[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy surveillance-vs-democracy.ja.htm...
From: |
GNUN |
Subject: |
www/philosophy surveillance-vs-democracy.ja.htm... |
Date: |
Sat, 5 Nov 2022 16:29:40 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/11/05 16:29:40
Modified files:
philosophy : surveillance-vs-democracy.ja.html
surveillance-vs-democracy.sq.html
philosophy/po : surveillance-vs-democracy.ja-diff.html
surveillance-vs-democracy.sq-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ja.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.sq.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq-diff.html?cvsroot=www&r1=1.7&r2=1.8
Patches:
Index: surveillance-vs-democracy.ja.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ja.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- surveillance-vs-democracy.ja.html 30 Jun 2022 05:12:25 -0000 1.33
+++ surveillance-vs-democracy.ja.html 5 Nov 2022 20:29:37 -0000 1.34
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.ja.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE"
value="/philosophy/po/surveillance-vs-democracy.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-09-06" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.97 -->
@@ -28,6 +33,7 @@
<!--#include virtual="/server/banner.ja.html" -->
<!--#include virtual="/philosophy/ph-breadcrumb.ja.html" -->
<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.ja.html" -->
<!--#include virtual="/server/top-addendum.ja.html" -->
<div class="article">
<h2 class="center">æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã?</h2>
@@ -383,7 +389,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2022/06/30 05:12:25 $
+$Date: 2022/11/05 20:29:37 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.sq.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.sq.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- surveillance-vs-democracy.sq.html 12 Jul 2022 23:30:02 -0000 1.46
+++ surveillance-vs-democracy.sq.html 5 Nov 2022 20:29:37 -0000 1.47
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.sq.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.sq.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE"
value="/philosophy/po/surveillance-vs-democracy.sq-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-09-06" --><!--#set
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.sq.html" -->
<!-- Parent-Version: 1.97 -->
@@ -29,6 +34,7 @@
<!--#include virtual="/server/banner.sq.html" -->
<!--#include virtual="/philosophy/ph-breadcrumb.sq.html" -->
<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.sq.html" -->
<!--#include virtual="/server/top-addendum.sq.html" -->
<div class="article">
<h2 class="center">Sa Mbikëqyrje Mund të Përballojë Demokracia?</h2>
@@ -718,7 +724,7 @@
<p class="unprintable"><!-- timestamp start -->
U përditësua më:
-$Date: 2022/07/12 23:30:02 $
+$Date: 2022/11/05 20:29:37 $
<!-- timestamp end -->
</p>
Index: po/surveillance-vs-democracy.ja-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/surveillance-vs-democracy.ja-diff.html 1 Oct 2021 05:32:42 -0000
1.26
+++ po/surveillance-vs-democracy.ja-diff.html 5 Nov 2022 20:29:39 -0000
1.27
@@ -11,43 +11,36 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.90</strong></del></span> <span
class="inserted"><ins><em>1.96 -->
+<!-- Parent-Version: 1.97 -->
<!-- This page is derived from /server/standards/boilerplate.html -->
<!--#set var="TAGS" value="essays cultural evils" -->
-<!--#set var="DISABLE_TOP_ADDENDUM" value="yes"</em></ins></span> -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
#intro { margin: 2em auto 1.5em; }
+.toc { width: auto; }
.pict.wide { width: 23em; }
.pict p { margin-bottom: 0; }
+#conclusion { visibility: hidden; margin-top: 0; }
@media (min-width: 55em) {
#intro { max-width: 55em; }
+ .toc { max-width: 51em; }
+ .toc li { display: inline-block; width: 90%; }
}
-->
</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
-<span class="inserted"><ins><em><!--#include
virtual="/philosophy/ph-breadcrumb.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.html" -->
<!--GNUN: OUT-OF-DATE NOTICE-->
<!--#include virtual="/server/top-addendum.html" -->
-<div class="article"></em></ins></span>
+<div class="article">
<h2 class="center">How Much Surveillance Can Democracy
Withstand?</h2>
<address class="byline center">by
-<a <span
class="removed"><del><strong>href="http://www.stallman.org/">Richard</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.stallman.org/">Richard</em></ins></span>
Stallman</a></address>
-
-<span class="removed"><del><strong><!-- rms: I deleted the link because of
Wired's announced
- anti-ad-block system -->
-<blockquote class="center"><p><em>A version of this article
was first published in
-<cite>Wired</cite> in October 2013.<br />
-Also consider reading “<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
-radical proposal to keep your personal data safe</a>,” published in
-<cite>The Guardian</cite> in
April 2018.</em></p></blockquote>
-
-<div class="article"></strong></del></span>
+<a href="https://www.stallman.org/">Richard
Stallman</a></address>
<div id="intro">
<div class="pict wide">
@@ -89,15 +82,14 @@
can't trust nonfree software; the NSA
<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
-even <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></em></ins></span>
+even <a
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/">that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/">that</em></ins></span>
won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</em></ins></span>
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -106,7 +98,26 @@
or her. We need to go further.</p>
</div>
-<h3 <span
class="removed"><del><strong>class="subheader"</strong></del></span>
style="clear: both">The Upper Limit on Surveillance in a Democracy</h3>
+<div class="toc" style="clear: both">
+<hr class="no-display" />
+<h3 class="no-display">Table of contents</h3>
+<ul class="columns">
+ <li><a href="#upperlimit">The Upper Limit on Surveillance in a
Democracy</a></li>
+ <li><a href="#willbemisused">Information, Once Collected, Will Be
Misused</a></li>
+ <li><a href="#technical">Robust Protection for Privacy Must Be
Technical</a></li>
+ <li><a href="#commonsense">First, Don't Be
Foolish</a></li>
+ <li><a href="#privacybydesign">We Must Design Every System for
Privacy</a></li>
+ <li><a href="#dispersal">Remedy for Collecting Data: Leaving It
Dispersed</a></li>
+ <li><a href="#digitalcash">Remedy for Internet Commerce
Surveillance</a></li>
+ <li><a href="#travel">Remedy for Travel
Surveillance</a></li>
+ <li><a href="#communications">Remedy for Communications
Dossiers</a></li>
+ <li><a href="#necessary">But Some Surveillance Is
Necessary</a></li>
+ <li><a href="#conclusion">Conclusion</a></li>
+</ul>
+<hr class="no-display" />
+</div>
+
+<h3 id="upperlimit">The Upper Limit on Surveillance in a
Democracy</h3>
<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -117,41 +128,38 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a <span
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.</em></ins></span>
would
+the <a
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</em></ins></span>
+Sometimes <a
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
-and <a <span
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</em></ins></span>
+and <a
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-<span
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</em></ins></span>
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">Information,</strong></del></span>
-
-<span class="inserted"><ins><em><h3>Information,</em></ins></span> Once
Collected, Will Be Misused</h3>
+<h3 id="willbemisused">Information, Once Collected, Will Be
Misused</h3>
<div class="columns">
-<p id="willbemisused">When people recognize
+<p>When people recognize
that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a <span
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</em></ins></span>
+was <a
href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -167,7 +175,7 @@
<p>In addition, the state's surveillance staff will misuse the data
for personal reasons. Some NSA
-agents <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</em></ins></span>
+agents <a
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -180,7 +188,7 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a <span
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"></strong></del></span>
<span
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"></em></ins></span>
+to <a
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
@@ -191,16 +199,16 @@
this is prohibited. Once the data has been accumulated and the state
has the possibility of access to it, it can misuse that data in
dreadful ways, as shown by examples
-from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
+from <a <span
class="removed"><del><strong>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20220619175619/http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,</em></ins></span>
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
-recently <a <span
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.</em></ins></span>
+recently <a
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
</p>
-<span class="inserted"><ins><em><p>You may feel your government won't
use your personal data for
+<p>You may feel your government won't use your personal data for
repression, but you can't rely on that feeling, because governments do
change. As of 2021, many ostensibly democratic states
are <a
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan">ruled
@@ -211,15 +219,15 @@
nonviolent protests that might be described as causing “serious
disruption.”</a> The US could become permanently repressive in
2025, for all we know.
-</p></em></ins></span>
+</p>
<p>Personal data collected by the state is also likely to be obtained
by outside crackers that break the security of the servers, even
-by <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
+by <a
href="https://www.techdirt.com/2015/06/12/second-opm-hack-revealed-even-worse-than-first/">crackers
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</em></ins></span>
+to <a
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -228,9 +236,7 @@
that is easily accessible to the state.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">Robust</strong></del></span>
-
-<span class="inserted"><ins><em><h3>Robust</em></ins></span> Protection
for Privacy Must Be Technical</h3>
+<h3 id="technical">Robust Protection for Privacy Must Be
Technical</h3>
<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
@@ -245,8 +251,7 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-<span
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></em></ins></span>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -263,9 +268,7 @@
ignoring this law, the idea would hardly make sense.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">First,</strong></del></span>
-
-<span class="inserted"><ins><em><h3>First,</em></ins></span> Don't Be
Foolish</h3>
+<h3 id="commonsense">First, Don't Be Foolish</h3>
<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
@@ -291,7 +294,7 @@
pertinent data to the company's server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a <span
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</strong></del></span>
<span
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</em></ins></span>
+too. <a
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -310,9 +313,7 @@
suspects.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">We</strong></del></span>
-
-<span class="inserted"><ins><em><h3>We</em></ins></span> Must Design
Every System for Privacy</h3>
+<h3 id="privacybydesign">We Must Design Every System for
Privacy</h3>
<div class="columns">
<p>If we don't want a total surveillance society, we must consider
@@ -335,12 +336,10 @@
systems [<a href="#ambientprivacy">1</a>].</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">Remedy</strong></del></span>
-
-<span class="inserted"><ins><em><h3>Remedy</em></ins></span> for
Collecting Data: Leaving It Dispersed</h3>
+<h3 id="dispersal">Remedy for Collecting Data: Leaving It
Dispersed</h3>
<div class="columns">
-<p id="dispersal">One way to make monitoring safe for privacy is
+<p>One way to make monitoring safe for privacy is
to keep the data dispersed and inconvenient to
access. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
The recording was stored on the premises, and kept for a few weeks at
@@ -355,10 +354,10 @@
give them <a
href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
access to their surveillance cameras</a> so that they can look through
-them at any and all times. This is already dangerous, but it is going
-to get worse. Advances in face recognition may bring the day when
-suspected journalists can be tracked on the street all the time to see
-who they talk with.</p>
+them at any and all times. This is already dangerous, but it
+is going to get worse. Advances in <span class="removed"><del><strong>face
recognition</strong></del></span> <span class="inserted"><ins><em><a
href="#facial-recognition">facial
+recognition</a></em></ins></span> may bring the day when suspected
journalists can
+be tracked on the street all the time to see who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
themselves, which means <a
@@ -371,13 +370,13 @@
occasionally, but the systematic accumulation of such data on the
Internet must be limited.</p>
-<span class="inserted"><ins><em><div class="infobox" style="margin-top:
1.5em"></em></ins></span>
+<div class="infobox" style="margin-top: 1.5em">
<p id="privatespace">(*) I assume here that the security
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
</div>
-<span class="inserted"><ins><em></div>
+</div>
<div class="announcement comment" role="complementary">
<hr class="no-display" />
@@ -386,9 +385,9 @@
radical proposal to keep your personal data safe</a>,” published in
<cite>The Guardian</cite> in April 2018.</p>
<hr class="no-display" />
-</div></em></ins></span>
+</div>
-<h3 <span class="removed"><del><strong>id="digitalcash"
class="subheader">Remedy</strong></del></span> <span
class="inserted"><ins><em>id="digitalcash">Remedy</em></ins></span> for
Internet Commerce Surveillance</h3>
+<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
<div class="columns">
<p>Most data collection comes from people's own digital activities.
@@ -399,10 +398,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a <span
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2">gotten</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten</em></ins></span>
+has <a
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</em></ins></span>
+and <a
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it. Some companies are praised
@@ -432,17 +431,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want to
help the payee dodge
-taxes.) <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</em></ins></span>
+taxes.) <a
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a <span
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</em></ins></span>
+for <a
href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a <span
class="removed"><del><strong>href="http://taler.net/">GNU</strong></del></span>
<span
class="inserted"><ins><em>href="https://taler.net/">GNU</em></ins></span>
Taler</a>. Now we need
+this is called <a href="https://taler.net/">GNU Taler</a>. Now we
need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<p>Another possible method for anonymous payments would
-use <a <span
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html">prepaid</em></ins></span>
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
phone cards</a>. It is less convenient, but very easy to
implement.</p>
@@ -453,9 +452,7 @@
knows nothing about you.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">Remedy</strong></del></span>
-
-<span class="inserted"><ins><em><h3>Remedy</em></ins></span> for Travel
Surveillance</h3>
+<h3 id="travel">Remedy for Travel Surveillance</h3>
<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
@@ -471,7 +468,7 @@
searching for a list of court-ordered license-numbers.</p>
<p>The U.S. “no-fly” list must be abolished because it is
-<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
+<a <span
class="removed"><del><strong>href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional">punishment</em></ins></span>
without trial</a>.</p>
<p>It is acceptable to have a list of people whose person and luggage
@@ -515,20 +512,18 @@
borrower's identity immediately.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">Remedy</strong></del></span>
-
-<span class="inserted"><ins><em><h3>Remedy</em></ins></span> for
Communications Dossiers</h3>
+<h3 id="communications">Remedy for Communications Dossiers</h3>
<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a <span
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</em></ins></span>
+also <a
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</em></ins></span>
+even <a
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
the user's body activities</a>. It appears that
-the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
+the <a <span
class="removed"><del><strong>href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations">NSA</em></ins></span>
collects cell phone location data</a> in bulk.</p>
<p>Unmonitored communication is impossible where systems create such
@@ -539,7 +534,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</em></ins></span>
does
+the <a
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -559,9 +554,7 @@
would be hard to determine that you had sent mail to me.</p>
</div>
-<span class="removed"><del><strong><h3
class="subheader">But</strong></del></span>
-
-<span class="inserted"><ins><em><h3>But</em></ins></span> Some
Surveillance Is Necessary</h3>
+<h3 id="necessary">But Some Surveillance Is Necessary</h3>
<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
@@ -582,7 +575,7 @@
photographers</a>.)
One city in California that required police to wear video cameras all
the time
-found <a <span
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</em></ins></span>
+found <a
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
@@ -590,7 +583,7 @@
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">DRM</a>)</strong></del></span>
<span
class="inserted"><ins><em>href="https://DefectiveByDesign.org">DRM</a>)</em></ins></span>
or political
+(e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or
political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -599,7 +592,8 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
</div>
-<div class="column-limit"></div>
+
+<h3 id="conclusion">Conclusion</h3>
<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
@@ -621,7 +615,6 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
-<span class="removed"><del><strong></div></strong></del></span>
<div class="column-limit"></div>
<h3 class="footnote">End Note</h3>
@@ -630,21 +623,28 @@
has been referred to as <a
href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient
privacy</a>.</li>
+
+<span class="inserted"><ins><em><li id="facial-recognition">In the
2020s, facial recognition deepens
+the danger of surveillance cameras. China already identifies people
+by their faces so as to punish them,
+and <a
href="https://www.theguardian.com/global-development/2022/sep/05/iran-government-facial-recognition-technology-hijab-law-crackdown">Iran
+is planning to use it to punish women who violate religion-imposed
+dress codes</a>.</li></em></ins></span>
</ol>
-<span class="inserted"><ins><em><div class="infobox extra"
role="complementary">
+<div class="infobox extra" role="complementary">
<hr />
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
<p>A version of this article was first published in
<cite>Wired</cite> in October 2013.</p>
</div>
-</div></em></ins></span>
+</div>
</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div <span
class="removed"><del><strong>id="footer"></strong></del></span> <span
class="inserted"><ins><em>id="footer" role="contentinfo"></em></ins></span>
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -662,13 +662,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations of
+ <p>For information on coordinating and contributing translations
of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations
+README</a> for information on coordinating and contributing translations
of this article.</p>
</div>
@@ -689,7 +689,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2015, 2016, 2017,
2018, 2019, 2020</strong></del></span> <span
class="inserted"><ins><em>2013-2019, 2021</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2013-2019, 2021, 2022 Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -699,7 +699,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/01 05:32:42 $
+$Date: 2022/11/05 20:29:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.sq-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/surveillance-vs-democracy.sq-diff.html 8 May 2019 07:29:21 -0000
1.7
+++ po/surveillance-vs-democracy.sq-diff.html 5 Nov 2022 20:29:40 -0000
1.8
@@ -11,35 +11,36 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.86</em></ins></span> -->
+<!-- Parent-Version: 1.97 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="TAGS" value="essays cultural evils" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
#intro { margin: 2em auto 1.5em; }
+.toc { width: auto; }
.pict.wide { width: 23em; }
-.pict p { margin-top: .2em; }
+.pict p { margin-bottom: 0; }
+#conclusion { visibility: hidden; margin-top: 0; }
@media (min-width: 55em) {
#intro { max-width: 55em; }
- .pict.wide { margin-bottom: 0; }
+ .toc { max-width: 51em; }
+ .toc li { display: inline-block; width: 90%; }
}
---></style>
+-->
+</style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist"
-->
<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.html" -->
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div class="article">
<h2 class="center">How Much Surveillance Can Democracy
Withstand?</h2>
-<p class="byline center">by <a
href="http://www.stallman.org/">Richard Stallman</a></p>
-
-<!-- rms: I deleted the link because of Wired's announced
- anti-ad-block system -->
-<blockquote class="center"><p>A version of this article was first
published in
-<cite>Wired</cite> in October 2013.<br />
-Also consider reading “<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
-radical proposal to keep your personal data safe</a>,” published in
-<cite>The Guardian</cite> in
April 2018.</p></blockquote>
-
-<div class="article">
+<address class="byline center">by
+<a href="https://www.stallman.org/">Richard
Stallman</a></address>
<div id="intro">
<div class="pict wide">
@@ -50,7 +51,8 @@
<p>Thanks to Edward Snowden's disclosures, we know that the current
level of general surveillance in society is incompatible with human
-rights. The repeated harassment and prosecution of dissidents,
+rights. Expecting every action to be noted down <a
href="https://www.socialcooling.com/">makes people censor and
+limit themselves</a>. The repeated harassment and prosecution of
dissidents,
sources, and journalists in the US and elsewhere provides
confirmation. We need to reduce the level of general surveillance,
but how far? Where exactly is the
@@ -59,30 +61,35 @@
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
</div>
+
<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
-us what the state is doing</a>. However, today's surveillance
-intimidates potential whistleblowers, which means it is too much. To
-recover our democratic control over the state, we must reduce
-surveillance to the point where whistleblowers know they are safe.</p>
+us what the state is doing</a>. (We were reminded of this in 2019 as
+various whistleblowers gave the public increments
+of <a
href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy">information
+about Trump's attempt to shake down the president of Ukraine</a>.)
+However, today's surveillance intimidates potential whistleblowers,
+which means it is too much. To recover our democratic control over
+the state, we must reduce surveillance to the point where
+whistleblowers know they are safe.</p>
<p>Using free/libre
software, <a href="/philosophy/free-software-even-more-important.html">as
-I've advocated for 30 years</a>, is the first step in taking control
+I've advocated since 1983</a>, is the first step in taking control
of our digital lives, and that includes preventing surveillance. We
can't trust nonfree software; the NSA
<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+even <a
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -91,7 +98,26 @@
or her. We need to go further.</p>
</div>
-<h3 class="subheader" style="clear: both">The Upper Limit on
Surveillance in a Democracy</h3>
+<div class="toc" style="clear: both">
+<hr class="no-display" />
+<h3 class="no-display">Table of contents</h3>
+<ul class="columns">
+ <li><a href="#upperlimit">The Upper Limit on Surveillance in a
Democracy</a></li>
+ <li><a href="#willbemisused">Information, Once Collected, Will Be
Misused</a></li>
+ <li><a href="#technical">Robust Protection for Privacy Must Be
Technical</a></li>
+ <li><a href="#commonsense">First, Don't Be
Foolish</a></li>
+ <li><a href="#privacybydesign">We Must Design Every System for
Privacy</a></li>
+ <li><a href="#dispersal">Remedy for Collecting Data: Leaving It
Dispersed</a></li>
+ <li><a href="#digitalcash">Remedy for Internet Commerce
Surveillance</a></li>
+ <li><a href="#travel">Remedy for Travel
Surveillance</a></li>
+ <li><a href="#communications">Remedy for Communications
Dossiers</a></li>
+ <li><a href="#necessary">But Some Surveillance Is
Necessary</a></li>
+ <li><a href="#conclusion">Conclusion</a></li>
+</ul>
+<hr class="no-display" />
+</div>
+
+<h3 id="upperlimit">The Upper Limit on Surveillance in a
Democracy</h3>
<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -102,38 +128,38 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+the <a
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+Sometimes <a
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+and <a
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
</div>
-<h3 class="subheader">Information, Once Collected, Will Be
Misused</h3>
+<h3 id="willbemisused">Information, Once Collected, Will Be
Misused</h3>
<div class="columns">
-<p id="willbemisused">When people recognize
+<p>When people recognize
that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+was <a
href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -149,7 +175,7 @@
<p>In addition, the state's surveillance staff will misuse the data
for personal reasons. Some NSA
-agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+agents <a
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -162,10 +188,10 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+to <a
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
-of <a <span
class="removed"><del><strong>href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases">many</strong></del></span>
<span
class="inserted"><ins><em>href="https://apnews.com/699236946e3140659fff8a2362e16f43">many</em></ins></span>
+of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
other instances in the US</a>.
</p>
@@ -173,22 +199,35 @@
this is prohibited. Once the data has been accumulated and the state
has the possibility of access to it, it can misuse that data in
dreadful ways, as shown by examples
-from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
+from <a <span
class="removed"><del><strong>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20220619175619/http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,</em></ins></span>
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
-recently <a
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
+recently <a
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
</p>
+<p>You may feel your government won't use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change. As of 2021, many ostensibly democratic states
+are <a
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan">ruled
+by people with authoritarian leanings</a>, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US. The UK is working on a law
+to <a
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom">repress
+nonviolent protests that might be described as causing “serious
+disruption.”</a> The US could become permanently repressive in
+2025, for all we know.
+</p>
+
<p>Personal data collected by the state is also likely to be obtained
by outside crackers that break the security of the servers, even
-by <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
+by <a
href="https://www.techdirt.com/2015/06/12/second-opm-hack-revealed-even-worse-than-first/">crackers
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+to <a
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -197,12 +236,12 @@
that is easily accessible to the state.</p>
</div>
-<h3 class="subheader">Robust Protection for Privacy Must Be
Technical</h3>
+<h3 id="technical">Robust Protection for Privacy Must Be
Technical</h3>
<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
-href="https://en.necessaryandproportionate.org/text">prevent the
+href="https://necessaryandproportionate.org">prevent the
abuses of massive surveillance</a>. These principles include,
crucially, explicit legal protection for whistleblowers; as a
consequence, they would be adequate for protecting democratic
@@ -212,7 +251,7 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -229,7 +268,7 @@
ignoring this law, the idea would hardly make sense.</p>
</div>
-<h3 class="subheader">First, Don't Be Foolish</h3>
+<h3 id="commonsense">First, Don't Be Foolish</h3>
<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
@@ -255,7 +294,7 @@
pertinent data to the company's server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+too. <a
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -274,7 +313,7 @@
suspects.</p>
</div>
-<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<h3 id="privacybydesign">We Must Design Every System for
Privacy</h3>
<div class="columns">
<p>If we don't want a total surveillance society, we must consider
@@ -293,15 +332,16 @@
any desired period of time, with the average usage pattern for that
period. The same benefit, with no surveillance!</p>
-<p>We need to design such privacy into all our digital systems.</p>
+<p>We need to design such privacy into all our digital
+systems [<a href="#ambientprivacy">1</a>].</p>
</div>
-<h3 class="subheader">Remedy for Collecting Data: Leaving It
Dispersed</h3>
+<h3 id="dispersal">Remedy for Collecting Data: Leaving It
Dispersed</h3>
<div class="columns">
<p>One way to make monitoring safe for privacy is
-to <a name="dispersal">keep the data dispersed and inconvenient to
-access</a>. Old-fashioned security cameras were no threat to
privacy(<a href="#privatespace">*</a>).
+to keep the data dispersed and inconvenient to
+access. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
The recording was stored on the premises, and kept for a few weeks at
most. Because of the inconvenience of accessing these recordings, it
was never done massively; they were accessed only in the places where
@@ -314,15 +354,14 @@
give them <a
href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
access to their surveillance cameras</a> so that they can look through
-them at any and all times. This is already dangerous, but it is going
-to get worse. Advances in face recognition may bring the day when
-suspected journalists can be tracked on the street all the time to see
-who they talk with.</p>
+them at any and all times. This is already dangerous, but it
+is going to get worse. Advances in <span class="removed"><del><strong>face
recognition</strong></del></span> <span class="inserted"><ins><em><a
href="#facial-recognition">facial
+recognition</a></em></ins></span> may bring the day when suspected
journalists can
+be tracked on the street all the time to see who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
themselves, which means <a
-<span
class="removed"><del><strong>href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html">anyone</strong></del></span>
-<span
class="inserted"><ins><em>href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html">anyone</em></ins></span>
+href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html">anyone
can watch what those cameras see</a>. This makes internet-connected
cameras a major threat to security as well as privacy. For privacy's
sake, we should ban the use of Internet-connected cameras aimed where
@@ -331,13 +370,24 @@
occasionally, but the systematic accumulation of such data on the
Internet must be limited.</p>
-<p><a name="privatespace"><b>*</b></a>I assume
here that the security
+<div class="infobox" style="margin-top: 1.5em">
+<p id="privatespace">(*) I assume here that the security
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
</div>
+</div>
-<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="announcement comment" role="complementary">
+<hr class="no-display" />
+<p>Also consider reading “<a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
+radical proposal to keep your personal data safe</a>,” published in
+<cite>The Guardian</cite> in April 2018.</p>
+<hr class="no-display" />
+</div>
+
+<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
<div class="columns">
<p>Most data collection comes from people's own digital activities.
@@ -348,10 +398,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+has <a
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+and <a
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it. Some companies are praised
@@ -381,17 +431,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want to
help the payee dodge
-taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+taxes.) <a
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+for <a
href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/">GNU Taler</a>. Now we
need
+this is called <a href="https://taler.net/">GNU Taler</a>. Now we
need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<p>Another possible method for anonymous payments would
-use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
phone cards</a>. It is less convenient, but very easy to
implement.</p>
@@ -402,13 +452,13 @@
knows nothing about you.</p>
</div>
-<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<h3 id="travel">Remedy for Travel Surveillance</h3>
<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance). License-plate recognition systems
-<span class="inserted"><ins><em><a
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"></em></ins></span>
-recognize all <span class="inserted"><ins><em>cars'</em></ins></span> license
<span class="removed"><del><strong>plates,</strong></del></span> <span
class="inserted"><ins><em>plates</a>,</em></ins></span> and
+<a
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated">
+recognize all cars' license plates</a>, and
the <a
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
can be kept indefinitely</a>; they should be required by law to notice
and record only those license numbers that are on a list of cars
@@ -418,7 +468,7 @@
searching for a list of court-ordered license-numbers.</p>
<p>The U.S. “no-fly” list must be abolished because it is
-<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
+<a <span
class="removed"><del><strong>href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional">punishment</em></ins></span>
without trial</a>.</p>
<p>It is acceptable to have a list of people whose person and luggage
@@ -462,18 +512,18 @@
borrower's identity immediately.</p>
</div>
-<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<h3 id="communications">Remedy for Communications Dossiers</h3>
<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+also <a
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+even <a
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
the user's body activities</a>. It appears that
-the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
+the <a <span
class="removed"><del><strong>href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations">NSA</em></ins></span>
collects cell phone location data</a> in bulk.</p>
<p>Unmonitored communication is impossible where systems create such
@@ -484,7 +534,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+the <a
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -504,7 +554,7 @@
would be hard to determine that you had sent mail to me.</p>
</div>
-<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<h3 id="necessary">But Some Surveillance Is Necessary</h3>
<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
@@ -521,18 +571,19 @@
police have their own jargon term for perjury,
“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do it so frequently, particularly about protesters
-and <a
href="https://www.themaven.net/pinacnews/">photographers</a>.)
+and <a
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/">
+photographers</a>.)
One city in California that required police to wear video cameras all
the time
-found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+found <a
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or
political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -541,7 +592,8 @@
<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
</div>
-<div class="column-limit"></div>
+
+<h3 id="conclusion">Conclusion</h3>
<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
@@ -563,12 +615,36 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
+<div class="column-limit"></div>
+
+<h3 class="footnote">End Note</h3>
+<ol>
+<li id="ambientprivacy">The condition of <em>not being
monitored</em>
+has been referred to as <a
+href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient
+privacy</a>.</li>
+
+<span class="inserted"><ins><em><li id="facial-recognition">In the
2020s, facial recognition deepens
+the danger of surveillance cameras. China already identifies people
+by their faces so as to punish them,
+and <a
href="https://www.theguardian.com/global-development/2022/sep/05/iran-government-facial-recognition-technology-hijab-law-crackdown">Iran
+is planning to use it to punish women who violate religion-imposed
+dress codes</a>.</li></em></ins></span>
+</ol>
+
+<div class="infobox extra" role="complementary">
+<hr />
+<!-- rms: I deleted the link because of Wired's announced
+ anti-ad-block system -->
+<p>A version of this article was first published in
+<cite>Wired</cite> in October 2013.</p>
+</div>
</div>
</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -586,13 +662,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and contributing translations
of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
of this article.</p>
</div>
@@ -613,7 +689,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2013-2019, 2021, 2022 Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -623,12 +699,11 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 07:29:21 $
+$Date: 2022/11/05 20:29:40 $
<!-- timestamp end -->
</p>
</div>
-<span class="removed"><del><strong></div></strong></del></span>
-<span class="inserted"><ins><em></div><!-- for class="inner", starts
in the banner include --></em></ins></span>
+</div><!-- for class="inner", starts in the banner include -->
</body>
</html>
</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy surveillance-vs-democracy.ja.htm...,
GNUN <=