www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy surveillance-vs-democracy.html


From: Richard M. Stallman
Subject: www/philosophy surveillance-vs-democracy.html
Date: Sun, 27 Oct 2013 13:12:31 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Richard M. Stallman <rms>       13/10/27 13:12:31

Modified files:
        philosophy     : surveillance-vs-democracy.html 

Log message:
        Fix heading levels.  Change back the heading Wired changed.
        Correct the locations of a few links.
        Add link to Dutch census data misuse.
        Reformat the ref to the Wired publication.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.html?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: surveillance-vs-democracy.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- surveillance-vs-democracy.html      19 Oct 2013 19:09:46 -0000      1.3
+++ surveillance-vs-democracy.html      27 Oct 2013 13:12:31 -0000      1.4
@@ -8,9 +8,9 @@
 
 <p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
 
-<p><em>A version of this article was first published at <a
+<blockquote>A version of this article was first published in <a
 
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/";>
-Wired</a> in October 2013.</em></p>
+Wired</a> in October 2013.</blockquote>
 
 <p>The current level of general surveillance in society is
 incompatible with human rights.  To recover our freedom and restore
@@ -22,15 +22,17 @@
 <p>Using free/libre software, <a
 
href="http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before/";>
 as I've advocated for 30 years</a>, is the first step in taking
-control of our digital lives.  We can't trust nonfree software; the <a
+control of our digital lives.  We can't trust nonfree software; the
+NSA
+<a
 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
-NSA uses and even creates security weaknesses</a> in nonfree software
-so as to <a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>
-invade our own computers</a> and routers.  Free software gives us
-control of our own computers, but <a
-href="http://www.wired.com/opinion/2013/10/149481/";> that won't
-protect our privacy once we set foot on the Internet</a>.</p>
+uses</a> and
+even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>
+creates</a> security weaknesses in nonfree software to invade our own
+computers and routers.  Free software gives us control of our own
+computers, but <a href="http://www.wired.com/opinion/2013/10/149481/";>
+that won't protect our privacy once we set foot on the
+Internet</a>.</p>
 
 <p><a
 
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
@@ -51,8 +53,7 @@
 the functioning of democracy: when whistleblowers (such as Snowden)
 are likely to be caught.</p>
 
-<h3>Don't Agree We Need to Reduce Surveillance?  Then Read This
-Section First</h3>
+<h3>The Upper Limit on Surveillance in a Democracy</h3>
 
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
@@ -67,9 +68,9 @@
 talking to.&rdquo;</a> Sometimes <a
 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>
 journalists' phone call records are subpoenaed</a> to find this out,
-but Snowden has shown us that in effect <a
-href="https://www.commondreams.org/view/2013/05/14";> they subpoena all
-the phone call records</a> of everyone in the U.S., all the time.</p>
+but Snowden has shown us that in effect they subpoena  <a
+href="https://www.commondreams.org/view/2013/05/14";> all
+the phone call records of everyone in the U.S.</a>, all the time.</p>
 
 <p>Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
@@ -80,7 +81,7 @@
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
 
-<h4>Information, Once Collected, Will Be Misused</h4>
+<h3>Information, Once Collected, Will Be Misused</h3>
 
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
@@ -98,7 +99,7 @@
 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>
 used U.S. surveillance systems to track their lovers</a>&mdash;past,
 present, or wished-for&mdash;in a practice called
-&ldquo;LoveINT.&rdquo; The NSA says it has caught and punished this a
+&ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
 few times; we don't know how many other times it wasn't caught.  But
 these events shouldn't surprise us, because police have long <a
 href="http://www.sweetliberty.org/issues/privacy/lein1.htm";>used their
@@ -108,15 +109,16 @@
 
 <p>Surveillance data will always be used for other purposes, even if
 this is prohibited.  Once the data has been accumulated and the state
-has the possibility of access to it, it may misuse that data in
-dreadful ways.</p>
+has the possibility of access to it, it
+can <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>
+misuse that data in dreadful ways.</a></p>
 
 <p>Total surveillance plus vague law provides an opening for a massive
 fishing expedition against any desired target.  To make journalism and
 democracy safe, we must limit the accumulation of data that is easily
 accessible to the state.</p>
 
-<h4>Robust Protection for Privacy Must Be Technical</h4>
+<h3>Robust Protection for Privacy Must Be Technical</h3>
 
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
@@ -167,7 +169,7 @@
 
 <p>We need to design such privacy into all our digital systems.</p>
 
-<h4>Remedy for Collecting Data: Leaving It Dispersed</h4>
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
 
 <p>One way to make monitoring safe for privacy is to keep the data
 dispersed and inconvenient to access.  Old-fashioned security cameras
@@ -195,7 +197,7 @@
 systematic accumulation of such data on the Internet must be
 limited.</p>
 
-<h4>Remedy for Internet Commerce Surveillance</h4>
+<h3>Remedy for Internet Commerce Surveillance</h3>
 
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
@@ -245,7 +247,7 @@
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
 
-<h4>Remedy for Travel Surveillance</h4>
+<h3>Remedy for Travel Surveillance</h3>
 
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
@@ -303,7 +305,7 @@
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
 
-<h4>Remedy for Communications Dossiers</h4>
+<h3>Remedy for Communications Dossiers</h3>
 
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
@@ -416,5 +418,5 @@
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
-<p>Updated: <!-- timestamp start --> $Date: 2013/10/19 19:09:46 $ <!--
+<p>Updated: <!-- timestamp start --> $Date: 2013/10/27 13:12:31 $ <!--
 timestamp end --> </p> </div> </div> </body> </html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]