EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.04.10

GNU Telephony Addresses President Obama

Posted in Free/Libre Software at 3:26 pm by Dr. Roy Schestowitz

“They made us many promises, more than I can remember, but they kept only one; they promised to take our land, and they did” - Ma¿píya Lúta

Portrait of George Washington

Summary: Letter to the president from David Alexander Sugar, GNU Telephony Project

Attention: The President and the people of the United States of America

Why civil liberties matter – an open letter to the Obama administration

IN a recent Rolling Stone magazine interview, you spoke of this administration’s commitment to civil rights while simultaneously insulting the intelligence of those who are concerned with civil liberties. It is this administrations actual record on civil liberties, a record that is in fact worse than the preceding one, that is both clearly inexcusable and dangerously irresponsible.

“Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt.”The civil rights movement that you spoke about, and as we recognize today, would not have been possible without civil liberties. While laws were clearly misused to try suppressing that movement, those efforts failed largely because the United States at the time was institutionally committed to essential core legal principles that included privacy, the freedom of speech and association, due process, and the presumption of innocence. Although each of these fundamental legal principles had been challenged on a reversible basis by the Bush administration, it is your justice department that has worked tirelessly to make those temporary transgressions become a permanent and enduring part of the institutional law of the United States.

Perhaps most people think of your administration’s more dramatic statements on civil liberties made like asserting the right to target for assassination American citizens abroad on the whim and statement of a government official alone. This is not the most important, and certainly not by far the only, threat to civil liberties today your administration has engaged in. Other important actions include efforts by the United States Department of Justice to explicitly use state secrets to dismiss lawsuits of those seeking redress from the unlawful practice of rendition and torture at the hands of private contractors, and to establish state secrets as an institutional protection for those carrying out unlawful actions on behalf of the United States government in general, including telecom companies that had facilitated widespread illegal domestic intercept in the past.

“Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse.”Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt. One clear example of this is the assertion of the right of the United States government to automatically blacklist websites merely “accused” of copyright infringement in some manner, with neither court oversight nor due process. Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse. As these examples illustrates, in a society based on presumption of guilt, one can be punished for crimes that have not only not been proven, but that do not even have evidence presented that can be challenged. It is very clear to see, and history proves, how such tools can be misused to silence or censor independent and critical sources of speech on the public Internet.

“Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software.”Equally troubling are the recent raids on the homes of domestic dissidents and peace activists. As already reported by your own justice department, many of these investigations of domestic dissidents were improperly initiated without any actual evidence whatsoever, and often using knowingly false statements. Yet, this fact did not stop the FBI from engaging in “terrorism raids” on peace activists across the country or asserting “state secret” privilege when challenged afterward to actually justify these actions.

Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software. This effort wishes to both expand upon and fully institutionalize the illegal use of domestic surveillance as practiced by the Bush administration.

Back in the Clinton years, a law was created called CALEA (the Communications Assistance for Law Enforcement Act). This law required that all telephone systems sold and deployed by commercial carriers in the United States include backdoors to enable government intercept of voice communications. While the United States government and local police only engage in about 1000 lawfully initiated wiretap investigations nationwide in any given year, this law mandated the capability to simultaneously spy on millions of people at once be created. At the time it was “promised” that such widespread abuse would”never” actually happen. Yet we have learned that as early as the spring of 2001 the Bush administration had already used presidential directives authorizing private telecom carriers to use CALEA backdoors to engage in large scale domestic surveillance, presumably, given the date, entirely for domestic political purposes. This administration not only refuses to repudiate these past secret and illegal acts, but both defends and explicitly wishes to re-make into fully institutionally legal ones.

“Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.”When we speak of introducing backdoors into communication systems, such back-doors rarely remain secret and often present themselves to abuse not only by national governments, but also by private corporations and even individuals. Such mandates do not make a society more secure, but in fact less. Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.

This is a very real danger, one that can be lethal. Whether we speak of a compromised airline alarm system that resulted in an plane crash in Spain, a battleship rendered dead in the water, or an alarm system failing on an oil rig in part contributing to a catastrophic oil spill in the Gulf of Mexico, innocent people are put to great risk by enactment of this policy. While these accidents resulted in part from the shoddy workmanship of an already poorly designed operating system being used in inappropriate places, imagine the further possibilities for deliberate mischief by exploitation of any such guaranteed and mandated backdoor facility.

“Privacy is ultimately about liberty while surveillance is always about control.”In the United States the 4th amendment did not come about simply because it was impractical to directly spy on everyone on such a large scale. Nor does it end simply because it may now be technically feasible to do so. Communication privacy furthermore is essential to the normal functioning of free societies, whether speaking of whistle-blowers, journalists who have to protect their sources, human rights and peace activists engaging in legitimate political dissent, workers engaged in union organizing, or lawyers who must protect the confidentiality of their privileged communications with clients. Privacy is ultimately about liberty while surveillance is always about control.

To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public. This software was licensed as free (as in freedom) software explicitly to facilitate people to verify that no backdoors are present and to enable them to legally modify and redistribute the software to others as they see fit. If a new law is created that tries to legally mandate the inclusion of backdoors in such software, we will openly refuse to comply.

“To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public.”What is most troubling of all about the expansion of illegal domestic surveillance is how this will reshape the institutional nature of society. To fully appreciate the effect of such surveillance on human societies, imagine being among several hundred million people who wake up each day having to prove they are not “terrorists”, however that may be whimsically defined at the moment, compounded by the impossible task of doing so without being accorded the right to face their accusers in summary ‘proceedings’ or even to be informed of the alleged ‘evidence’ produced by whatever arbitrary, secretive methods such agents of repression use, and where their prosecution is carried out under the shroud of “state secrets” that all such police states use to abuse their own citizens. Such is a society whose foundation is built on the premise of everyone being guilty until proven innocent and where due process does not exist; a society where the ends justifies the means. It is the imposition of such a illegitimate society that we choose to openly oppose, and to do so in this manner.

Thank you for your time and attention,

David Alexander Sugar
Chief Facilitator
GNU Telephony Project

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. There is No 'New Microsoft': Under Nadella, Patent Extortion Against Linux/Android Carries on

    Kyocera is again being targeted by Microsoft, using patent aggression, with a secret settlement being reached whose negative impact on Android remains to be seen



  2. Patent Propaganda, Glamourisation, and Erosion of Citizens' Rights in the Process

    An overview of recent coverage about patents, demonstrative of inherent bias in the world of patent practitioners and the journalists whom they misinform



  3. Corporate Media Should Stop Grooming Black Duck by Calling it 'Open Source' and Repeating Its Lies

    Black Duck uses gullible (or easy to manipulate) journalists to spread its marketing talking points, which grossly overstate risks of using Free software



  4. Links 6/7/2015: Linux 4.2-rc1, YotaPhone Picks Sailfish OS

    Links for the day



  5. Microsoft Windows Unsafe at Any Speed, by Design

    More timely reminders that Windows is simply not designed to be secure, irrespective of version, status of patching, etc.



  6. After Moonlight Dies and Even Microsoft Abandons Silverlight, the Abusive Monopolist Keeps Pushing for Other Microsoft Lock-in, Injecting OOXML Traps Into Free Software (Moodle)

    Despite a long history of Microsoft formats being proven guarantee of digital obsolescence, Moodle allows itself to become Microsoft prey and a Trojan horse for OOXML in classrooms (for children)



  7. Links 4/7/2015: Mostly (Geo)Political Catchup

    Links for the day



  8. Links 3/7/2015: KDE Applications 15.04.3, Ubuntu-Flavored Compute Stick

    Links for the day



  9. Patent Lawyers and Their Firms, Still Desperate to Protect the Status Quo, Manipulate the Media

    Patent lawyers are besieged by gradual tightening of patent scope and recklessly fight back (e.g. by saturating the media) to secure their revenue sources, derived from (and at the expense of) actual scientists and true market producers



  10. Amid Controversy, Political Scrutiny and Increased Media Pressure Željko Topić and Benoît Battistelli Allegedly Cancel Today's Trip to Zagreb (Croatia) Where Topić Faces Many Criminal Charges

    The Croatian press comments on the recent declaration from the Council of Europe and Topić's not-so-sterling status in his home country, where he is wanted for alleged crimes



  11. Microsoft Gradually Embraces, Extends, Extinguishes Linux Foundation as a Foundation of GNU/Linux

    By liaising with (or hijacking) existing members of the Linux Foundation, as well as by paying the Linux Foundation, Microsoft turns the Linux Foundation into somewhat of a Windows advocacy group



  12. Microsoft India Still Lobbies and Lies About Free Software in Order to Knock Down Policy That Favours Free Software

    Microsoft continues to bully Indian politicians who merely 'dare' to prefer software that India can modify, maintain, extend, audit, etc.



  13. Patent Lawyers and Corporate Media Nervous About New Patents Barrier/Reality (Less Patents on Software and Business Methods)

    The rich and the powerful, as well as their lawyers (whose job is to protect their money and power by means of government-enforced monopoly), carry on whining after the Alice case, in which many abstract patents were essentially ruled -- by extension -- invalid



  14. Translation of Pierre-Yves Le Borgn' Speech Against EPO Management and New Parliamentarian Interventions

    More political fire targeting the EPO's management, adding up to over 100 parliamentarians by now



  15. Links 2/7/2015: KDE Plasma 5.3.2, antiX 15

    Links for the day



  16. Links 1/7/2015: OpenDaylight Lithium, OpenMandriva Lx 2014.2

    Links for the day



  17. Munich Press, Münchner Merkur, Slams the Munich-based EPO

    Pressure on Benoît Battistelli to leave (or be fired) grows as the cronies whom he filled his office with have become a huge public embarrassment to the decades-old European Patent Office



  18. The Shameless Campaign to Paint/Portray Free Software as Inherently Insecure, Using Brands, Logos, and Excessive, Selective Press Coverage

    Some more FUD from firms such as Sonatype, which hope to make money by making people scared of Free/libre software



  19. National Insecurity and Blackmail, Courtesy of Microsoft

    British members of parliament (MPs) outsourced their communication to the number one PRISM company and they are paying the price for it; The US Navy's systems continue to be unbelievably insecure (Windows XP), despite access to the world's biggest nuclear arsenal



  20. Microsoft Keeps Shrinking

    As the era of shrink-wrapped software comes to an end so does Microsoft, whose effort to become a 'cloud' company with online operations has been miserable at best



  21. They 'R' Coming: More Microsoft Money for the Linux Foundation

    The problem with having Microsoft in a Linux Foundation initiative, the R Consortium



  22. Speculations About the EPO's Possible Role in DDOS Attacks

    Readers' views on who might be behind the attacks on this site amid confirmation that it's on the 'targets' list of the EPO



  23. Links 30/6/2015: Linux Mint 17.2, OpenMandriva

    Links for the day



  24. Techrights Confirmed as a Target of EPO Surveillance, With Help From Control Risks Group (CRG)

    Unveiling the cloak of secrecy from long-term surveillance by the European Patent Office (EPO) and a London-based mercenary it hired, bypassing the law



  25. Google's Fight to Keep APIs Free is Lost, Let's Hope Google Continues Fighting

    SCOTUS refuses to rule that APIs cannot be considered copyright-'protected', despite common sense and despite Java (which the case is about) being Free/libre software



  26. Patent Trolls in the Post-Alice World

    A round-up of news about patent trolls in the United States, some of whom are are doing well and some of them not as well



  27. DDOS Attacks Against Techrights

    Information about some of the most recent DDOS attacks against this Web site and the steps to be taken next



  28. The Patent System Not What it Used to be, Large Corporations and Patent Lawyers the Principal Beneficiaries

    A look at some recent patent stories and what can be deduced from them, based on statistics and trends



  29. After Intervention by the Council of Europe Comes a Detailed Summary of the Situation in the European Patent Office (EPO)





  30. IRC Proceedings: May 31st - June 27th, 2015

    Many IRC logs


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts