of law.
>
>
>
> In addition, the people of the United States are not ready to abandon our
> role as a beacon of liberty to the world. We are not prepared to go instead
> into the business of spreading the procedures of totalitarianism. We never
> voted for that. The people of the US do not want to become the secret police
> of the world. If we have drifted there because an incautious administration
> empowered the military, it is time for the people of the United States to
> register their conclusive democratic opinion.
>
>
>
> We are not the only people in the world to have exigent political
> responsibilities. The government of the UK must cease to vitiate the civil
> liberties of its people, it must cease to use its territory and its
> transport facilities as an auxiliary to American military misbehaviour. And
> it must cease to deny freedom of the press. It must stop pressuring
> publishers who seek to inform the world about threats to democracy, while it
> goes relatively easy on publishers who spy on the families of murdered
> girls.
>
>
>
> The chancellor of Germany must stop talking about her mobile phone and start
> talking about whether it is OK to deliver all the telephone calls and text
> messages in Germany to the US. Governments that operate under constitutions
> protecting freedom of expression have to inquire, urgently, whether that
> freedom exists when everything is spied on, monitored, listened to.
>
>
>
> In addition to politics, we do have lawyering to do. Defending the rule of
> law is always lawyers' work. In some places those lawyers will need to be
> extremely courageous; everywhere they will need to be well trained;
> everywhere they will need our support and our concern. But it is also clear
> that subjecting government listening to the rule of law is not the only
> lawyers' work involved.
>
>
>
> As we have seen, the relations between the military listeners of the United
> States, listeners elsewhere in the world, and the big data-mining businesses
> are too complex to be safe for us. Snowden's revelations have shown that the
> US data-mining giants were intimidated, seduced, and also betrayed by the
> listeners. This should not have surprised them, but it apparently did. Many
> companies manage our data; most of them have no enforceable legal
> responsibility to us. There is lawyers' work to do there too.
>
>
>
> In the US, for example, we should end the immunity given to the
> telecommunications operators for assisting illegal listening. Immunity was
> extended by legislation in 2008. When he was running for president, Barack
> Obama said that he was going to filibuster that legislation. Then, in August
> 2008, when it became clear that he was going to become the next president,
> he changed his mind. Not only did he drop his threat to filibuster the
> legislation, he interrupted his campaigning in order to vote for immunity.
>
>
>
> We need not argue about whether immunity should have been extended. We
> should establish a date ? perhaps 21 January 2017 ? after which any
> telecommunications operator doing business in the US and facilitating
> illegal listening should be subject to ordinary civil liability. An
> interesting coalition between the human rights lawyers and commercial class
> action litigators would grow up immediately with very positive consequences.
>
>
>
> The people of the United States are not ready to abandon our role as a
> beacon of liberty to the world. We are not prepared to go instead into the
> business of spreading the procedures of totalitarianism
>
>
>
> If non-immunisation extended to non-US network operators that do business in
> the United States, such as Deutsche Telekom, it would have enormous positive
> consequences for citizens of other countries as well. In any country where
> de facto immunity presently exists and can be withdrawn, it should be
> lifted.
>
>
>
> The legal issues presented by the enormous pile of our data in other
> people's hands are well-known to all systems of law. The necessary
> principles are invoked every time you take your clothes to the cleaners.
> English-speaking lawyers refer to these principles as the law of "bailment".
> What they mean is, if you entrust people with your stuff, they have to take
> care of it as least as well as they take care of their own. If they fail,
> they are liable for their negligence.
>
>
>
> We need to apply the principle of trust in bailment, or whatever the local
> legal vocabulary is, to all that data we have entrusted to other people.
> This makes them legally responsible to us for the way they take care of it.
> There would be an enormous advantage in treating personal data under the
> rules of bailment or its equivalent.
>
>
>
> Such rules are governed by the law where the trust is made. If the dry
> cleaner chooses to move your clothes to another place where a fire breaks
> out, it doesn't matter where that fire happened: the relevant law is the law
> of the place where they took the clothes from you. The big data-mining
> companies play this game of lex loci server all the time: "Oh we are not
> really in country X, we're in California, that's where our computers are."
> This is a bad legal habit. We would not be doing them a grave disservice if
> we helped them out of it.
>
>
>
> Then there is lawyering to be done in international public law. We must hold
> governments responsible to one another for remedying current environmental
> devastation.
>
>
>
> The two most powerful governments in the world, the US and China, now
> fundamentally agree about their policy with respect to threats in the net.
> The basic principle is: "Anywhere in the net there is a threat to our
> national security, we're going to attack it."
>
>
>
> The US and the Soviet Union were in danger of poisoning the world in the
> 1950s through atmospheric testing of nuclear weapons. To their credit, they
> were able to make a bilateral agreement prohibiting it.
>
>
>
> The US and the government of China could agree not to turn the human race
> into a free-fire zone for espionage. But they won't.
>
>
>
> In any country where de facto immunity presently exists and can be
> withdrawn, it should be lifted
>
>
>
> We must pursue legal and political redress for what has been done to us. But
> politics and law are too slow and too uncertain. Without technical solutions
> we are not going to succeed, just as there is no way to clean up the air and
> the water or positively affect global climate without technological change.
>
>
>
> Everywhere, businesses use software that secures their communications and
> much of that software is written by us. The "us" I mean here is those
> communities sharing free or open source software, with whom I have worked
> for decades.
>
>
>
> Protocols that implement secure communications used by businesses between
> themselves and with consumers (HTTPS, SSL, SSH, TLS, OpenVPN etc) have all
> been the target of the listeners' interference.
>
>
>
> Snowden has documented their efforts to break our cryptography.
>
>
>
> The US listeners are courting global financial disaster. If they ever
> succeed in compromising the fundamental technical methods by which
> businesses communicate securely, we would be one catastrophic failure away
> from global financial chaos. Their conduct will appear to the future to be
> as economically irresponsible as the debasing of the Roman coinage. It is a
> basic threat to the economic security of the world.
>
>
>
> The bad news is that they have made some progress towards irremediable
> catastrophe. First, they corrupted the science. They covertly affected the
> making of technical standards, weakening everyone's security everywhere in
> order to make their own stealing easier.
>
>
>
> Second, they have stolen keys, as only the best-financed thieves in the
> world can do. Everywhere encryption keys are baked into hardware, they have
> been at the bakery.
>
>
>
> At the beginning of September when Snowden's documents on this subject first
> became public, the shock waves reverberated around the industry. But the
> documents released also showed that the listeners are still compelled to
> steal keys instead of breaking our locks. They have not yet gained enough
> technical sophistication to break the fundamental cryptography holding the
> global economy together.
>
>
>
> Making public what crypto NSA can't break is the most inflammatory of
> Snowden's disclosures from the listeners' perspective. As long as nobody
> knows what the listeners cannot read, they have an aura of omniscience. Once
> it is known what they cannot read, everyone will use that crypto and soon
> they cannot read anything any more.
>
>
>
> Snowden has disclosed that their advances on our fundamental cryptography
> were good but not excellent. He is also showing us that we have very little
> time to improve our own cryptography. We must hurry to recover from the harm
> done to us by technical standards corruption. From now on, the communities
> that make free software crypto for everyone else must assume that they are
> up against "national means of intelligence". In this trade, that is bad news
> for developers, because that's the big leagues. When you play against their
> opposition, even the tiniest mistake is fatal.
>
>
>
> It's as though every factory in our society had an advanced fire safety
> system - while everybody's home had nothing
>
>
>
> Second, we must change the technical environment so it is safer for ordinary
> people and small businesses. This i

  1. 2014-05-01 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Subject: [NYLXS - HANGOUT] Nostalgia in the office
  2. 2014-05-01 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Nostalgia in the office
  3. 2014-05-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] not covered
  4. 2014-05-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Shani's engaged
  5. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] making a buck
  6. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Linux jobs
  7. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] weos lives
  8. 2014-05-06 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] making a buck
  9. 2014-05-06 einker <eminker-at-gmail.com> Re: [NYLXS - HANGOUT] not covered
  10. 2014-05-06 einker <eminker-at-gmail.com> Re: [NYLXS - HANGOUT] not covered
  11. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] making a buck
  12. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] =?UTF-8?B?RndkOiBbaXNvYy1ueV0gVklERU86IElmIEkgUmFuIFRoZSBab286IFA=?=
  13. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] farm animals
  14. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Fwd: Net neutrality emergency
  15. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Fwd: Net neutrality emergency
  16. 2014-05-06 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Fwd: Net neutrality emergency
  17. 2014-05-07 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [groups-noreply-at-linkedin.com: Free Android developer enterprise
  18. 2014-05-07 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] DRM books
  19. 2014-05-07 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Do it for Denmark
  20. 2014-05-09 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] wget
  21. 2014-05-09 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [carolinedliny-at-aol.com: Re: on other news]
  22. 2014-05-16 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Pharmacy
  23. 2014-05-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Pharmacy
  24. 2014-05-16 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Opensuse 13.1 + 52 Books on Linux
  25. 2014-05-19 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Summer Activities
  26. 2014-05-19 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Summer Activitie
  27. 2014-05-19 Elfen Magix <elfen_magix-at-yahoo.com> Re: [NYLXS - HANGOUT] Summer Activitie
  28. 2014-05-19 einker <eminker-at-gmail.com> Re: [NYLXS - HANGOUT] Summer Activitie
  29. 2014-05-19 einker <eminker-at-gmail.com> Re: [NYLXS - HANGOUT] Summer Activitie
  30. 2014-05-19 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Summer Activitie
  31. 2014-05-19 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Summer Activitie
  32. 2014-05-20 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Perhaps the most important tv journalism of our lifetime
  33. 2014-05-25 adrba-at-nyct.net Subject: [NYLXS - HANGOUT] no gcc in this (my) SUSE install --- HUH?
  34. 2014-05-25 adrba-at-nyct.net Subject: [NYLXS - HANGOUT] no gcc in this (my) SUSE install --- HUH?
  35. 2014-05-25 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] no gcc in this (my) SUSE install --- HUH?
  36. 2014-05-27 Contrarian <adrba-at-nyct.net> Subject: [NYLXS - HANGOUT] no gcc on this SUSE install
  37. 2014-05-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] no gcc on this SUSE install
  38. 2014-05-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] no gcc on this SUSE install
  39. 2014-05-28 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] interesting read
  40. 2014-05-28 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] ironman linux
  41. 2014-05-28 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] ironman linux
  42. 2014-05-28 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] where to put this.
  43. 2014-05-28 Robert Menes <viewtiful.icchan-at-gmail.com> Re: [NYLXS - HANGOUT] where to put this.
  44. 2014-05-29 From: "Redpill" <red.pill-at-verizon.net> RE: [NYLXS - HANGOUT] where to put this.
  45. 2014-05-29 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] where to put this.
  46. 2014-05-29 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] where to put this.
  47. 2014-05-29 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] where to put this.

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!