EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.07.13

Digital Freedom in the Age of War on Dissent

Posted in Free/Libre Software at 10:07 am by Dr. Roy Schestowitz

This is what tomorrow’s ‘terrorists’ may look like to the ruling class…

Aaron Swartz and Lawrence Lessig

Summary: Why software freedom is not enough for freedom as a whole and why technology rights in the age of ever-increasing Western oppression necessitate privacy, free speech, competition (e.g. forks, multiple trajectories), collaboration and other libertarian practices

Journalists, activists, protesters, dissenting online voices, whistleblowers (i.e. truth-tellers) and alternatives to the current economic system have come under attacks using laws that were passed to tackle terrorism. “Terrorism” as a label is nearly becoming synonymous with dissent when even Wikileaks gets called “terrorists” by some politicians and Occupy protests (against crimes of banks) get called “low-level terrorism”, then crushed by the FBI. It’s all about maintaining a status quo of profound economic disparity and a perpetual atmosphere of tension or bloody wars (motivated at times by greed, ideology, and racism). Many who engage in preserving or restoring justice are now literally terrorised. Let the press around the world go wild over the latest NSA scandal, knowing that they now have the hard evidence they needed. This is all over the British news today, including the radio. An old friend whom I’ve just had a long lunch with was taken by surprise by these latest revelations (to him it’s new and he is a businessman in his sixties). The debate about privacy is being transformed rapidly and radically right now. Imperialism and the accompanying oppression rear their ugly head for everybody to witness in shock and awe.

This is a good time to pause and ask ourselves, how can we defend ourselves from this tyrannical anarchy of pseudo accountability? First of all, pass the latest news reports to friends and loved ones. Make sure that everything they do over the wire and wireless (Internet and phone calls) they do with full knowledge that they may be recorded, even if they do nothing controversial and have never set foot on the United States (there is actually a worldwide conspiracy among fusion centres, just like ECHELON, so it’s not just a US issue). But this is just the first step. Tell them about free/libre software, putting aside the economic arguments. Free as in freedom-respecting software is a prerequisite, but it is not enough, not quite anyway. Now is a good time to equip friends and loved ones with freedom- and privacy-respecting software (non-free/libre software cannot be trusted for privacy unless it never ever in its entire lifetime gets access to an Internet connection or external media/peripherals). Make sure they know that everything they do online they should always be happy to make public to everyone (marking something private or “deleted” on the so-called ‘cloud’ has insufficient effect due to weak data retention regulations).

“”Terrorism” as a label is nearly becoming synonymous with dissent when even Wikileaks gets called “terrorists” by some politicians and Occupy protests (against crimes of banks) get called “low-level terrorism”, then crushed by the FBI.”If you are involved in a business which uses so-called ‘cloud’ services, put nothing personal there and, if possible, insist on internal-only use (self-hosted and firewalled with reputable encryption method at endpoints, e.g. Jabber). Changing for the better corporate choices of software, such as ‘clouds’, ought to be somewhat easier now that we know how the NSA and its international allies operate behind a veil of secrecy and documents do exist to prove it.

If you are using a third-party E-mail service, don’t. Self-hosted or domestically-hosted mail is not expensive and help can be sought when it comes to setup. Invite other people to drop US-based mail hosts like GMail, Yahoo Mail, and Microsoft’s brand du jour for E-mail. My wife and I only ever pass mail through localhost with strong encryption at the end-points. If you must buy a phone, buy it anonymously using cash and top it up as you go, using cash. Keep names off conversations and remove the battery when the phone is not used (we know for a fact that some phones can track and also record remotely when turned off; some got backdoored and turned into listening devices). Think this is paranoid? Then read Aaron Swartz’s full story. Think this is impractical? Then fine, it sure makes life a little harder — a sacrifice that many campaigners (however benign) must make. The Swartz fiasco hardly even started to make mainstream news until after he had committed suicide (watch how his Wikipedia article/biography has exploded in length since the day he died), whereupon the extremely unjust allegations and charges got dropped. Swartz was an effective advocate/campaigner in the field of copyright (not anti-war) and those who hounded him reached out for things he had written to prove intent to commit a non-crime which he never even committed. Secret agents, for a verified fact, were ‘assigned’ to him. Bradley Manning is currently being smeared in the corporate media for helping to expose war crimes; he had reached out to the Washington Post and New York Time (got ignored and turned away) before he came to Wikileaks. Notice the pattern; you hardly need to do anything but threaten those in power (or with a lot of money) to get hounded and spied on retroactively.

“If you surf controversial sites (not illegal, just controversial, which in some nations is illegal), be sure to use privacy-assuring VPN or Tor.”Don’t use cash machines with nearby phone/s switched on (suffice to say, with the exception of monthly billings which are banal anyway, do not make transaction with a credit/debit card as they all phone home to the NSA in the post-SWIFT era). The ATM (cash machine) is an identity checkpoint. One’s house can be roughly identified if the phone is used there too often. CCTV does not register one’s ID.

If you surf controversial sites (not illegal, just controversial, which in some nations is illegal), be sure to use privacy-assuring VPN or Tor. Better yet, consider setting up Tor nodes for those in the world whose authoritarianism is more trigger-happy and censorship-leaning. Judging by current trends, online censorship is only ever getting worse — not better — as this new thing called the Web grows, expanding to more nations and to more underprivileged people who find a voice or a source.

“Do not underestimate the extent of the surveillance industrial complex; it is embedded in society, possibly even in societies and clubs you are a part of.”Use SIP clients on the phone. Linphone has a good Android app which works well for me with video. Do not use Skype for video, voice, or even text. Microsoft recently confirmed that it is reading what you write. Assume all mobile and landline communication to be recorded, if not by you or the other participant/s, then by a corporation or a shadowy government contractor (as suggested in the UK years ago). Don’t share password over the phone and definitely not by E-mail. Don’t over-re-use passwords. Where possible, I always give people their passwords on a piece of paper, having handwritten it with a pen. You cannot have your mind read for the password and the US is currently breaking the Constitution by demanding that a man gives his decryption passphrase or go to prison. He is used as a witness against himself, but the Constitution defends his right for now (while prosecutors try to brute-force crack his hard drive and succeed to extent). Crypto-cracking is the NSA’s lesser-advertised role. Cryptology is disabled by default (if available at all) in many proprietary software applications where integrity of encryption algorithms (i.e. no back doors) cannot be verified and free(dom) software downloads of crypto packages is banned in some nations whose interests are seen as West-hostile (this controversy goes several years back and they label download “export” to make embargo rules applicable). Two relatives of two people I know were approached by spooks who tried to recruit them, one as a cracker and another as an informant (de facto infiltration); they both declined (and those who don’t decline cannot talk about it). Do not underestimate the extent of the surveillance industrial complex; it is embedded in society, possibly even in societies and clubs you are a part of. You would not know if you spoke to a secret agent unless s/he unmasked him/herself (at which point s/he was no longer secret). I only found myself speaking to a spook once (knowingly, there may be more), but I was warned in advance, so it already restricted the conversation. Be careful of Internet trolls or sources of provocation, or those who ask for more access into your privacy without first earning deep trust. Some provocation is indeed to incite and incriminate; same with the latter — it is to demonise, ‘expose’, destroy reputation or derail popular action against notorious rulers.

“Be careful of Internet trolls or sources of provocation, or those who ask for more access into your privacy without first earning deep trust.”Secret agencies are very relevant to software freedom and decentralisation because they help show us that free/libre software is essential. They can’t suppress it when people recognise what’s at stake. I may live a harder life because I choose to challenge some zealous forms of authority, but it sure feels rewarding. Recycling one’s trash and enjoying a life without materialism is a gift money can’t buy. Switch off public broadcast (government-endorsed programming), neglect and dismiss consumerism as a time-consuming distraction, pick up some digital tools that come in source code form and help fix what has become a corrupt society — one where the biggest criminals usually wear suits, loot everyone, and sneer at all those ‘smelly peasants’ from whom they derive all of their power.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Linux Foundation's Linux.com in 2019: Zero Articles (Nothing Original) and a Terrible, Rookie New Design

    Linux.com has become a curated syndicator of news (edited by one single Microsoft proponent); the site has also eliminated its traditional design in favour of something only 'hipsters' can appreciate



  2. Managing IP as Team UPC's Megaphone and Lobbying Front

    Managing IP is lying on behalf of Team UPC yet again; the site's long history promoting the UPC hasn't ended even when prospects of the UPC are slim to none



  3. No More Rights for EPO Staff?

    The oppression and the crackdown on labour rights in Europe's second-largest institution has deepened to the point where staff is paid as little as is legally possible



  4. Links 22/8/2019: GNOME 3.33.91, Systemd 243 RC2, Cockpit 201, Ubuntu Touch OTA-10, FreeIPMI 1.6.4

    Links for the day



  5. Some Patent Attorneys Dislike Techrights Not Because It's Wrong But Because Software Patents Are Wrong (and Sometimes Illegal)

    Odd rants which misuse common law and ignore alleged Fair Use (and misinterpretation of copyright law, for censorship purposes) would have people believe that we're wrong; but it's more likely that the person in question is jealous, insecure, or offended by our stance on patent scope, which is very much rooted in the law itself (and the views widely held by software developers globally)



  6. Guarding and Rescuing the FSF Titanic: Distro-libre and feature-schema

    "Every time a distro does not suit a user's purposes, and it is less work to adapt the distro on one's own than to affect the distro in any other way, a distro is born."



  7. Links 21/8/2019: Dell's XPS 13, Mesa 19.2 RC1, Librem Update

    Links for the day



  8. Links 21/8/2019: Open Source POWER, Alpine 3.10.2, Netrunner 19.08

    Links for the day



  9. Edward as a Nodder to Team UPC Kool-Aid

    Bristows LLP is at it again and it's getting pathetic, not just dishonest as usual



  10. Guest Post: António Campinos' European Patent Office Redefines Modern Slavery in the Heart of Europe in 2019

    The European Patent Office’s (EPO) President António Campinos — like his predecessor Battistelli — emulates Chinese labour practices



  11. Guarding and Rescuing the FSF Titanic: There is More Than One Iceberg Ahead

    "This strategy is not far from when Microsoft talked about "de-commoditizing protocols" in the late 90s, as part of their plans to control, dominate, and end Open Source and Free software."



  12. EPO Cannot Handle Patent Justice With a Backlog of About 10,000 Cases at the Boards of Appeal

    The EPO's long war on judges and on the law has proven to be costly; it's difficult to pretend that the EPO functions like a first-world legal framework



  13. The European Patent Office Increases Surveillance: Can't Get Food Without Being Spied on

    The infamous "War on Cash" has been 'won' at Europe's second-largest institution, where people's diet can now be monitored and indefinitely retained on the system



  14. To GNU/Linux, the Operating System, GAFAM (Google, Apple, Facebook, Amazon, Microsoft) is Not the Threat. Microsoft is.

    Don't let Microsoft get away with its bogus narration; GNU/Linux is primarily under attack from Microsoft, whereas Software Freedom in general is under attack from many directions



  15. The Free Software Foundation (FSF) Has the Full Support of Techrights

    Our support for the FSF is strong enough that we want to occasionally suggest improvements; there are growing frictions designed to isolate the FSF and cause self-restraint/censorship



  16. Why We Support Phoronix (Whereas Some Others Do Not)

    Some people try to characterise Michael Larabel as the 'bad boy' of Linux even though Michael is probably the hardest working Linux journalist out there



  17. Guarding and Rescuing the FSF Titanic: The Simplest Ways that AI will Change Computing

    "AI is already used to help kill people. We should be cautious, and know that the best rules we come up with (like no doing magic outside the school grounds) won't be followed all the time."



  18. Links 20/8/2019: DragonFlyBSD Developing DSynth

    Links for the day



  19. Guarding and Rescuing the FSF Titanic: Narcissism in The Community

    "Narcissists are drawn to intelligent people. They take great pleasure in attacking, controlling and defeating intelligent people because it makes them feel smarter and more important."



  20. Breaking the Law Has Become the Norm at the European Patent Office

    The European Patent Office’s ongoing practice of destroying critics/whistleblowers and crushing unions, judges, examiners etc. — as well as threats and bribery of the media — ultimately mean a perpetual state of lawlessness that, if it prevails, will let patent trolls raid the European economy and stall innovation



  21. Links 20/8/2019: KMyMoney 5.0.6, Kdenlive 19.08

    Links for the day



  22. Guarding and Rescuing the FSF Titanic: Free Software in Education

    "If everyone learns to code, then everyone gains some understanding of how to code in other languages."



  23. Links 19/8/2019: Another Linux 5.3 RC, OpenSUSE's Richard Brown Steps Down, Slackware Creates Patreon Page, Qt 6 Initiated

    Links for the day



  24. Speaking Truth to Monopolies (or How to Write Guest Posts in Techrights)

    We need to have more articles tackling the passage of all power — especially when it comes to software — to few large monopolies that disregard human rights or actively participate in their abolishment in the digital realm



  25. Guarding and Rescuing the FSF Titanic: Free as in Speech

    "While a new breed of so-called anarchists campaign against expression that even the state allows, people are also foolishly overplaying the relevance of the state to free speech issues -- as if it's not a freedom issue when a project is increasingly thought-policed, because the thought-policing isn't on a state level."



  26. Toxic Culture at Microsoft

    Racism, intolerance, sexism and bullying are rampant at Microsoft; but Microsoft would rather deflect/divert/sidetrack to Google and so-called 'GAFA'



  27. Guarding and Rescuing the FSF Titanic: Introduction

    "The FSF isn't just threatened, it will hit a large iceberg in the future that changes it permanently."



  28. Linux Journal and Linux.com Should Have Been Kept Going

    There's apparently no good explanation for the effective shutdown of Linux Journal and Linux.com; London Trust Media Holdings (LTMH), owner of Linux Journal, saw numbers improving and the Linux Foundation, steward of Linux.com, is loaded with money



  29. 2019 Microsoft Glossary

    How Microsoft internally interprets words that it is saying to the public and to the press



  30. 2019 Surveillance Glossary

    Distortion of technical and nontechnical terms in this day and age of '1984'


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts