Computers, Privacy & the Constitution

View   r14  >  r13  >  r12  >  r11  >  r10  >  r9  ...
EthanThomasFirstPaper 14 - 03 May 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

>
>

The Campaign Against Privacy:
How Propaganda is Used to Perpetuate Surveillance and State Power

 
Changed:
<
<
-- By EthanThomas
>
>
-- EthanThomas - 03 May 2017
 

Propaganda and Power Through Subtle Influence

Changed:
<
<
The American public's deep reliance on the internet and cloud services has given rise to a problem that is not unique in nature, but has changed in type. Governments hunger for power, and surveillance is a time-tested way for governments to ascertain knowledge and control in subtle ways. Influencing behavior not by heavy-handed force, but by understanding and manipulating people's own preferences, is a particularly desirable method for democratic governments that must keep the people content that they are making their own decisions. In other words, allowing people to make their own decisions but surreptitiously influencing those choices has proven an excellent means of control for the American government.
>
>

The American public's deep reliance on the internet and cloud services has given rise to a problem that is not unique in nature, but has changed in type. Governments hunger for power, and surveillance is a time-tested way for governments to ascertain knowledge and control in subtle ways. Influencing behavior not by heavy-handed force, but by understanding and manipulating people's own preferences, is a particularly desirable method for democratic governments that must keep the people content that they are making their own decisions. In other words, allowing people to make their own decisions but surreptitiously influencing those choices has proven an excellent means of control for the American government.

 
Changed:
<
<
This strategy is by no means new, but the battle has assumed a different form, as reliable means for encryption and anonymity have become easily accessible. The most powerful surveillance network ever to exist has risen simultaneously with the most effective means of widespread yet anonymous communication. Some governments have tried to respond with traditional means of control, such as mandatory key disclosure programs,(1) or outright bans of privacy-protecting software.(2) But the American government chooses to fight this threat to its growing power in its traditionally subtle way: do not exert direct force, but persuade people that there is something dangerous or taboo about circumventing the surveillance and control networks. This is accomplished through a campaign of propaganda against effective, widely available, and largely open-source programs that protect secrecy and anonymity.

Notes

1 : See Jeremy Kirk, Contested UK encryption disclosure law takes effect, http://www.washingtonpost.com/wp-dyn/content/article/2007/10/01/AR2007100100511.html.

2 : Kevin Collier, The Countries That Are Considering Banning Encryption, http://www.vocativ.com/307667/encryption-law-europe-asia/.


>
>

This strategy is by no means new, but the battle has assumed a different form, as reliable means for encryption and anonymity have become easily accessible. The most powerful surveillance network ever to exist has risen simultaneously with the most effective means of widespread yet anonymous communication. Some governments have tried to respond with traditional means of control, such as mandatory key disclosure programs,(3) or outright bans of privacy-protecting software.(4) But the American government chooses to fight this threat to its growing power in its traditionally subtle way: do not exert direct force, but persuade people that there is something dangerous or taboo about circumventing the surveillance and control networks. This is accomplished through a campaign of propaganda against effective, widely available, and largely open-source programs that protect secrecy and anonymity.

 

The Importance of Anonymity and Protected Communication

Changed:
<
<
Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(5) The ability to communicate anonymously and free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(6)

Notes

5 : Eben Moglen, Privacy under attack: the NSA files revealed new threats to democracy, https://www.theguardian.com/technology/2014/may/27/-sp-privacy-under-attack-nsa-files-revealed-new-threats-democracy.

6 : See id.


>
>

Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(7) The ability to communicate anonymously and free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(8)

 
Changed:
<
<
Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(9) Notoriously, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of all Lavabit email accounts.(10) The regular use of national security letters in this context amplifies these concerns, because there is a severe lack of transparency and judicial oversight.(11)

Notes

9 : Open Whisper Systems, Grand jury subpoena for Signal user data, Eastern District of Virginia, https://whispersystems.org/bigbrother/eastern-virginia-grand-jury/.

10 : Ladar Levison, Secrets, lies and Snowden's email: why I was forced to shut down Lavabit, https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email.

11 : See EFF, National Security Letters, https://www.eff.org/issues/national-security-letters; see also ACLU, National Security Letters, https://www.aclu.org/other/national-security-letters (listing several challenges to legality of NSL use).


>
>

Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(12) Notoriously, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of all Lavabit email accounts.(13) The regular use of national security letters in this context amplifies these concerns, because there is a severe lack of transparency and judicial oversight.(14)

 
Changed:
<
<
Many times, targets of surveillance will never know who is seeing their private correspondence, when, or why; thus, without reliable encryption and anonymization, any individual is constantly at risk that they are being monitored or profiled.
>
>

Many times, targets of surveillance will never know who is seeing their private correspondence, when, or why; thus, without reliable encryption and anonymization, any individual is constantly at risk that they are being monitored or profiled.

 

The Tactics of Anti-Privacy Propaganda

Changed:
<
<
The U.S. government and corporate entities that benefit from commonplace surveillance have taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools and perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative.(15) These tactics and the overall message against encryption ignore legitimate needs for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

Notes

15 : For one discussion of this argument, see Alex Abdo, You May Have 'Nothing to Hide' But You Still Have Something to Fear, https://www.aclu.org/blog/you-may-have-nothing-hide-you-still-have-something-fear; see also Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9; see also PC World, Google's Schmidt Roasted for Privacy Comments, http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html (citing Schmidt's comment that "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place . . . .").


>
>

The U.S. government and corporate entities that benefit from commonplace surveillance have taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools and perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative.(16) These tactics and the overall message against encryption ignore legitimate needs for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

 
Changed:
<
<
A prevalent tactic is to associate secure or anonymous communication with criminality or terrorism. In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(17) Tor in particular has gained a reputation as "the web browser for criminals,"(18) merely because it serves to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(19)

Notes

17 : See Flashpoint, Tech for Jihad, https://www.flashpoint-intel.com/wp-content/uploads/2016/08/TechForJihad.pdf.

18 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9.

19 : See Washington Post, The "app of choice" for jihadists: ISIS seizes on Internet tool to promote terror, https://www.washingtonpost.com/world/national-security/the-app-of-choice-for-jihadists-isis-seizes-on-internet-tool-to-promote-terror/2016/12/23/a8c348c0-c861-11e6-85b5-76616a33048d_story.html.


>
>

A prevalent tactic is to associate secure or anonymous communication with criminality or terrorism. In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(20) Tor in particular has gained a reputation as "the web browser for criminals,"(21) merely because it serves to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(22)

 
Changed:
<
<
The government has itself played a significant role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(23) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(24)

Notes

23 : See, e.g., NPR All Tech Considered, A Year After San Bernardino And Apple-FBI, Where Are We On Encryption?, http://www.npr.org/sections/alltechconsidered/2016/12/03/504130977/a-year-after-san-bernardino-and-apple-fbi-where-are-we-on-encryption.

24 : Manhattan District Attorney's Office, Smartphone Encryption and Public Safety, http://manhattanda.org/sites/default/files/Report%20on%20Smartphone%20Encryption%20and%20Public%20Safety:%20An%20Update.pdf.


>
>

The government has itself played a significant role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(25) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(26)

 
Changed:
<
<
This treatment of encryption and anonymity is classic propaganda.(27) adapted to a new world. Where information spreads more easily and the public is skeptical of obvious exercises of power, propaganda takes the form of subtle suggestion. The government can easily enlist corporations that also benefit from naked communication and total information gathering. Such a campaign makes sense: encryption is easy to implement and access,(28) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. The goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.

Notes

27 : (See Oxford Dictionaries, Propaganda, https://en.oxforddictionaries.com/definition/propaganda "Information, especially of a biased or misleading nature, used to promote a political cause or point of view.").

28 : For example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption. See, e.g., A Simple RSA Implementation in Python, https://gist.github.com/JonCooperWorks/5314103.


>
>

This treatment of encryption and anonymity is classic propaganda.(29) adapted to a new world. Where information spreads more easily and the public is skeptical of obvious exercises of power, propaganda takes the form of subtle suggestion. The government can easily enlist corporations that also benefit from naked communication and total information gathering. Such a campaign makes sense: encryption is easy to implement and access,(30) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. The goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.

 

More Speech is the Appropriate Counterpropaganda

Changed:
<
<
Privacy threatens government power and corporate profitability. This campaign thrives on ignorance, misinformation, and ultimately restriction of true expression. The best way to combat it is perhaps through the opposite: vigilance, more information, and increased uninhibited speech. If the public is more aware of the use to which their information is put, as well as the legitimate uses for privacy-enhancing tools, misinformation designed to skew the need for privacy and suggest that people have ";nothing to hide" would quickly lose legitimacy. Of course, that information is and has been available, and some portion of the population will continue to opt for convenience over privacy. For those who do not, however, it remains paramount to recognize patterns of despotism as they develop and to intervene with information or litigation. Continuing to speak freely and access information uninhibited, while ensuring that channels remain open and accessible for others to do the same, will be the challenge of the near future, but that task is central to preserving the right to exist free from the comprehensive collection and direction of behavior that the government desires to implement on a systematic level.
>
>

Privacy threatens government power and corporate profitability. This campaign thrives on ignorance, misinformation, and ultimately restriction of true expression. The best way to combat it is perhaps through the opposite: vigilance, more information, and increased uninhibited speech. If the public is more aware of the use to which their information is put, as well as the legitimate uses for privacy-enhancing tools, misinformation designed to skew the need for privacy and suggest that people have ";nothing to hide" would quickly lose legitimacy. Of course, that information is and has been available, and some portion of the population will continue to opt for convenience over privacy. For those who do not, however, it remains paramount to recognize patterns of despotism as they develop and to intervene with information or litigation. Continuing to speak freely and access information uninhibited, while ensuring that channels remain open and accessible for others to do the same, will be the challenge of the near future, but that task is central to preserving the right to exist free from the comprehensive collection and direction of behavior that the government desires to implement on a systematic level.

 
Changed:
<
<
>
>
 
Added:
>
>

EthanThomasFirstPaper 13 - 02 May 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

Line: 6 to 6
 
Changed:
<
<

Introduction

Encryption, and to some degree anonymity, are easy to obtain to a reasonable degree of protection. Although some countries have implemented some sort of mandatory key disclosure program,(31) it is politically and practically infeasible to outright ban privacy-aiding software. Encryption software is easy to implement, programs such as Tor are widely distributed, and many such applications are open source. States and corporations that wish to keep its eyes and ears connected to channels of communication, thus retaining their invasive observation and subtle influence over human behavior, would thus benefit most by driving people away from the desire to keep their affairs private in the first place. A campaign of propaganda against privacy -- anonymity and encryption in particular -- would thus further the goal of behavioral manipulation by convincing people in the first place that they need not and should not pursue privacy.

Notes

31 : See Jeremy Kirk, Contested UK encryption disclosure law takes effect, http://www.washingtonpost.com/wp-dyn/content/article/2007/10/01/AR2007100100511.html


>
>

Propaganda and Power Through Subtle Influence

The American public's deep reliance on the internet and cloud services has given rise to a problem that is not unique in nature, but has changed in type. Governments hunger for power, and surveillance is a time-tested way for governments to ascertain knowledge and control in subtle ways. Influencing behavior not by heavy-handed force, but by understanding and manipulating people's own preferences, is a particularly desirable method for democratic governments that must keep the people content that they are making their own decisions. In other words, allowing people to make their own decisions but surreptitiously influencing those choices has proven an excellent means of control for the American government.
 
Changed:
<
<

I. The Growing Need for Anonymity and Privacy

>
>
This strategy is by no means new, but the battle has assumed a different form, as reliable means for encryption and anonymity have become easily accessible. The most powerful surveillance network ever to exist has risen simultaneously with the most effective means of widespread yet anonymous communication. Some governments have tried to respond with traditional means of control, such as mandatory key disclosure programs,(32) or outright bans of privacy-protecting software.(33) But the American government chooses to fight this threat to its growing power in its traditionally subtle way: do not exert direct force, but persuade people that there is something dangerous or taboo about circumventing the surveillance and control networks. This is accomplished through a campaign of propaganda against effective, widely available, and largely open-source programs that protect secrecy and anonymity.
 
Changed:
<
<

A. The Demand for Protected Communication Is Legitimate

Modern communication and information storage is difficult to analyze through founding-era views of privacy. In a world where communication channels were limited and means of snooping were rather blunt (e.g., intercepting parcels and searching physical places), boundaries were simple to draw and it was much easier to expect privacy absent these clear methods of intrusion. Situations calling for virtually unbreakable storage and intangible keye are difficult to imagine.
>
>

The Importance of Anonymity and Protected Communication

Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(34) The ability to communicate anonymously and free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(35)
 
Changed:
<
<
Now, however, covert observation is widespread by techniques unfathomable to the ratifying generation. The effort required to tap into years of extremely intimate information about a person is minimal(36). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.

Notes

36 : Consider access to a Google account containing perfectly archived emails, cloud storage, photos, calendar data, and more.


>
>
Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(37) Notoriously, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of all Lavabit email accounts.(38) The regular use of national security letters in this context amplifies these concerns, because there is a severe lack of transparency and judicial oversight.(39)
 
Changed:
<
<
Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(40) The ability to communicate anonymously or free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(41)
>
>
Many times, targets of surveillance will never know who is seeing their private correspondence, when, or why; thus, without reliable encryption and anonymization, any individual is constantly at risk that they are being monitored or profiled.
 
Added:
>
>

The Tactics of Anti-Privacy Propaganda

The U.S. government and corporate entities that benefit from commonplace surveillance have taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools and perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative.(42) These tactics and the overall message against encryption ignore legitimate needs for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
 
Changed:
<
<

B. The Need for Protected Communication Is Stronger Than Ever

Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(43) This request involved account-holder information, but other requests have sought to reach the contents of encrypted messaging -- most notably, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of _all Lavabit email accounts.(44) The service opted to shut down rather than compromise user data,(45) but because it was subject to a gag order, it is uncertain how many such services have received and complied with similar requests. The regular use of national security letters in this context amplifies these concerns, because there is little to no judicial oversight.

Notes

45 : Id.


>
>
A prevalent tactic is to associate secure or anonymous communication with criminality or terrorism. In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(46) Tor in particular has gained a reputation as "the web browser for criminals,"(47) merely because it serves to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(48)
 
Changed:
<
<
Many times, targets of surveillance will never know who is seeing their private correspondence, whether or when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.
>
>
The government has itself played a significant role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(49) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(50)
 
Changed:
<
<

II. State and Corporate Vilification of Encryption

The U.S. government and corporate entities that benefit from commonplace surveillance have taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(51) and insisting that privacy is compatible with uninhibited access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

Notes

51 : For one discission of this argument, see Alex Abdo, You May Have 'Nothing to Hide' But You Still Have Something to Fear, https://www.aclu.org/blog/you-may-have-nothing-hide-you-still-have-something-fear.


>
>
This treatment of encryption and anonymity is classic propaganda.(52) adapted to a new world. Where information spreads more easily and the public is skeptical of obvious exercises of power, propaganda takes the form of subtle suggestion. The government can easily enlist corporations that also benefit from naked communication and total information gathering. Such a campaign makes sense: encryption is easy to implement and access,(53) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. The goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.
 
Changed:
<
<

A. Association with Criminality and Delegitimization

One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. The current narrative asserts a particularly strong tie between criminality and the use of certain technologies that aims to stigmatize their use.

In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(54) Tor in particular has gained a reputation as "the web browser for criminals,"(55) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(56)

The government has itself played a significant role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(57) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(58).

B. Flaws, Motives, and Dangers of This Campaign

This treatment of encryption and anonymity is essentially propaganda.(59) Such a campaign makes sense: encryption is easy to implement and access,(60) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.

In addition to anonymity and secrecy, autonomy is also an ultimate victim of the war on encryption. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(61) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.

III. Moving Forward and Embracing Technology as a Defender of Autonomy

The views of the government and corporations -- and increasingly, the general public -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They passively dismiss the importance of individual personhood while actively stigmatizing true expression and a desire to behave unscrutinized. Privacy is paramount to individual autonomy and functioning democracy. It is not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of vilifying use of these tools, the government could acknowledge them as central to the guarantees of American freedom and democracy. The public must demand this change of position.

Notes

56 : See Washington Post, The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror, https://www.washingtonpost.com/world/national-security/the-app-of-choice-for-jihadists-isis-seizes-on-internet-tool-to-promote-terror/2016/12/23/a8c348c0-c861-11e6-85b5-76616a33048d_story.html.

60 : For example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption

61 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9; see also PC World, Google's Schmidt Roasted for Privacy Comments, http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html (citing Schmidt's comment that "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place . . . .")


>
>

More Speech is the Appropriate Counterpropaganda

Privacy threatens government power and corporate profitability. This campaign thrives on ignorance, misinformation, and ultimately restriction of true expression. The best way to combat it is perhaps through the opposite: vigilance, more information, and increased uninhibited speech. If the public is more aware of the use to which their information is put, as well as the legitimate uses for privacy-enhancing tools, misinformation designed to skew the need for privacy and suggest that people have ";nothing to hide" would quickly lose legitimacy. Of course, that information is and has been available, and some portion of the population will continue to opt for convenience over privacy. For those who do not, however, it remains paramount to recognize patterns of despotism as they develop and to intervene with information or litigation. Continuing to speak freely and access information uninhibited, while ensuring that channels remain open and accessible for others to do the same, will be the challenge of the near future, but that task is central to preserving the right to exist free from the comprehensive collection and direction of behavior that the government desires to implement on a systematic level.
 
Deleted:
<
<
Note: this intermediate draft contains over 1000 words, as new content has been added but I have not edited down the length yet. Please see the previous revision for a version within the word limit.

It's not my responsibility to read within the word limit: it's your responsibility to write within it. The revised draft has to be under 1,001 words or else.

The best way to make the essay more terse, in my view, is to make the windup shorter and the follow-through longer. Yes, there's an effort to shape public opinion against encryption as the tool of criminals and terrorists. That's been there since the first round of the crypto wars. You don't need hundreds of words to establish that point. Nor can you get away with one paragraph of "moving forward" based on the "public must demand" strategy for rhetorical seeming efficiency in face of nothing to recommend. You need something to recommend, and one would have though that this would be on the level of "more speech," that is, communicative strategies for countering the propaganda. The evolution, or at least the hypothesis, of such strategies is what would make a fine essay.


 \ No newline at end of file

EthanThomasFirstPaper 12 - 30 Apr 2017 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

Line: 46 to 46
 Note: this intermediate draft contains over 1000 words, as new content has been added but I have not edited down the length yet. Please see the previous revision for a version within the word limit.
Added:
>
>
It's not my responsibility to read within the word limit: it's your responsibility to write within it. The revised draft has to be under 1,001 words or else.

The best way to make the essay more terse, in my view, is to make the windup shorter and the follow-through longer. Yes, there's an effort to shape public opinion against encryption as the tool of criminals and terrorists. That's been there since the first round of the crypto wars. You don't need hundreds of words to establish that point. Nor can you get away with one paragraph of "moving forward" based on the "public must demand" strategy for rhetorical seeming efficiency in face of nothing to recommend. You need something to recommend, and one would have though that this would be on the level of "more speech," that is, communicative strategies for countering the propaganda. The evolution, or at least the hypothesis, of such strategies is what would make a fine essay.

 

\ No newline at end of file


EthanThomasFirstPaper 11 - 18 Apr 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

Line: 7 to 7
 

Introduction

Changed:
<
<
Encryption, and to some degree anonymity, are easy to obtain to a reasonable degree of protection. Although some countries have implemented some sort of mandatory key disclosure program,(62) it is politically and practically infeasible to outright ban privacy-aiding software. Encryption software is easy to implement, programs such as Tor are widely distributed, and many such applications are open source. States and corporations that wish to keep its eyes and ears connected to channels of communication, thus retaining their invasive observation and subtle influence over human behavior, would thus benefit most by driving people away from the desire to keep their affairs private in the first place. A campaign of propaganda against privacy — anonymity and encryption in particular — would thus further the goal of behavioral manipulation by convincing people in the first place that they need not and should not pursue privacy.
>
>
Encryption, and to some degree anonymity, are easy to obtain to a reasonable degree of protection. Although some countries have implemented some sort of mandatory key disclosure program,(63) it is politically and practically infeasible to outright ban privacy-aiding software. Encryption software is easy to implement, programs such as Tor are widely distributed, and many such applications are open source. States and corporations that wish to keep its eyes and ears connected to channels of communication, thus retaining their invasive observation and subtle influence over human behavior, would thus benefit most by driving people away from the desire to keep their affairs private in the first place. A campaign of propaganda against privacy -- anonymity and encryption in particular -- would thus further the goal of behavioral manipulation by convincing people in the first place that they need not and should not pursue privacy.
 

I. The Growing Need for Anonymity and Privacy

A. The Demand for Protected Communication Is Legitimate

Changed:
<
<
Modern communication and information storage is difficult to analyze through founding-era views of privacy. In a world where communication channels were limited and means of snooping were rather blunt (e.g., intercepting parcels and searching physical places), boundaries were simple to draw and it was much easier to expect privacy absent these clear methods of intrusion. Situations calling for a mechanism of storage impossible for anyone in the world to open unless they had an intangible key are hard to imagine.
>
>
Modern communication and information storage is difficult to analyze through founding-era views of privacy. In a world where communication channels were limited and means of snooping were rather blunt (e.g., intercepting parcels and searching physical places), boundaries were simple to draw and it was much easier to expect privacy absent these clear methods of intrusion. Situations calling for virtually unbreakable storage and intangible keye are difficult to imagine.
 
Changed:
<
<
Now, however, covert observation is widespread. The effort required to tap into years of extremely intimate information about a person is minimal(64). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.
>
>
Now, however, covert observation is widespread by techniques unfathomable to the ratifying generation. The effort required to tap into years of extremely intimate information about a person is minimal(65). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.
 Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(66) The ability to communicate anonymously or free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(67)
Line: 22 to 22
 

B. The Need for Protected Communication Is Stronger Than Ever

Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(68) This request involved account-holder information, but other requests have sought to reach the contents of encrypted messaging -- most notably, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of _all Lavabit email accounts.(69) The service opted to shut down rather than compromise user data,(70) but because it was subject to a gag order, it is uncertain how many such services have received and complied with similar requests. The regular use of national security letters in this context amplifies these concerns, because there is little to no judicial oversight.
Changed:
<
<
Users will often never know who is seeing their private correspondence, when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.
>
>
Many times, targets of surveillance will never know who is seeing their private correspondence, whether or when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.
 
Changed:
<
<

II. The Campaign of Vilification Against Encryption

The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(71) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
>
>

II. State and Corporate Vilification of Encryption

The U.S. government and corporate entities that benefit from commonplace surveillance have taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(72) and insisting that privacy is compatible with uninhibited access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
 

A. Association with Criminality and Delegitimization

Changed:
<
<
One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
>
>
One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. The current narrative asserts a particularly strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
 In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(73) Tor in particular has gained a reputation as "the web browser for criminals,"(74) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(75)
Changed:
<
<
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(76) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(77).
>
>
The government has itself played a significant role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(78) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(79).
 

B. Flaws, Motives, and Dangers of This Campaign

This treatment of encryption and anonymity is essentially propaganda.(80) Such a campaign makes sense: encryption is easy to implement and access,(81) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
Changed:
<
<
While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(82) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.
>
>
In addition to anonymity and secrecy, autonomy is also an ultimate victim of the war on encryption. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(83) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.
 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Changed:
<
<
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Privacy is paramount to individual autonomy and functioning democracy. It is not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of vilifying use of these tools, the government could acknowledge them as central to the guarantees of American freedom and democracy. The public must demand this change of position.
>
>
The views of the government and corporations -- and increasingly, the general public -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They passively dismiss the importance of individual personhood while actively stigmatizing true expression and a desire to behave unscrutinized. Privacy is paramount to individual autonomy and functioning democracy. It is not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of vilifying use of these tools, the government could acknowledge them as central to the guarantees of American freedom and democracy. The public must demand this change of position.


Note: this intermediate draft contains over 1000 words, as new content has been added but I have not edited down the length yet. Please see the previous revision for a version within the word limit.

 

\ No newline at end of file


EthanThomasFirstPaper 10 - 16 Apr 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

Changed:
<
<
-- By EthanThomas - 03 Mar 2017
>
>
-- By EthanThomas
 

EthanThomasFirstPaper 9 - 09 Apr 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

Anonymity, Encryption, and Propaganda

>
>

The Campaign Against Privacy:
Propaganda's Role in Government and Corporate Circumvention of Encryption and Anonymity

 -- By EthanThomas - 03 Mar 2017

Added:
>
>

Introduction

Encryption, and to some degree anonymity, are easy to obtain to a reasonable degree of protection. Although some countries have implemented some sort of mandatory key disclosure program,(84) it is politically and practically infeasible to outright ban privacy-aiding software. Encryption software is easy to implement, programs such as Tor are widely distributed, and many such applications are open source. States and corporations that wish to keep its eyes and ears connected to channels of communication, thus retaining their invasive observation and subtle influence over human behavior, would thus benefit most by driving people away from the desire to keep their affairs private in the first place. A campaign of propaganda against privacy — anonymity and encryption in particular — would thus further the goal of behavioral manipulation by convincing people in the first place that they need not and should not pursue privacy.
 

I. The Growing Need for Anonymity and Privacy

A. The Demand for Protected Communication Is Legitimate


EthanThomasFirstPaper 8 - 09 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Anonymity, Encryption, and Propaganda


EthanThomasFirstPaper 7 - 06 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Anonymity, Encryption, and Propaganda

Line: 6 to 6
 
Deleted:
<
<

Introduction

This paper briefly discusses efforts to frame anonymity and encryption -- vital tools to free expression, uninhibited communication, and autonomous life in a world of snooping and surveillance -- as dangerous and unnecessary instruments of criminality. It examines the legitimate need for modern tools that preserve anonymous communication and protected data, the attempts to undermine the usefulness of these tools, and the harm of this campaign against privacy-promoting technology.

 

I. The Growing Need for Anonymity and Privacy

Deleted:
<
<
Communications can be protected in two important ways: namely, the author or the contents (or both) can be hidden from onlookers. Technology, private corporate interests, and government surveillance make the need for both forms of protection higher now than it ever has been.
 

A. The Demand for Protected Communication Is Legitimate

Modern communication and information storage is difficult to analyze through founding-era views of privacy. In a world where communication channels were limited and means of snooping were rather blunt (e.g., intercepting parcels and searching physical places), boundaries were simple to draw and it was much easier to expect privacy absent these clear methods of intrusion. Situations calling for a mechanism of storage impossible for anyone in the world to open unless they had an intangible key are hard to imagine.
Changed:
<
<
Now, however, covert observation is widespread. The effort required to tap into years of extremely intimate information about a person is minimal (consider access to a Google account containing perfectly archived emails, cloud storage, photos, calendar data, and more). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.
>
>
Now, however, covert observation is widespread. The effort required to tap into years of extremely intimate information about a person is minimal(85). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.
 
Changed:
<
<
This need is more than an abstract desire to keep personal effects secret to avoid embarrassment; rather, individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(86) The ability to communicate anonymously or free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(87)
>
>
Individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(88) The ability to communicate anonymously or free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(89)
 

B. The Need for Protected Communication Is Stronger Than Ever

Changed:
<
<
Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information (which it learned was unobtainable) about users of the encrypted messaging app Signal.(90) This request involved account holder information, but other requests have sought to reach the contents of encrypted messaging -- most notably, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of _all Lavabit email accounts.(91) The service opted to shut down rather than compromise user data,(92) but because it was subject to a gag order, it is uncertain how many such services have received and complied with such requests. The regular use of national security letters in this context amplify these concerns, because there is little to no judicial oversight.

Government access by voluntary disclosure or cooperative programs with companies that host data or communication services is perhaps a greater concern, because there is no advocate for the end user; instead, if data is turned over routinely and voluntarily, lay users may expect their assurances of privacy to be respected without understanding the extent to which their data can be easily shared.(93)

Notes

93 : The PRISM program is one example of such a program. See Timothy B. Lee, Here’s everything we know about PRISM to date, https://www.washingtonpost.com/news/wonk/wp/2013/06/12/heres-everything-we-know-about-prism-to-date/.


>
>
Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information about users of the encrypted-messaging app Signal.(94) This request involved account-holder information, but other requests have sought to reach the contents of encrypted messaging -- most notably, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of _all Lavabit email accounts.(95) The service opted to shut down rather than compromise user data,(96) but because it was subject to a gag order, it is uncertain how many such services have received and complied with similar requests. The regular use of national security letters in this context amplifies these concerns, because there is little to no judicial oversight.
 
Changed:
<
<
Further, the privacy interests discussed above can be -- and are -- undermined by private actors accessing personal communications and information; government surveillance is a serious privacy concern, but so is exposure of data to others for snooping, profiling, extortion, etc. These concerns arise when users' information is compromised due to large-scale data breaches or targeted hacking, but also when the host of the data mines the information for marketing or other profitable purposes.
>
>
Users will often never know who is seeing their private correspondence, when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.
 
Changed:
<
<
These concerns are severe and nearly omnipresent in widely used online services. The danger is not only in actual theft or loss of privacy, but in the fact that users will often never know who is seeing their private correspondence, when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.

II. The Government's Vilification of Encryption

>
>

II. The Campaign of Vilification Against Encryption

 The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(97) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

A. Association with Criminality and Delegitimization

Line: 38 to 29
 In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(98) Tor in particular has gained a reputation as "the web browser for criminals,"(99) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(100)
Changed:
<
<
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone, in which the FBI demanded software from Apple to essentially crack the encryption of any iPhone, brought to the forefront the government's discomfort with encryption.(101) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(102).
>
>
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone brought to the forefront the government's discomfort with encryption.(103) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(104).
 

B. Flaws, Motives, and Dangers of This Campaign

Changed:
<
<
Importantly, this message is not only pushed by the government, but media perpetuates it as well.(105) The treatment of encryption and anonymity is thus largely akin to propaganda.(106) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.

Not only does anonymity have Constitutional underpinnings in the publishing context,(107) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(108) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.

Notes

105 : See citations in Part II.A from media outlets.

107 : McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).

108 : See id. at 342 (""The decision in favor of anonymity may be motivated by fear of economic or official retaliation, by concern about social ostracism, or merely by a desire to preserve as much of one's privacy as possible. Whatever the motivation may be, at least in the field of literary endeavor, the interest in having anonymous works enter the marketplace of ideas unquestionably outweighs any public interest in requiring disclosure as a condition of entry."); see also Talley v. California, 362 U.S. 60, 64-65 ("Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all. . . . The old seditious libel cases in England show the lengths to which government had to go to find out who was responsible for books that were obnoxious to the rulers.")


>
>
This treatment of encryption and anonymity is essentially propaganda.(109) Such a campaign makes sense: encryption is easy to implement and access,(110) so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
 While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(111) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Changed:
<
<
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Even if privacy is purely a negative right (that is, the right not to be monitored by the government absent reasonable and legally compelling justification), the campaign described here violates this right.

It is not enough that the government take a step back and allow the public to embrace these tools. Privacy -- which includes access to anonymity and secure communication -- is paramount to individual autonomy and functioning democracy. These values are indispensable to fundamental American guarantees of liberty and security of the individual. It is thus not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of undermining these tools where possible and campaigning against them where they cannot be broken, the government could acknowledge these tools as central to the guarantees of American freedom and democracy. The public must demand this change of position.

>
>
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Privacy is paramount to individual autonomy and functioning democracy. It is not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of vilifying use of these tools, the government could acknowledge them as central to the guarantees of American freedom and democracy. The public must demand this change of position.
 

EthanThomasFirstPaper 6 - 06 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Anonymity, Encryption, and Propaganda

Line: 6 to 6
 
Deleted:
<
<
Note: This is an incomplete draft
 

Introduction

This paper briefly discusses efforts to frame anonymity and encryption -- vital tools to free expression, uninhibited communication, and autonomous life in a world of snooping and surveillance -- as dangerous and unnecessary instruments of criminality. It examines the legitimate need for modern tools that preserve anonymous communication and protected data, the attempts to undermine the usefulness of these tools, and the harm of this campaign against privacy-promoting technology.

Line: 17 to 14
 Communications can be protected in two important ways: namely, the author or the contents (or both) can be hidden from onlookers. Technology, private corporate interests, and government surveillance make the need for both forms of protection higher now than it ever has been.

A. The Demand for Protected Communication Is Legitimate

Changed:
<
<
Discuss here the importance of privacy, its relationship to autonomy, and the legal and historical protections thereof
>
>
Modern communication and information storage is difficult to analyze through founding-era views of privacy. In a world where communication channels were limited and means of snooping were rather blunt (e.g., intercepting parcels and searching physical places), boundaries were simple to draw and it was much easier to expect privacy absent these clear methods of intrusion. Situations calling for a mechanism of storage impossible for anyone in the world to open unless they had an intangible key are hard to imagine.

Now, however, covert observation is widespread. The effort required to tap into years of extremely intimate information about a person is minimal (consider access to a Google account containing perfectly archived emails, cloud storage, photos, calendar data, and more). The government can and does conduct wide-scale dragnet surveillance. The public has a stronger need than ever for tools that protect information from unauthorized viewing and mining, both by the government and private actors.

This need is more than an abstract desire to keep personal effects secret to avoid embarrassment; rather, individual autonomy is drastically undercut when the threat of monitoring always lurks in the background. "Autonomy is vitiated by the wholesale invasion of secrecy and privacy. Free decision-making is impossible in a society where every move is monitored . . . ."(112) The ability to communicate anonymously or free from this fear of eavesdropping is central not only to personhood, but to a functional democracy as well.(113)

 

B. The Need for Protected Communication Is Stronger Than Ever

Changed:
<
<
Discuss here encroachments into private communications by the government as well as private actors
>
>
Even with relatively secure means of communication, government access is a serious concern. Last year, the FBI sought information (which it learned was unobtainable) about users of the encrypted messaging app Signal.(114) This request involved account holder information, but other requests have sought to reach the contents of encrypted messaging -- most notably, encrypted email service Lavabit was required by a court order to turn over its private keys, which would have given the government the ability to break through the encryption of _all Lavabit email accounts.(115) The service opted to shut down rather than compromise user data,(116) but because it was subject to a gag order, it is uncertain how many such services have received and complied with such requests. The regular use of national security letters in this context amplify these concerns, because there is little to no judicial oversight.

Government access by voluntary disclosure or cooperative programs with companies that host data or communication services is perhaps a greater concern, because there is no advocate for the end user; instead, if data is turned over routinely and voluntarily, lay users may expect their assurances of privacy to be respected without understanding the extent to which their data can be easily shared.(117)

Further, the privacy interests discussed above can be -- and are -- undermined by private actors accessing personal communications and information; government surveillance is a serious privacy concern, but so is exposure of data to others for snooping, profiling, extortion, etc. These concerns arise when users' information is compromised due to large-scale data breaches or targeted hacking, but also when the host of the data mines the information for marketing or other profitable purposes.

These concerns are severe and nearly omnipresent in widely used online services. The danger is not only in actual theft or loss of privacy, but in the fact that users will often never know who is seeing their private correspondence, when it is being monitored, and for what purpose the data is used. Thus the need encryption and reliable anonymity that can provide reasonable assurance against such intrusions is significant if the threat of constant observation is to be curtailed at all.

 
Changed:
<
<

II. Hidden in Plain Sight: The Government's Vilification of Encryption

The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(118) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

Notes

118 : cite an example


>
>

II. The Government's Vilification of Encryption

The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(119) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
 

A. Association with Criminality and Delegitimization

One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
Changed:
<
<
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(120) Tor in particular has gained a reputation as "the web browser for criminals,"(121) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(122)

Notes

120 : See Flashpoint, Tech for Jihad, https://www.flashpoint-intel.com/wp-content/uploads/2016/08/TechForJihad.pdf

121 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9

122 : See Washington Post, The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror, https://www.washingtonpost.com/world/national-security/the-app-of-choice-for-jihadists-isis-seizes-on-internet-tool-to-promote-terror/2016/12/23/a8c348c0-c861-11e6-85b5-76616a33048d_story.html


>
>
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(123) Tor in particular has gained a reputation as "the web browser for criminals,"(124) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(125)
 
Changed:
<
<
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone, in which the FBI demanded software from Apple to essentially crack the encryption of any iPhone, brought to the forefront the government's discomfort with encryption.(126) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(127).

Notes

126 : See, e.g., NPR All Tech Considered, A Year After San Bernardino And Apple-FBI, Where Are We On Encryption?, http://www.npr.org/sections/alltechconsidered/2016/12/03/504130977/a-year-after-san-bernardino-and-apple-fbi-where-are-we-on-encryption

127 : Manhattan District Attorney's Office, Smartphone Encryption and Public Safety, http://manhattanda.org/sites/default/files/Report%20on%20Smartphone%20Encryption%20and%20Public%20Safety:%20An%20Update.pdf


>
>
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone, in which the FBI demanded software from Apple to essentially crack the encryption of any iPhone, brought to the forefront the government's discomfort with encryption.(128) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(129).
 

B. Flaws, Motives, and Dangers of This Campaign

Changed:
<
<
Importantly, this message is not only pushed by the government, but media perpetuates it as well.(130) The treatment of encryption and anonymity is thus largely akin to propaganda.(131) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.

Notes

131 : cite some definition


>
>
Importantly, this message is not only pushed by the government, but media perpetuates it as well.(132) The treatment of encryption and anonymity is thus largely akin to propaganda.(133) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
 Not only does anonymity have Constitutional underpinnings in the publishing context,(134) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(135) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.
Changed:
<
<
While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(136) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.

Notes

136 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9; see also PC World, Google's Schmidt Roasted for Privacy Comments, http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html (citing Schmidt's comment that "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place . . . .")


>
>
While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(137) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.
 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Changed:
<
<
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Even if privacy is purely a negative right (that is, the right not to be monitored by the government absent reasonable and legally-compelling justification), the campaign described here violates this right.
>
>
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Even if privacy is purely a negative right (that is, the right not to be monitored by the government absent reasonable and legally compelling justification), the campaign described here violates this right.
 
Changed:
<
<
[Conclusion]
>
>
It is not enough that the government take a step back and allow the public to embrace these tools. Privacy -- which includes access to anonymity and secure communication -- is paramount to individual autonomy and functioning democracy. These values are indispensable to fundamental American guarantees of liberty and security of the individual. It is thus not enough to make promises of these rights; the people must have access to tools that guarantee them. Instead of undermining these tools where possible and campaigning against them where they cannot be broken, the government could acknowledge these tools as central to the guarantees of American freedom and democracy. The public must demand this change of position.
 

EthanThomasFirstPaper 5 - 06 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
 

Anonymity, Encryption, and Propaganda

Deleted:
<
<
This is an incomplete draft
 -- By EthanThomas - 03 Mar 2017
Changed:
<
<
Introduction
>
>

Note: This is an incomplete draft

Introduction

This paper briefly discusses efforts to frame anonymity and encryption -- vital tools to free expression, uninhibited communication, and autonomous life in a world of snooping and surveillance -- as dangerous and unnecessary instruments of criminality. It examines the legitimate need for modern tools that preserve anonymous communication and protected data, the attempts to undermine the usefulness of these tools, and the harm of this campaign against privacy-promoting technology.

 

I. The Growing Need for Anonymity and Privacy

Added:
>
>
Communications can be protected in two important ways: namely, the author or the contents (or both) can be hidden from onlookers. Technology, private corporate interests, and government surveillance make the need for both forms of protection higher now than it ever has been.
 

A. The Demand for Protected Communication Is Legitimate

Discuss here the importance of privacy, its relationship to autonomy, and the legal and historical protections thereof
Line: 24 to 28
 

A. Association with Criminality and Delegitimization

One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
Changed:
<
<
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(138) Tor in particular has gained a reputation as "the web broswer for criminals,"(139) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(140)
>
>
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(141) Tor in particular has gained a reputation as "the web browser for criminals,"(142) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(143)
 
Changed:
<
<
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. For instance,
>
>
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. The standoff between Apple and the FBI over the San Bernardino shooter's iPhone, in which the FBI demanded software from Apple to essentially crack the encryption of any iPhone, brought to the forefront the government's discomfort with encryption.(144) The Manhattan District Attorney's Office argues that "[t]here is an urgent need for federal legislation that would compel software and hardware companies that design or build mobile devices or operating systems to make such devices amenable to appropriate searches."(145).
 

B. Flaws, Motives, and Dangers of This Campaign

Changed:
<
<
Importantly, this message is not only pushed by the govenrnment, but media perpetuates it as well.(146) The treatment of encryption and anonymity is thus largely akin to propaganda.(147) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can ccreate extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.

Notes

146 : Note that all citations in Part II.A are to media articles.


>
>
Importantly, this message is not only pushed by the government, but media perpetuates it as well.(148) The treatment of encryption and anonymity is thus largely akin to propaganda.(149) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can create extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
 
Changed:
<
<
Not only does anonymity have Constitutional underpinnings in the publishing context,(150) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(151) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.

Notes

151 : See id. at 342 (""The decision in favor of anonymity may be motivated by fear of economic or official retaliation, by concern about social ostracism, or merely by a desire to preserve as much of one's privacy as possible. Whatever the motivation may be, at least in the field of literary endeavor, the interest in having anonymous works enter the marketplace of ideas unquestionably outweighs any public interest in requiring disclosure as a condition of entry."); see also Talley v. California, 362 U.S. 60, 64-65 ("Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all. . . . The old seditious libel cases in England show the lengths **539 to which government had to go to find out who was responsible for books that were obnoxious *65 to the rulers.")


>
>
Not only does anonymity have Constitutional underpinnings in the publishing context,(152) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(153) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.
 
Changed:
<
<
While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative by prohibiting customers from using anonymizing tools,(154)
>
>
While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative (for their own purposes or by prohibiting customers from using anonymizing tools),(155) then suppression of ideas and identity could become the norm. Simply put, the best way to ensure that behavior can be comprehensively monitored is to normalize snooping (by both the government and private parties) and to stigmatize evasion of such intrusions.
 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Added:
>
>
The views of the government -- and increasingly, the view of corporations and society -- toward encryption, anonymity, and secrecy are contrary to principles of a free society. They stigmatize true expression and a desire to behave unscrutinized. Even if privacy is purely a negative right (that is, the right not to be monitored by the government absent reasonable and legally-compelling justification), the campaign described here violates this right.
 
Added:
>
>
[Conclusion]
 
Changed:
<
<
>
>

 \ No newline at end of file

EthanThomasFirstPaper 4 - 06 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

Anonymity, Propaganda, and Encryption

>
>

Anonymity, Encryption, and Propaganda

 This is an incomplete draft
Line: 21 to 21
 

II. Hidden in Plain Sight: The Government's Vilification of Encryption

The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(156) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
Changed:
<
<

A. Association with Terrorism

>
>

A. Association with Criminality and Delegitimization

 One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
Changed:
<
<
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(157) Tor in particular has gained a reputation as "the web broswer for criminals,"(158) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(159)

Notes

157 , 158 , 159 : cite


>
>
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(160) Tor in particular has gained a reputation as "the web broswer for criminals,"(161) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(162)
 
Changed:
<
<

B. Discounting of Legitimate Use

_Discuss here _
>
>
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. For instance,
 
Changed:
<
<

C. Flaws, Motives, and Dangers of This Campaign

>
>

B. Flaws, Motives, and Dangers of This Campaign

 Importantly, this message is not only pushed by the govenrnment, but media perpetuates it as well.(163) The treatment of encryption and anonymity is thus largely akin to propaganda.(164) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can ccreate extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
Added:
>
>
Not only does anonymity have Constitutional underpinnings in the publishing context,(165) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(166) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.

While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative by prohibiting customers from using anonymizing tools,(167)

 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Changed:
<
<
If space, discuss here the contradiction in viewing this technoilogy as an enemy of freedom and security
>
>
 

EthanThomasFirstPaper 3 - 05 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Anonymity, Propaganda, and Encryption

Added:
>
>
This is an incomplete draft
 -- By EthanThomas - 03 Mar 2017

Introduction

Line: 11 to 13
 

I. The Growing Need for Anonymity and Privacy

A. The Demand for Protected Communication Is Legitimate

Changed:
<
<
>
>
Discuss here the importance of privacy, its relationship to autonomy, and the legal and historical protections thereof
 

B. The Need for Protected Communication Is Stronger Than Ever

Changed:
<
<
>
>
Discuss here encroachments into private communications by the government as well as private actors
 

II. Hidden in Plain Sight: The Government's Vilification of Encryption

Added:
>
>
The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(168) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
 

A. Association with Terrorism

Added:
>
>
One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.

In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(169) Tor in particular has gained a reputation as "the web broswer for criminals,"(170) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(171)

 

B. Discounting of Legitimate Use

Added:
>
>
_Discuss here _
 
Changed:
<
<

C. Motives and Dangers of This Campaign

>
>

C. Flaws, Motives, and Dangers of This Campaign

Importantly, this message is not only pushed by the govenrnment, but media perpetuates it as well.(172) The treatment of encryption and anonymity is thus largely akin to propaganda.(173) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can ccreate extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Added:
>
>
If space, discuss here the contradiction in viewing this technoilogy as an enemy of freedom and security

EthanThomasFirstPaper 2 - 04 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
This is currently a placeholder
 
Changed:
<
<

Paper Title

>
>

Anonymity, Propaganda, and Encryption

 -- By EthanThomas - 03 Mar 2017
Added:
>
>
Introduction
 
Changed:
<
<

Section I

>
>

I. The Growing Need for Anonymity and Privacy

 
Changed:
<
<

Subsection A

>
>

A. The Demand for Protected Communication Is Legitimate

 
Changed:
<
<

Subsub 1

>
>

B. The Need for Protected Communication Is Stronger Than Ever

 
Deleted:
<
<

Subsection B

 
Added:
>
>

II. Hidden in Plain Sight: The Government's Vilification of Encryption

 
Changed:
<
<

Subsub 1

>
>

A. Association with Terrorism

 
Added:
>
>

B. Discounting of Legitimate Use

 
Changed:
<
<

Subsub 2

>
>

C. Motives and Dangers of This Campaign

 
Changed:
<
<

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.

>
>

III. Moving Forward and Embracing Technology as a Defender of Autonomy


EthanThomasFirstPaper 1 - 03 Mar 2017 - Main.EthanThomas
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"
This is currently a placeholder

Paper Title

-- By EthanThomas - 03 Mar 2017

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 14r14 - 03 May 2017 - 21:42:32 - EthanThomas
Revision 13r13 - 02 May 2017 - 20:22:12 - EthanThomas
Revision 12r12 - 30 Apr 2017 - 20:16:40 - EbenMoglen
Revision 11r11 - 18 Apr 2017 - 01:26:29 - EthanThomas
Revision 10r10 - 16 Apr 2017 - 22:04:10 - EthanThomas
Revision 9r9 - 09 Apr 2017 - 18:16:06 - EthanThomas
Revision 8r8 - 09 Mar 2017 - 16:15:23 - EthanThomas
Revision 7r7 - 06 Mar 2017 - 18:41:41 - EthanThomas
Revision 6r6 - 06 Mar 2017 - 16:58:53 - EthanThomas
Revision 5r5 - 06 Mar 2017 - 04:13:29 - EthanThomas
Revision 4r4 - 06 Mar 2017 - 02:47:47 - EthanThomas
Revision 3r3 - 05 Mar 2017 - 22:05:23 - EthanThomas
Revision 2r2 - 04 Mar 2017 - 21:54:54 - EthanThomas
Revision 1r1 - 03 Mar 2017 - 16:38:42 - EthanThomas
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM