EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.04.10

GNU Telephony Addresses President Obama

Posted in Free/Libre Software at 3:26 pm by Dr. Roy Schestowitz

“They made us many promises, more than I can remember, but they kept only one; they promised to take our land, and they did” - Ma¿píya Lúta

Portrait of George Washington

Summary: Letter to the president from David Alexander Sugar, GNU Telephony Project

Attention: The President and the people of the United States of America

Why civil liberties matter – an open letter to the Obama administration

IN a recent Rolling Stone magazine interview, you spoke of this administration’s commitment to civil rights while simultaneously insulting the intelligence of those who are concerned with civil liberties. It is this administrations actual record on civil liberties, a record that is in fact worse than the preceding one, that is both clearly inexcusable and dangerously irresponsible.

“Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt.”The civil rights movement that you spoke about, and as we recognize today, would not have been possible without civil liberties. While laws were clearly misused to try suppressing that movement, those efforts failed largely because the United States at the time was institutionally committed to essential core legal principles that included privacy, the freedom of speech and association, due process, and the presumption of innocence. Although each of these fundamental legal principles had been challenged on a reversible basis by the Bush administration, it is your justice department that has worked tirelessly to make those temporary transgressions become a permanent and enduring part of the institutional law of the United States.

Perhaps most people think of your administration’s more dramatic statements on civil liberties made like asserting the right to target for assassination American citizens abroad on the whim and statement of a government official alone. This is not the most important, and certainly not by far the only, threat to civil liberties today your administration has engaged in. Other important actions include efforts by the United States Department of Justice to explicitly use state secrets to dismiss lawsuits of those seeking redress from the unlawful practice of rendition and torture at the hands of private contractors, and to establish state secrets as an institutional protection for those carrying out unlawful actions on behalf of the United States government in general, including telecom companies that had facilitated widespread illegal domestic intercept in the past.

“Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse.”Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt. One clear example of this is the assertion of the right of the United States government to automatically blacklist websites merely “accused” of copyright infringement in some manner, with neither court oversight nor due process. Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse. As these examples illustrates, in a society based on presumption of guilt, one can be punished for crimes that have not only not been proven, but that do not even have evidence presented that can be challenged. It is very clear to see, and history proves, how such tools can be misused to silence or censor independent and critical sources of speech on the public Internet.

“Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software.”Equally troubling are the recent raids on the homes of domestic dissidents and peace activists. As already reported by your own justice department, many of these investigations of domestic dissidents were improperly initiated without any actual evidence whatsoever, and often using knowingly false statements. Yet, this fact did not stop the FBI from engaging in “terrorism raids” on peace activists across the country or asserting “state secret” privilege when challenged afterward to actually justify these actions.

Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software. This effort wishes to both expand upon and fully institutionalize the illegal use of domestic surveillance as practiced by the Bush administration.

Back in the Clinton years, a law was created called CALEA (the Communications Assistance for Law Enforcement Act). This law required that all telephone systems sold and deployed by commercial carriers in the United States include backdoors to enable government intercept of voice communications. While the United States government and local police only engage in about 1000 lawfully initiated wiretap investigations nationwide in any given year, this law mandated the capability to simultaneously spy on millions of people at once be created. At the time it was “promised” that such widespread abuse would”never” actually happen. Yet we have learned that as early as the spring of 2001 the Bush administration had already used presidential directives authorizing private telecom carriers to use CALEA backdoors to engage in large scale domestic surveillance, presumably, given the date, entirely for domestic political purposes. This administration not only refuses to repudiate these past secret and illegal acts, but both defends and explicitly wishes to re-make into fully institutionally legal ones.

“Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.”When we speak of introducing backdoors into communication systems, such back-doors rarely remain secret and often present themselves to abuse not only by national governments, but also by private corporations and even individuals. Such mandates do not make a society more secure, but in fact less. Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.

This is a very real danger, one that can be lethal. Whether we speak of a compromised airline alarm system that resulted in an plane crash in Spain, a battleship rendered dead in the water, or an alarm system failing on an oil rig in part contributing to a catastrophic oil spill in the Gulf of Mexico, innocent people are put to great risk by enactment of this policy. While these accidents resulted in part from the shoddy workmanship of an already poorly designed operating system being used in inappropriate places, imagine the further possibilities for deliberate mischief by exploitation of any such guaranteed and mandated backdoor facility.

“Privacy is ultimately about liberty while surveillance is always about control.”In the United States the 4th amendment did not come about simply because it was impractical to directly spy on everyone on such a large scale. Nor does it end simply because it may now be technically feasible to do so. Communication privacy furthermore is essential to the normal functioning of free societies, whether speaking of whistle-blowers, journalists who have to protect their sources, human rights and peace activists engaging in legitimate political dissent, workers engaged in union organizing, or lawyers who must protect the confidentiality of their privileged communications with clients. Privacy is ultimately about liberty while surveillance is always about control.

To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public. This software was licensed as free (as in freedom) software explicitly to facilitate people to verify that no backdoors are present and to enable them to legally modify and redistribute the software to others as they see fit. If a new law is created that tries to legally mandate the inclusion of backdoors in such software, we will openly refuse to comply.

“To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public.”What is most troubling of all about the expansion of illegal domestic surveillance is how this will reshape the institutional nature of society. To fully appreciate the effect of such surveillance on human societies, imagine being among several hundred million people who wake up each day having to prove they are not “terrorists”, however that may be whimsically defined at the moment, compounded by the impossible task of doing so without being accorded the right to face their accusers in summary ‘proceedings’ or even to be informed of the alleged ‘evidence’ produced by whatever arbitrary, secretive methods such agents of repression use, and where their prosecution is carried out under the shroud of “state secrets” that all such police states use to abuse their own citizens. Such is a society whose foundation is built on the premise of everyone being guilty until proven innocent and where due process does not exist; a society where the ends justifies the means. It is the imposition of such a illegitimate society that we choose to openly oppose, and to do so in this manner.

Thank you for your time and attention,

David Alexander Sugar
Chief Facilitator
GNU Telephony Project

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. The EFF Back to Tackling Software Patents, Not Just Patent Trolls

    Electronic Frontier Foundation lawyers start targeting large companies that exploit patents for intimidation and extortion, not just patent trolling



  2. Microsoft Wants to Devour the Competition (Linux), Devour People's Data

    Refuting the "new Microsoft" propaganda and some ludicrous concept that Microsoft is now "playing nice"



  3. Benoît Battistelli Thinks 'President' is Above the Law, Decides to Ignore the Court's Ruling

    Staff of the EPO is given yet more reasons to protest tomorrow at the British Consulate, for the so-called 'President' of the EPO reminds everyone of the very raison d'être for the protest -- a vain disregard for the rule of law



  4. Links 24/2/2015: Xfce 4.12 a Week Away, GNOME 3.16 Previewed

    Links for the day



  5. Links 23/2/2015: Ubuntu Kylin 14.04.2 LTS, Cinnamon 2.6 Previews

    Links for the day



  6. IRC Proceedings: February 8th - February 21st, 2015





  7. The EPO's Sham 'Internal Investigation' of EPO Vice-President Željko Topić's Affairs

    The EPO never investigated the Željko Topić affair, it only pretends to have investigated (one small aspect, i.e. cherry-picking) using a Benoît Battistelli-controlled group



  8. Links 21/2/2015: GNOME 3.15.90, Google Wins Android Lawsuit

    Links for the day



  9. Microsoft AstroTurfing War on GNU/Linux is Still Going On, But Hidden Better, Uses API as Instrument of Lock-in

    The corruptible press continues to describe blatant attacks (Embrace, Extend, Extinguish) against GNU/Linux and Free software as Microsoft 'embracing' Open Source



  10. Lenovo's Superfish Scandal is Spyware on Top of Spyware (Microsoft Windows), the Problem is Inherently Proprietary Software

    Shifting focus to the root problem, which is neither Lenovo nor its laptops but the non-free programs installed on hardware



  11. Benoît Battistelli Once Again Threatens EPO Staff That 'Dares' to Protest, Battistelli Exploits Terror Attacks to Pretend to Respect Free Speech

    The European Patent Office (EPO) President, Benoît Battistelli, reportedly started threatening -- as before -- staff that decides to exercise the right to assemble and protest against abuses, including the abuses of President Battistelli himself



  12. Links 20/2/2015: Android Studio v1.1, GDB 7.9

    Links for the day



  13. Links 20/2/2015: Bloomberg Joins Linux Foundation, ClearOS Community 6.6.0

    Links for the day



  14. The Chartered Institute of Patent Attorneys Slams the European Patent Office for Structural Failings

    An important letter which we overlooked while writing yesterday's 4 articles about the European Patent Office (EPO); yet another key stakeholder complains



  15. Links 19/2/2015: Hewlett-Packard on Cumulus Linux, Previews of GNOME 3.16 Beta

    Links for the day



  16. Techrights Under Attack Again, Shortly After Important EPO Articles

    Techrights highlights a pattern that is months old; Site faces availability issues shortly after reports about the European Patent Office and its abuses



  17. EPO Staff Protests Against Benoît Battistelli’s Lowering of Patents Quality (Scope Expansion and Software Patents for Profit)

    A protest in Munich in less than 6 days will target Mr. Sean Dennehey, who has helped Battistelli cover up his abuses and crush legitimate critics, whom he deemed illegal opposition as if the EPO is an authoritarian regime as opposed to a public service which taxpayers are reluctantly (but forcibly) funding



  18. Breaking: European Patent Office Sued by Its Own Staff in The Hague, Must Unblock Staff's Voices

    The crooked management of the European Patent Office (EPO) gets in legal trouble after repeated attempts to cover up abuses and suppress criticism



  19. Željko Topić's History in SIPO Leaves a Legacy of Alleged DZIV Vehicles (Bribes), Authorship Abuses, and Intimidation Against Reporters

    Another deep look at Željko Topić's background in Croatia, preceding his very notorious appointment to the EPO where he now serves as Benoît Battistelli's most controversial attack dog



  20. The Old Obsession With Patent Trolls Continues to Distract From Debate About Software Patenting

    A roundup of recent coverage about monopolies on algorithms in the United States



  21. Links 19/2/2015: 64-bit ARM Linux, Chinese New Year

    Links for the day



  22. Links 18/2/2015: Linux Report, FlightGear 3.4

    Links for the day



  23. EPO Scandals: The Story So Far

    An overview of articles about mischief, misconduct and breach of laws at the EPO



  24. Links 17/2/2015: TripleO, Pivotal

    Links for the day



  25. Links 17/2/2015: SystemD 219, Frugalware 2.0 (Rigel) Released

    Links for the day



  26. Željko Peratović Slammed for Whitewashing Željko Topić After Publishing Important Piece on Behalf of Key Sources

    Response from Ivan Kabalin to Zeljko Peratovic's so-called "apology" which is both mysterious and seemingly inadequate as it does nothing to actually explain what was wrong (if anything)



  27. Benoît Battistelli Has Made Oversight of European Patent Office Absolutely Impossible





  28. Microsoft Already Killed Nokia, Don't Let It Kill Android Players Too

    Microsoft's strategy against Android mirrors the company's evil strategy that derailed MeeGo and Nokia



  29. Intel Continues to Attack Software Freedom Through UEFI

    The Trojan horse that Microsoft uses to cement its monopoly on desktops and laptops (making it hard or impossible to install and run GNU/Linux) is also being misused to block Coreboot



  30. Links 16/2/2015: Netrunner 15, Bridge Linux

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts