EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.26.12

TechBytes Episode 71: Richard Stallman on Surveillance, the NSA, and Mobile Phones

Posted in TechBytes at 5:54 pm by Dr. Roy Schestowitz

Techbytes 2012

Direct download as Ogg (8:51, 3.5 MB)

Summary: The third part of our interviews series with Richard Stallman covers privacy in communication

In this third part we turn our attention to more political issues. I spoke to Richard Stallman about matters of privacy as he has in-depth knowledge of the facts. Here is the transcript.


Dr. Roy Schestowitz: My next question is more about surveillance because I don’t want it to be strictly about software because I know you do have the digital freedom in general and I want you to ask you about advice for trying to avert surveillance in this age where, based on the whistleblowers, we know the NSA is in fact recording vast amounts of information and data about people and also recording all the E-mails. What is your suggestion to people who try to avoid all of that?

Richard StallmanDr. Richard Stallman: Well, I think it’s our duty to avoid that. It’s every citizen’s duty to stick a finger in Big Brother’s eye. Now, the NSA would like us to believe that it’s doing the surveillance to protect us Americans from the terrorism, but the US regularly accuses dissidents of being terrorists. So whenever a government says it’s fighting “terrorists” read “dissidents”. And when you look at where the danger around the world comes from, to a large extent it comes from the US. The US was behind — or carried out — a war of aggression in Iraq, a war of conquest and then an occupation; as a result hundreds of thousands of Iraqis were killed. The usual figure is definitely an underestimate.

“…you gotta ask, who does the world need protecting from?”And so, really you gotta ask, who does the world need protecting from? And this is not — not to count — countries which are dictatorships that are propped up by the US, which carry out the worst kinds of atrocities but they are useful allies to the US, so the US protects them, such as Ethiopia and now Honduras. Honduras had a military coup which might have been organised by the US, but in any case it has certainly been given full support by the US since.

“…I think that it’s perfectly appropriate to do things like using Tor — and using encryption — to interfere with the NSA’a ability find out what you’re doing.”So, I just don’t think of that argument as valid at all. I don’t think that the NSA is on the side of the good people in the world. And so I think that it’s perfectly appropriate to do things like using Tor — and using encryption — to interfere with the NSA’a ability find out what you’re doing.

And I want to also ask you, what’s your advice about the use of mobile phones especially now that we know, at least based on Sprint, that the carriers, at least in the United States and we know here in the UK as well, are in fact collecting data on location of people, the people they phone, perhaps the address books as well. What would you say to people?

I don’t have mobile phone.

I know.

“This has been used to remotely convert phones into listening devices, and when that is done the phone picks up and transmits all the conversations in the vicinity whether you’re making a call or not and transmits it to someone and just pushing the button to switch it off does not necessarily really do that.”And why… it’s because mobile phones are Stalin’s dream. They are surveillance and tracking devices. They are always sending the location frequently (I think even if you don’t make a call), so your whole life is being tracked and of course if you do make a call, the system knows who you call. And not only that, most mobile phones have a universal back door, meaning that the phone company — or someone else — can forcibly install software changes without asking your permission. This has been used to remotely convert phones into listening devices, and when that is done the phone picks up and transmits all the conversations in the vicinity whether you’re making a call or not and transmits it to someone and just pushing the button to switch it off does not necessarily really do that. So I consider this outrageous and I won’t have one. If I’m travelling around somewhere and I need to make a call I ask somebody nearby to let me make a call. That way, Big Brother doesn’t get information about me.


More insights from Stallman are to be published in the coming days.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: NSA privacy fsf gnu spying

Download:

Ogg Theora

Past shows in this series:

Show overview Show title
Episode 66: Tim and Roy TechBytes Episode 66: First of the Second Series
Episode 67: Tim and Roy TechBytes Episode 67: Nokia Down, Android Up
Episode 68: Roy TechBytes Episode 68: Solo With Patents, Apple Bans, and Android World Domination
Episode 69: Roy and Richard Stallman TechBytes Episode 69: Richard Stallman on Restricted Boot (UEFI), Coreboot, GRUB, and Boot Freedom
Episode 70: Roy and Richard Stallman TechBytes Episode 70: Richard Stallman on How Browsers and Social Networking Sites Facilitate Surveillance
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 30/1/2015: CERN Adopts 64-bit GNU/Linux, Inkscape 0.91 Released

    Links for the day



  2. Apple- and Microsoft-Friendly Media Continues Attacking Android/Linux

    Some of the latest examples where corporate media (funded and run by large corporation) distorts facts, selectively covers facts, and generally serves to protect the Apple-Microsoft duopolist world view



  3. Qualys Admits That Its Scare Campaign (So-called 'GHOST') Somewhat Baseless

    Even the company that bombarded the media with its "GHOST" nonsense admits that this bug, which was fixed two years ago, does not pose much of a threat



  4. European Unitary Patent and Court System in Trouble

    New resistance to the Unitary Patent amid allegations of misconduct in the European patent authorities



  5. Text of Ruling/Decision Against Željko Topić (Regarding Audi as a Bribe)

    The legal loss of Željko Topić laid bear for the public to see even outside Croatia



  6. Media Coverage of Demonstration Against Jesper Kongstad of the Administrative Council (EPO)

    Last week's EPO demonstration has been covered by Danish media, raising awareness of the "banana republic" state of the EPO



  7. Links 29/1/2015: Android Shipments in 2014 Exceed 1,000,000,000, LibreOffice 4.4 is Out

    Links for the day



  8. Corporate Media, Led Astray by Patent Lawyers, Continues to Distort the Reality of Software Patents Post-Alice

    The press of the rich and the powerful continues its attempt to preserve software patents, despite the US Supreme Court's decision to abolish a lot of them on the basis of abstraction



  9. An Estimated 1,000 EPO Employees-Strong Legion Engulfs Danish Consulate to Protest Jesper Kongstad's (of Administrative Council) Protection of Benoît Battistelli

    A large protest waged by staff of the EPO targets one of the key facilitators of Battistelli's terrifying tyranny



  10. Links 28/1/2015: Ubuntu Touch Windowed Mode, NVIDIA Linux Legacy Drivers Updated

    Links for the day



  11. Breaking: EPO Vice-President Željko Topić Loses Defamation Case in Croatia

    The EPO's notorious Vice-President, whose appointment at the EPO is still raising some alarming questions, has just lost his case in Croatia (one of many cases), motivating us to accelerate coverage about the persona known as Željko Topić



  12. Qualys Starts Self-Promotional FUD Campaign, Naming a Bug That Was Already Fixed 2 Years Ago and Distros Have Covered With Patches

    Responding to the media blitz which paints GNU/Linux as insecure despite the fact that bugs were evidently found and fixed



  13. The Openwashing of Microsoft is Now Threatening to Eliminate the Identity of Free Software

    More openwashing of Microsoft, including in the corporate media, shows just to what great an extent and how quickly the old "Microsoft Open Source" Big Lie grows feet



  14. Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux

    Links for the day



  15. Microsoft's Media Attack on Free Software and GNU/Linux

    Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world



  16. Microsoft Accounting Practices After Fire Again, After Previous Abuses and Book-Cooking

    After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again



  17. Links 26/1/2015: Debian 8.0 “Jessie” RC1, Linux Kernel 3.19 RC6

    Links for the day



  18. Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

    Links for the day



  19. IRC Proceedings: January 11th, 2015 – January 24th, 2015

    Many IRC logs



  20. Links 24/1/2015: Zenwalk Linux Reviewed, Netrunner 14.1 Released

    Links for the day



  21. The Latest 'Microsoft is Open Source' Propaganda a Parade of Lies

    Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of "Open Source"



  22. Apple -- Like Microsoft -- Not Interested in the Security of Its Operating Systems

    Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it



  23. As Battistelli Breaks the Rules and Topić Silences Staff, New European Parliament Petition for Tackling the EPO's Abuses is Needed

    The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO's crooked management



  24. Links 23/1/2015: Red Hat on IBM Power, Meizu Leaks With Ubuntu

    Links for the day



  25. Links 23/1/2015: Plasma 5.2, Manjaro 0.9-pre1

    Links for the day



  26. Microsoft is Dying Due to Free Software, Tries to Infect GNU/Linux With .NET and to Infect Moodle in Schools With Microsoft Office and OOXML Lock-in

    'Free' drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people



  27. Microsoft Symptoms of a Dying Company: More Boosters Depart, Back Doors Revealed, Microsoft's Outlook Cracked

    Bad news for Microsoft shortly before the marketing extravaganza served to cover much of it up



  28. The Collapse of European Patent Office Management Culminates With Resignations

    No blood is spilled, but even the management of the EPO is falling apart as the Director of Internal Communication is said to have just resigned



  29. New LCA Talk: Open Invention Network's Deb Nicholson on Software Patents and Patent Trolls

    Deb Nicholson's LCA talk is now publicly accessible



  30. Links 22/1/2015: GNU/Linux Sysadmin Opportunities, TraceFS Introduced

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts