Monday, 11 February 2013

Destroying privacy

Google Moves to Destroy Online Anonymity … Helping Authoritarian Governments In the Process

Zero Hedge,

10 February, 2013

Governments Move to Destroy Online Anonymity


Gene Howington reported last year:
The history of anonymous political free speech in America dates back to our founding. The seminal essays found in “The Federalist Papers” were written by Alexander Hamilton, James Madison and John Jay under the nom de plume of “Publius” although this was not confirmed until a list of authorship complied by Hamilton was posthumously released to the public. As previously discussed on this blog, the right to anonymous political free speech has been addressed by the Supreme Court. Most notably in the cases of Talley v. California, 362 U.S. 60 (1960) and McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995). In Talley, Justice Hugo Black writing for the majority said that,


 “Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all.” In McIntyre, Justice John Paul Stevens writing for the majority said that, 

“Anonymity is a shield from the tyranny of the majority. [… ] an author’s decision to remain anonymous, like other decisions concerning omissions or additions to the content of a publication, is an aspect of the freedom of speech protected by the First Amendment.” That seems clear enough in defining that citizens do have a Constitutionally protected right to anonymous political free speech.


Tyler Durden of Zero Hedge points out (with slight editing):

Though often maligned (typically by those frustrated by an inability to engage in ad hominem attacks), anonymous speech has a long and storied history in the United States. Used by the likes of Mark Twain (aka Samuel Langhorne Clemens) to criticize common ignorance, and perhaps most famously by Alexander Hamilton, James Madison and John Jay (aka publius) to write the Federalist Papers, we think ourselves in good company in using one or another nom de plume.

Particularly in light of an emerging trend against vocalizing public dissent in the United States, we believe in the critical importance of anonymity and its role in dissident speech.

Like the Economist magazine, we also believe that keeping authorship anonymous moves the focus of discussion to the content of speech and away from the speaker – as it should be. We believe not only that you should be comfortable with anonymous speech in such an environment, but that you should be suspicious of any speech that isn’t.


But governments – especially authoritarian governments – hate anonymity.


A soon-to-be-released book by Google executive Eric Schmidt -  called “The New Digital Age” – describes the desire of authoritarian governments to destroy anonymity.  The Wall Street Journal provides an excerpt:

Some governments will consider it too risky to have thousands of anonymous, untraceable and unverified citizens — “hidden people”; they’ll want to know who is associated with each online account, and will require verification at a state level, in order to exert control over the virtual world.


Last December, China started requiring all web users to register using their real names

.
But the U.S. is quickly moving in the same direction.  Gene Howington explains
:
Do you have a right to anonymous political free speech?
According to the Supreme Court, you do. According to the Department of Homeland Security, you don’t. They’ve hired General Dynamics to track U.S. citizens exercising this critical civil right.
***

The full DHS policy statement regarding its activities can be viewed in the DHS Privacy Compliance Review of the NOC Media Monitoring Initiative (November 15, 2011), but rt.com’s summary spells out the basics:

Under the National Operations Center (NOC)’s Media Monitoring Initiative that came out of DHS headquarters in November, Washington has the written permission to retain data on users of social media and online networking platforms.
Specifically, the DHS announced the NCO and its Office of Operations Coordination and Planning (OPS) can collect personal information from news anchors, journalists, reporters or anyone who may use “traditional and/or social media in real time to keep their audience situationally aware and informed.”
According to the Department of Homeland Security’s own definition of personal identifiable information, or PII, such data could consist of any intellect “that permits the identity of an individual to be directly or indirectly inferred, including any information which is linked or linkable to that individual.”Previously established guidelines within the administration say that data could only be collected under authorization set forth by written code, but the new provisions in the NOC’s write-up means that any reporter, whether someone along the lines of Walter Cronkite or a budding blogger, can be victimized by the agency.

Also included in the roster of those subjected to the spying are government officials, domestic or not, who make public statements, private sector employees that do the same and“persons known to have been involved in major crimes of Homeland Security interest,” which to itself opens up the possibilities even wider. 

The department says that they will only scour publically-made info available while retaining data, but it doesn’t help but raise suspicion as to why the government is going out of their way to spend time, money and resources on watching over those that helped bring news to the masses.” – rt.com

This question about the right to anonymous political free speech is also asked over the background of the Electronic Privacy Information Center filing a FOIA request against the DHS to find out the details of the agency’s social network monitoring program.
***
As part of recent disclosures related to the EPIC suit, it is revealed that the DHS has hired and instructed General Dynamics to monitor political dissent and the dissenters. The range of websites listed as being monitored is quite impressive. Notably, jonathanturley.org is not on this list [Howington's essay is a guest blog on constitutional law professor Jonathan Turley's website], but equally of note is that this list is by the DHS’ own admission “representative” and not “comprehensive”.

*** 
Some of the more high profile and highly trafficked sites being monitored include the comments sections of The New York Times, The Los Angeles Times, Newsweek, the Huffington Post, the Drudge Report, Wired, and ABC News. In addition, social networking sites Facebook, MySpace and Twitter are being monitored. For the first time, the public not only has an idea who the DHS is pursuing with their surveillance and where, but what they are looking for as well. General Dynamics contract requires them to “[identify] media reports that reflect adversely on the U.S. Government, DHS, or prevent, protect, respond government activities.” The DHS also instructed General Dynamics to generate “reports on DHS, Components, and other Federal Agencies: positive and negative reports on FEMA, CIA, CBP, ICE, etc. as well as organizations outside the DHS.” In other words, the DHS wants to know who you are if you say anything critical about the government.
Anybody thinking of the name “Goebbels” at this point is not out of line.


Indeed, valuing online privacy could even get you labeled as a potential terrorist.


Google Moving to Help Destroy Anonymity


Google’s motto is “Do No Evil“.   And Google notes in a patent application:







When users reveal their identities on the internet, it leaves them more vulnerable to stalking, identity theft and harassment.


So you might assume that Google is fighting to protect anonymity on the web.
But Schmidt’s new book reveals that Google will support the destruction of anonymity (via Wall Street Journal):







Within search results, information tied to verified online profiles will be ranked higher than content without such verification, which will result in most users naturally clicking on the top (verified) results. The true cost of remaining anonymous, then, might be irrelevance.


Search Engine Journal explains:



[Passages from Schmidt's book] confirm what many industry writers have been passionately clattering away about for months now.  Google+ is an identity verification network.  As the network continues to grow, content associated with a verified identity will rise to the top of Google search rankings.


(Google+ is now the world’s second most popular social network.)
In other words, Schmidt acknowledges (in the first quote above) that authoritarians want to destroy anonymity … and Google will help them do so.


We are not saying that Google likes authoritarians. True, there are potential ties between Google and the government.  For example, the head of DARPA now works for Google, and Internet powerhouse Vint Cerf has worked at both institutions.  Wired reports:

Long before it reportedly enlisted the help of the National Security Agency to secure its networks, Google sold equipment to the secret signals-intelligence group. In-Q-Tel [the CIA's investment arm] backed the mapping firm Keyhole, which was bought by Google in 2004 — and then became the backbone for Google Earth.


And a former high-level CIA officer alleges that the CIA funded Google with seed money

.
However, the focus of this essay is on Google’s profit motive.  Specifically, Google will do business with anyone … and will cowtow to authoritarians they happen to do business with.


Google is doing this to make money.  Remember, Google gathers information across all of its platforms, and personalizes search engine results based upon what you’ve looked for in past searches.


After all, Google is primary an advertising company … not a search company. 


See this,thisthis and this.


As the Daily Mail reported last year:







A former Google executive has lambasted his ex-employer … claiming that the search company has been turned into an ‘ad company’ obsessed with harvesting people’s private information.

James Whittaker, a current Partner Development Manager at Microsoft and ex-Engineering Director at Google, posted the 1328-word attack on Google on his Microsoft blog this week.
Perhaps Google is right,’ writes Whittaker, ‘Perhaps the future lies in learning as much about people’s personal lives as possible.
The Google I was passionate about was a technology company. The Google I left was an advertising company.’
***
The move comes in the wake of Google’s controversial new ‘privacy policy’, which allowed the search giant to ‘pool’ information from 60 separate services including Gmail, Google Search and Android phones, to create ‘personalised’ advertising.


The bottom line is that anonymity reduces Google’s ability to monetize personal information and sell it to its advertisers.  So Google is on a campaign to destroy anonymity … and unintentionally helping tyrants in the process.


As INeedHits laments:
We knew a day would come when privacy was a thing of the past, but Schmidt clearly spells out that day is sooner than we had expected.



New software can track your every move and predict future behavior



Reuters / Regis Duvignau
Reuters / Regis Duvignau
RT,
11 February, 2013

US defense giant Raytheon has developed a controversial software that uses social networking sites to track your movements, able to predict where a person will be and their future behavior. The program has drawn criticism from civil rights groups.

A video obtained exclusively by The Guardian shows how software developed by the US defense contractor Raytheon, can gather vast amounts of personal information from social networking sites such as Facebook, Twitter and Foursquare.

Raytheon has admitted that the technology was shared with the US government as part of a joint research and development program in 2010, as part of an effort to build a national security system capable of analyzing trillions of entities from cyberspace.

But, the Massachusetts-based company says it has not sold the software, which is called Riot, or Rapid Information Overlay Technology, to any clients.

The controversial software allegedly enables access to entire parts of a person’s life, their friends, any pictures of themselves they have posted online and places they have visited charted on a map.

In the video it is explained by Brian Urch, Raytheon’s ‘principal investigator’, exactly how the program can be used to track someone down.


We’re going to track down one of our employees,” says Urch. He then proceeds to show, using information gathered from social networking sites, how “Nick” visited Washington National Park and a picture of Nick in the park with a blonde woman.


We know where Nick is going, we know what Nick looks like, now we want to try to predict where he will be in the future,” Urch continues.

As Nick regularly uses Foursquare, a phone app that alerts friends to your whereabouts, it was possible for Riot to track the top ten places visited by Nick and the times at which they were visited.


It shows that Nick visits a gym every Monday at 6am. “So if you want to get hold of Nick, or maybe get hold of his laptop, you might want to visit the gym at 6am on a Monday,” says Urch.



Using public websites for law enforcement is considered legal in most countries, and Riot will be of interest to intelligence and national security agencies. In February last year the FBI requested that it wanted to develop ways of mining social media sites for monitoring “bad actors or groups”.

This has prompted concern from civil liberties groups about online privacy. Ginger McCall, an attorney at the Washington-based Electronic Privacy Information Center, said Riot raised concerns about how an individual’s data could be collected covertly without oversight or regulation.


Users may be posting information that they believe will be viewed only by their friends, but instead it is being used by government officials or pulled in by data collection services like the Riot search,” McCall told The Guardian.

But Raytheon defended its product and in an email to the Guardian Jared Adams, a spokesman for the company’s intelligence and information systems department, said it would help to meet the US’s rapidly changing security needs.He also highlighted that it does not analyze personally identifiable information, such as bank details or social security numbers.

In December Raytheon indicated that Riot would be part of a patent the company is pursuing for a system designed to gather data from social networking sites and blogs to identify if someone is a national security risk.





The Guardian's article is available HERE

No comments:

Post a Comment

Note: only a member of this blog may post a comment.