Computers, Privacy & the Constitution

View   r4  >  r3  >  r2  >  r1
EthanThomasFirstPaper 4 - 06 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

Anonymity, Propaganda, and Encryption

>
>

Anonymity, Encryption, and Propaganda

 This is an incomplete draft
Line: 21 to 21
 

II. Hidden in Plain Sight: The Government's Vilification of Encryption

The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(1) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.

Notes

1 : cite an example


Changed:
<
<

A. Association with Terrorism

>
>

A. Association with Criminality and Delegitimization

 One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.
Changed:
<
<
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(2) Tor in particular has gained a reputation as "the web broswer for criminals,"(3) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(4)

Notes

2 , 3 , 4 : cite


>
>
In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(5) Tor in particular has gained a reputation as "the web broswer for criminals,"(6) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(7)

Notes

5 : See Flashpoint, Tech for Jihad, https://www.flashpoint-intel.com/wp-content/uploads/2016/08/TechForJihad.pdf

6 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9

7 : See Washington Post, The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror, https://www.washingtonpost.com/world/national-security/the-app-of-choice-for-jihadists-isis-seizes-on-internet-tool-to-promote-terror/2016/12/23/a8c348c0-c861-11e6-85b5-76616a33048d_story.html


 
Changed:
<
<

B. Discounting of Legitimate Use

_Discuss here _
>
>
The government has itself played a role in associating privacy-protecting or anonymizing tools with criminality. For instance,
 
Changed:
<
<

C. Flaws, Motives, and Dangers of This Campaign

>
>

B. Flaws, Motives, and Dangers of This Campaign

 Importantly, this message is not only pushed by the govenrnment, but media perpetuates it as well.(8) The treatment of encryption and anonymity is thus largely akin to propaganda.(9) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can ccreate extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.

Notes

8 : Note that all citations in Part II.A are to media articles.

9 : cite some definition


Added:
>
>
Not only does anonymity have Constitutional underpinnings in the publishing context,(10) but the ability to speak and communicate anonymously in a world where everything is monitored and recorded is paramount to privacy.(11) Indeed, anonymity is one of three key components of privacy, the other two being secrecy (which encryption and secure communication tools help protect) and autonomy.

While anonymity and secrecy are directly offended by a war on encryption, autonomy is also a victim. As discussed above, the persistent threat of monitoring and censorship severely limits the ability to express, act, and ultimately think on one's own. The notion that people who seek to act autonomously by guaranteeing freedom from these intrusions are dangerous (or even criminal) demonstrates a troubling lack of respect for these principles of autonomy from those in power, but also threatens to suppress expression and uninhibited behavior by making individuals and communities police themselves. If people are told that they have nothing to hide if they have done nothing wrong, and companies adopt this narrative by prohibiting customers from using anonymizing tools,(12)

Notes

10 : McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).

11 : See id. at 342 (""The decision in favor of anonymity may be motivated by fear of economic or official retaliation, by concern about social ostracism, or merely by a desire to preserve as much of one's privacy as possible. Whatever the motivation may be, at least in the field of literary endeavor, the interest in having anonymous works enter the marketplace of ideas unquestionably outweighs any public interest in requiring disclosure as a condition of entry."); see also Talley v. California, 362 U.S. 60, 64-65 ("Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all. . . . The old seditious libel cases in England show the lengths **539 to which government had to go to find out who was responsible for books that were obnoxious *65 to the rulers.")

12 : See Business Insider, Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals, http://www.businessinsider.com/comcast-threatens-to-cut-off-tor-users-2014-9; see also PC World, Google's Schmidt Roasted for Privacy Comments, http://www.pcworld.com/article/184446/googles_schmidt_roasted_for_privacy_comments.html (citing Schmidt's comment that "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place . . . .")


 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Changed:
<
<
If space, discuss here the contradiction in viewing this technoilogy as an enemy of freedom and security
>
>
 

EthanThomasFirstPaper 3 - 05 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

Anonymity, Propaganda, and Encryption

Added:
>
>
This is an incomplete draft
 -- By EthanThomas - 03 Mar 2017

Introduction

Line: 11 to 13
 

I. The Growing Need for Anonymity and Privacy

A. The Demand for Protected Communication Is Legitimate

Changed:
<
<
>
>
Discuss here the importance of privacy, its relationship to autonomy, and the legal and historical protections thereof
 

B. The Need for Protected Communication Is Stronger Than Ever

Changed:
<
<
>
>
Discuss here encroachments into private communications by the government as well as private actors
 

II. Hidden in Plain Sight: The Government's Vilification of Encryption

Added:
>
>
The government has taken a strong stance against secure means of communication, and encryption in particular, by highlighting instances where criminals or terrorists use these tools, perpetuating the "if you have done nothing wrong, you have nothing to hide" narrative,(13) and insisting that privacy is compatible with uninhibited government access to records and communications. These tactics and the overall message against encryption ignore legitimate need for the technology, and they reveal troubling motives to the government's approach to technology, privacy, and free speech.
 

A. Association with Terrorism

Added:
>
>
One tactic that has recently gained favor is to associate secure or anonymous communication with terrorism. To be sure, the association of tools the government dislikes with criminal behavior is not a new phenomenon. The current narrative, however, creates a strong tie between criminality and the use of certain technologies that aims to stigmatize their use.

In one report (by a private firm), Tor, VPN services, and several messaging applications are identified as "Tech for Jihad."(14) Tor in particular has gained a reputation as "the web broswer for criminals,"(15) merely because it helps to anonymize users. Telegraph, an app which can send encrypted and self-deleting messages, has been identified as "the app of choice for jihadists."(16)

 

B. Discounting of Legitimate Use

Added:
>
>
_Discuss here _
 
Changed:
<
<

C. Motives and Dangers of This Campaign

>
>

C. Flaws, Motives, and Dangers of This Campaign

Importantly, this message is not only pushed by the govenrnment, but media perpetuates it as well.(17) The treatment of encryption and anonymity is thus largely akin to propaganda.(18) This treatment makes sense: encryption is easy to implement and access (for example, RSA encryption utilizes basic number theory, and a simple program can ccreate extremely difficult-to-break encryption), so the best way to keep people from it is to treat it as if it were dangerous or presumptively criminal. In other words, the goal is to change behavior through misinformation and fear, rather than through direct enforcement. This is at its core self-censorship and self-regulation, gradually imposed on the citizenry.
 

III. Moving Forward and Embracing Technology as a Defender of Autonomy

Added:
>
>
If space, discuss here the contradiction in viewing this technoilogy as an enemy of freedom and security

EthanThomasFirstPaper 2 - 04 Mar 2017 - Main.EthanThomas
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
This is currently a placeholder
 
Changed:
<
<

Paper Title

>
>

Anonymity, Propaganda, and Encryption

 -- By EthanThomas - 03 Mar 2017
Added:
>
>
Introduction
 
Changed:
<
<

Section I

>
>

I. The Growing Need for Anonymity and Privacy

 
Changed:
<
<

Subsection A

>
>

A. The Demand for Protected Communication Is Legitimate

 
Changed:
<
<

Subsub 1

>
>

B. The Need for Protected Communication Is Stronger Than Ever

 
Deleted:
<
<

Subsection B

 
Added:
>
>

II. Hidden in Plain Sight: The Government's Vilification of Encryption

 
Changed:
<
<

Subsub 1

>
>

A. Association with Terrorism

 
Added:
>
>

B. Discounting of Legitimate Use

 
Changed:
<
<

Subsub 2

>
>

C. Motives and Dangers of This Campaign

 
Changed:
<
<

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.

>
>

III. Moving Forward and Embracing Technology as a Defender of Autonomy


EthanThomasFirstPaper 1 - 03 Mar 2017 - Main.EthanThomas
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"
This is currently a placeholder

Paper Title

-- By EthanThomas - 03 Mar 2017

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 4r4 - 06 Mar 2017 - 02:47:47 - EthanThomas
Revision 3r3 - 05 Mar 2017 - 22:05:23 - EthanThomas
Revision 2r2 - 04 Mar 2017 - 21:54:54 - EthanThomas
Revision 1r1 - 03 Mar 2017 - 16:38:42 - EthanThomas
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM