EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.04.10

GNU Telephony Addresses President Obama

Posted in Free/Libre Software at 3:26 pm by Dr. Roy Schestowitz

“They made us many promises, more than I can remember, but they kept only one; they promised to take our land, and they did” - Ma¿píya Lúta

Portrait of George Washington

Summary: Letter to the president from David Alexander Sugar, GNU Telephony Project

Attention: The President and the people of the United States of America

Why civil liberties matter – an open letter to the Obama administration

IN a recent Rolling Stone magazine interview, you spoke of this administration’s commitment to civil rights while simultaneously insulting the intelligence of those who are concerned with civil liberties. It is this administrations actual record on civil liberties, a record that is in fact worse than the preceding one, that is both clearly inexcusable and dangerously irresponsible.

“Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt.”The civil rights movement that you spoke about, and as we recognize today, would not have been possible without civil liberties. While laws were clearly misused to try suppressing that movement, those efforts failed largely because the United States at the time was institutionally committed to essential core legal principles that included privacy, the freedom of speech and association, due process, and the presumption of innocence. Although each of these fundamental legal principles had been challenged on a reversible basis by the Bush administration, it is your justice department that has worked tirelessly to make those temporary transgressions become a permanent and enduring part of the institutional law of the United States.

Perhaps most people think of your administration’s more dramatic statements on civil liberties made like asserting the right to target for assassination American citizens abroad on the whim and statement of a government official alone. This is not the most important, and certainly not by far the only, threat to civil liberties today your administration has engaged in. Other important actions include efforts by the United States Department of Justice to explicitly use state secrets to dismiss lawsuits of those seeking redress from the unlawful practice of rendition and torture at the hands of private contractors, and to establish state secrets as an institutional protection for those carrying out unlawful actions on behalf of the United States government in general, including telecom companies that had facilitated widespread illegal domestic intercept in the past.

“Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse.”Other actions by this administration make it explicit it wishes to reverse the institutional practice of presumption of innocence and replace it with presumption of guilt. One clear example of this is the assertion of the right of the United States government to automatically blacklist websites merely “accused” of copyright infringement in some manner, with neither court oversight nor due process. Related to this is the effort to create a new copyright treaty entirely in secret (ACTA) that seeks the ability to punish individuals directly for alleged crimes with no due process recourse. As these examples illustrates, in a society based on presumption of guilt, one can be punished for crimes that have not only not been proven, but that do not even have evidence presented that can be challenged. It is very clear to see, and history proves, how such tools can be misused to silence or censor independent and critical sources of speech on the public Internet.

“Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software.”Equally troubling are the recent raids on the homes of domestic dissidents and peace activists. As already reported by your own justice department, many of these investigations of domestic dissidents were improperly initiated without any actual evidence whatsoever, and often using knowingly false statements. Yet, this fact did not stop the FBI from engaging in “terrorism raids” on peace activists across the country or asserting “state secret” privilege when challenged afterward to actually justify these actions.

Perhaps the most disconcerting departure into a society based on the presumption of guilt is the effort of this administration to seek a new law to mandate that government backdoors exist in all communication services and software. This effort wishes to both expand upon and fully institutionalize the illegal use of domestic surveillance as practiced by the Bush administration.

Back in the Clinton years, a law was created called CALEA (the Communications Assistance for Law Enforcement Act). This law required that all telephone systems sold and deployed by commercial carriers in the United States include backdoors to enable government intercept of voice communications. While the United States government and local police only engage in about 1000 lawfully initiated wiretap investigations nationwide in any given year, this law mandated the capability to simultaneously spy on millions of people at once be created. At the time it was “promised” that such widespread abuse would”never” actually happen. Yet we have learned that as early as the spring of 2001 the Bush administration had already used presidential directives authorizing private telecom carriers to use CALEA backdoors to engage in large scale domestic surveillance, presumably, given the date, entirely for domestic political purposes. This administration not only refuses to repudiate these past secret and illegal acts, but both defends and explicitly wishes to re-make into fully institutionally legal ones.

“Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.”When we speak of introducing backdoors into communication systems, such back-doors rarely remain secret and often present themselves to abuse not only by national governments, but also by private corporations and even individuals. Such mandates do not make a society more secure, but in fact less. Perhaps most terrifying is adding backdoors to operating systems such as Microsoft Windows, already known to be insecure and defective by design, which simply further increases their vulnerability and the dangers inherent in their continued use.

This is a very real danger, one that can be lethal. Whether we speak of a compromised airline alarm system that resulted in an plane crash in Spain, a battleship rendered dead in the water, or an alarm system failing on an oil rig in part contributing to a catastrophic oil spill in the Gulf of Mexico, innocent people are put to great risk by enactment of this policy. While these accidents resulted in part from the shoddy workmanship of an already poorly designed operating system being used in inappropriate places, imagine the further possibilities for deliberate mischief by exploitation of any such guaranteed and mandated backdoor facility.

“Privacy is ultimately about liberty while surveillance is always about control.”In the United States the 4th amendment did not come about simply because it was impractical to directly spy on everyone on such a large scale. Nor does it end simply because it may now be technically feasible to do so. Communication privacy furthermore is essential to the normal functioning of free societies, whether speaking of whistle-blowers, journalists who have to protect their sources, human rights and peace activists engaging in legitimate political dissent, workers engaged in union organizing, or lawyers who must protect the confidentiality of their privileged communications with clients. Privacy is ultimately about liberty while surveillance is always about control.

To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public. This software was licensed as free (as in freedom) software explicitly to facilitate people to verify that no backdoors are present and to enable them to legally modify and redistribute the software to others as they see fit. If a new law is created that tries to legally mandate the inclusion of backdoors in such software, we will openly refuse to comply.

“To this end, back in 2006, and at the time in response to the illegitimate actions of the prior administration, I created a project whose purpose was explicitly to create and deliver peer-to-peer cryptographically secure communication software directly to the general public.”What is most troubling of all about the expansion of illegal domestic surveillance is how this will reshape the institutional nature of society. To fully appreciate the effect of such surveillance on human societies, imagine being among several hundred million people who wake up each day having to prove they are not “terrorists”, however that may be whimsically defined at the moment, compounded by the impossible task of doing so without being accorded the right to face their accusers in summary ‘proceedings’ or even to be informed of the alleged ‘evidence’ produced by whatever arbitrary, secretive methods such agents of repression use, and where their prosecution is carried out under the shroud of “state secrets” that all such police states use to abuse their own citizens. Such is a society whose foundation is built on the premise of everyone being guilty until proven innocent and where due process does not exist; a society where the ends justifies the means. It is the imposition of such a illegitimate society that we choose to openly oppose, and to do so in this manner.

Thank you for your time and attention,

David Alexander Sugar
Chief Facilitator
GNU Telephony Project

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Catarina Holtz From the EPO Boards of Appeal Explains Bad Behaviour of the Management With Regards to EPC 2000

    The violations of rules set forth by the European Patent Convention (EPC) are being discussed by an EPO veteran (now retired)



  2. The EPO's Paid Propaganda Campaign in the Media

    EPO buys (using public money) coverage that is favourable to its rogue management's agenda, demonstrating utter disregard for scientific processes



  3. Links 31/1/2015: Open Lunchbox, Librem 15 at Around $400,000

    Links for the day



  4. Links 30/1/2015: CERN Adopts 64-bit GNU/Linux, Inkscape 0.91 Released

    Links for the day



  5. Apple- and Microsoft-Friendly Media Continues Attacking Android/Linux

    Some of the latest examples where corporate media (funded and run by large corporation) distorts facts, selectively covers facts, and generally serves to protect the Apple-Microsoft duopolist world view



  6. Qualys Admits That Its Scare Campaign (So-called 'GHOST') Somewhat Baseless

    Even the company that bombarded the media with its "GHOST" nonsense admits that this bug, which was fixed two years ago, does not pose much of a threat



  7. European Unitary Patent and Court System in Trouble

    New resistance to the Unitary Patent amid allegations of misconduct in the European patent authorities



  8. Text of Ruling/Decision Against Željko Topić (Regarding Audi as a Bribe)

    The legal loss of Željko Topić laid bear for the public to see even outside Croatia



  9. Media Coverage of Demonstration Against Jesper Kongstad of the Administrative Council (EPO)

    Last week's EPO demonstration has been covered by Danish media, raising awareness of the "banana republic" state of the EPO



  10. Links 29/1/2015: Android Shipments in 2014 Exceed 1,000,000,000, LibreOffice 4.4 is Out

    Links for the day



  11. Corporate Media, Led Astray by Patent Lawyers, Continues to Distort the Reality of Software Patents Post-Alice

    The press of the rich and the powerful continues its attempt to preserve software patents, despite the US Supreme Court's decision to abolish a lot of them on the basis of abstraction



  12. An Estimated 1,000 EPO Employees-Strong Legion Engulfs Danish Consulate to Protest Jesper Kongstad's (of Administrative Council) Protection of Benoît Battistelli

    A large protest waged by staff of the EPO targets one of the key facilitators of Battistelli's terrifying tyranny



  13. Links 28/1/2015: Ubuntu Touch Windowed Mode, NVIDIA Linux Legacy Drivers Updated

    Links for the day



  14. Breaking: EPO Vice-President Željko Topić Loses Defamation Case in Croatia

    The EPO's notorious Vice-President, whose appointment at the EPO is still raising some alarming questions, has just lost his case in Croatia (one of many cases), motivating us to accelerate coverage about the persona known as Željko Topić



  15. Qualys Starts Self-Promotional FUD Campaign, Naming a Bug That Was Already Fixed 2 Years Ago and Distros Have Covered With Patches

    Responding to the media blitz which paints GNU/Linux as insecure despite the fact that bugs were evidently found and fixed



  16. The Openwashing of Microsoft is Now Threatening to Eliminate the Identity of Free Software

    More openwashing of Microsoft, including in the corporate media, shows just to what great an extent and how quickly the old "Microsoft Open Source" Big Lie grows feet



  17. Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux

    Links for the day



  18. Microsoft's Media Attack on Free Software and GNU/Linux

    Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world



  19. Microsoft Accounting Practices After Fire Again, After Previous Abuses and Book-Cooking

    After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again



  20. Links 26/1/2015: Debian 8.0 “Jessie” RC1, Linux Kernel 3.19 RC6

    Links for the day



  21. Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

    Links for the day



  22. IRC Proceedings: January 11th, 2015 – January 24th, 2015

    Many IRC logs



  23. Links 24/1/2015: Zenwalk Linux Reviewed, Netrunner 14.1 Released

    Links for the day



  24. The Latest 'Microsoft is Open Source' Propaganda a Parade of Lies

    Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of "Open Source"



  25. Apple -- Like Microsoft -- Not Interested in the Security of Its Operating Systems

    Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it



  26. As Battistelli Breaks the Rules and Topić Silences Staff, New European Parliament Petition for Tackling the EPO's Abuses is Needed

    The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO's crooked management



  27. Links 23/1/2015: Red Hat on IBM Power, Meizu Leaks With Ubuntu

    Links for the day



  28. Links 23/1/2015: Plasma 5.2, Manjaro 0.9-pre1

    Links for the day



  29. Microsoft is Dying Due to Free Software, Tries to Infect GNU/Linux With .NET and to Infect Moodle in Schools With Microsoft Office and OOXML Lock-in

    'Free' drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people



  30. Microsoft Symptoms of a Dying Company: More Boosters Depart, Back Doors Revealed, Microsoft's Outlook Cracked

    Bad news for Microsoft shortly before the marketing extravaganza served to cover much of it up


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts