EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.07.13

Digital Freedom in the Age of War on Dissent

Posted in Free/Libre Software at 10:07 am by Dr. Roy Schestowitz

This is what tomorrow’s ‘terrorists’ may look like to the ruling class…

Aaron Swartz and Lawrence Lessig

Summary: Why software freedom is not enough for freedom as a whole and why technology rights in the age of ever-increasing Western oppression necessitate privacy, free speech, competition (e.g. forks, multiple trajectories), collaboration and other libertarian practices

Journalists, activists, protesters, dissenting online voices, whistleblowers (i.e. truth-tellers) and alternatives to the current economic system have come under attacks using laws that were passed to tackle terrorism. “Terrorism” as a label is nearly becoming synonymous with dissent when even Wikileaks gets called “terrorists” by some politicians and Occupy protests (against crimes of banks) get called “low-level terrorism”, then crushed by the FBI. It’s all about maintaining a status quo of profound economic disparity and a perpetual atmosphere of tension or bloody wars (motivated at times by greed, ideology, and racism). Many who engage in preserving or restoring justice are now literally terrorised. Let the press around the world go wild over the latest NSA scandal, knowing that they now have the hard evidence they needed. This is all over the British news today, including the radio. An old friend whom I’ve just had a long lunch with was taken by surprise by these latest revelations (to him it’s new and he is a businessman in his sixties). The debate about privacy is being transformed rapidly and radically right now. Imperialism and the accompanying oppression rear their ugly head for everybody to witness in shock and awe.

This is a good time to pause and ask ourselves, how can we defend ourselves from this tyrannical anarchy of pseudo accountability? First of all, pass the latest news reports to friends and loved ones. Make sure that everything they do over the wire and wireless (Internet and phone calls) they do with full knowledge that they may be recorded, even if they do nothing controversial and have never set foot on the United States (there is actually a worldwide conspiracy among fusion centres, just like ECHELON, so it’s not just a US issue). But this is just the first step. Tell them about free/libre software, putting aside the economic arguments. Free as in freedom-respecting software is a prerequisite, but it is not enough, not quite anyway. Now is a good time to equip friends and loved ones with freedom- and privacy-respecting software (non-free/libre software cannot be trusted for privacy unless it never ever in its entire lifetime gets access to an Internet connection or external media/peripherals). Make sure they know that everything they do online they should always be happy to make public to everyone (marking something private or “deleted” on the so-called ‘cloud’ has insufficient effect due to weak data retention regulations).

“”Terrorism” as a label is nearly becoming synonymous with dissent when even Wikileaks gets called “terrorists” by some politicians and Occupy protests (against crimes of banks) get called “low-level terrorism”, then crushed by the FBI.”If you are involved in a business which uses so-called ‘cloud’ services, put nothing personal there and, if possible, insist on internal-only use (self-hosted and firewalled with reputable encryption method at endpoints, e.g. Jabber). Changing for the better corporate choices of software, such as ‘clouds’, ought to be somewhat easier now that we know how the NSA and its international allies operate behind a veil of secrecy and documents do exist to prove it.

If you are using a third-party E-mail service, don’t. Self-hosted or domestically-hosted mail is not expensive and help can be sought when it comes to setup. Invite other people to drop US-based mail hosts like GMail, Yahoo Mail, and Microsoft’s brand du jour for E-mail. My wife and I only ever pass mail through localhost with strong encryption at the end-points. If you must buy a phone, buy it anonymously using cash and top it up as you go, using cash. Keep names off conversations and remove the battery when the phone is not used (we know for a fact that some phones can track and also record remotely when turned off; some got backdoored and turned into listening devices). Think this is paranoid? Then read Aaron Swartz’s full story. Think this is impractical? Then fine, it sure makes life a little harder — a sacrifice that many campaigners (however benign) must make. The Swartz fiasco hardly even started to make mainstream news until after he had committed suicide (watch how his Wikipedia article/biography has exploded in length since the day he died), whereupon the extremely unjust allegations and charges got dropped. Swartz was an effective advocate/campaigner in the field of copyright (not anti-war) and those who hounded him reached out for things he had written to prove intent to commit a non-crime which he never even committed. Secret agents, for a verified fact, were ‘assigned’ to him. Bradley Manning is currently being smeared in the corporate media for helping to expose war crimes; he had reached out to the Washington Post and New York Time (got ignored and turned away) before he came to Wikileaks. Notice the pattern; you hardly need to do anything but threaten those in power (or with a lot of money) to get hounded and spied on retroactively.

“If you surf controversial sites (not illegal, just controversial, which in some nations is illegal), be sure to use privacy-assuring VPN or Tor.”Don’t use cash machines with nearby phone/s switched on (suffice to say, with the exception of monthly billings which are banal anyway, do not make transaction with a credit/debit card as they all phone home to the NSA in the post-SWIFT era). The ATM (cash machine) is an identity checkpoint. One’s house can be roughly identified if the phone is used there too often. CCTV does not register one’s ID.

If you surf controversial sites (not illegal, just controversial, which in some nations is illegal), be sure to use privacy-assuring VPN or Tor. Better yet, consider setting up Tor nodes for those in the world whose authoritarianism is more trigger-happy and censorship-leaning. Judging by current trends, online censorship is only ever getting worse — not better — as this new thing called the Web grows, expanding to more nations and to more underprivileged people who find a voice or a source.

“Do not underestimate the extent of the surveillance industrial complex; it is embedded in society, possibly even in societies and clubs you are a part of.”Use SIP clients on the phone. Linphone has a good Android app which works well for me with video. Do not use Skype for video, voice, or even text. Microsoft recently confirmed that it is reading what you write. Assume all mobile and landline communication to be recorded, if not by you or the other participant/s, then by a corporation or a shadowy government contractor (as suggested in the UK years ago). Don’t share password over the phone and definitely not by E-mail. Don’t over-re-use passwords. Where possible, I always give people their passwords on a piece of paper, having handwritten it with a pen. You cannot have your mind read for the password and the US is currently breaking the Constitution by demanding that a man gives his decryption passphrase or go to prison. He is used as a witness against himself, but the Constitution defends his right for now (while prosecutors try to brute-force crack his hard drive and succeed to extent). Crypto-cracking is the NSA’s lesser-advertised role. Cryptology is disabled by default (if available at all) in many proprietary software applications where integrity of encryption algorithms (i.e. no back doors) cannot be verified and free(dom) software downloads of crypto packages is banned in some nations whose interests are seen as West-hostile (this controversy goes several years back and they label download “export” to make embargo rules applicable). Two relatives of two people I know were approached by spooks who tried to recruit them, one as a cracker and another as an informant (de facto infiltration); they both declined (and those who don’t decline cannot talk about it). Do not underestimate the extent of the surveillance industrial complex; it is embedded in society, possibly even in societies and clubs you are a part of. You would not know if you spoke to a secret agent unless s/he unmasked him/herself (at which point s/he was no longer secret). I only found myself speaking to a spook once (knowingly, there may be more), but I was warned in advance, so it already restricted the conversation. Be careful of Internet trolls or sources of provocation, or those who ask for more access into your privacy without first earning deep trust. Some provocation is indeed to incite and incriminate; same with the latter — it is to demonise, ‘expose’, destroy reputation or derail popular action against notorious rulers.

“Be careful of Internet trolls or sources of provocation, or those who ask for more access into your privacy without first earning deep trust.”Secret agencies are very relevant to software freedom and decentralisation because they help show us that free/libre software is essential. They can’t suppress it when people recognise what’s at stake. I may live a harder life because I choose to challenge some zealous forms of authority, but it sure feels rewarding. Recycling one’s trash and enjoying a life without materialism is a gift money can’t buy. Switch off public broadcast (government-endorsed programming), neglect and dismiss consumerism as a time-consuming distraction, pick up some digital tools that come in source code form and help fix what has become a corrupt society — one where the biggest criminals usually wear suits, loot everyone, and sneer at all those ‘smelly peasants’ from whom they derive all of their power.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 20/2/2019: digiKam 6.0.0, Cockpit 188, Mesa 19.0 RC5

    Links for the day



  2. How Long Can the EPO Bend the Rules Before the Avalanche of Invalid Software Patents?

    A 35 U.S.C. § 101/SCOTUS moment in Europe will likely squash loads of abstract European Patents granted by the EPO; shouldn’t the EPO foresee this and immediately cease granting such obviously bogus patents, whose main beneficiary is a bunch of patent trolls?



  3. Battistelli Trashed 223 Millions (of Stakeholders' Euros) on a System That Destroyed the European Patent Office and Made Few Private Corporations a Lot Richer

    A quarter of a billion euros later the EPO finally admits in private that this was a massive failure



  4. Links 19/2/2019: Mesa 18.3.4, Cutelyst 2.7.0, Plasma Pass 1.0.0

    Links for the day



  5. What Happened in the United States Now Happens in Europe: Lots of Patents Turn Out to Be Bunk, Fake, Bogus, Invalid and Thus Worthless

    Worthless patents — not opposition to such patents — are the greatest threat to the legitimacy of the patent system, yet bureaucrats fail to heed the warning in the name of short-term profits



  6. Stephen Rowan's and Nellie Simon's Letter to EPO Staff: eDossier Has “Not Reached the Required Quality Levels.”

    We've just commented on it; here is the raw letter in full, explaining that eDossier and related frameworks will be abandoned entirely and indefinitely within less than a fortnight



  7. Search Matters Not at the European Patent Office

    The EPO has found out that "System Battistelli" has been catastrophic for the quality of patents; it stops short of openly admitting it as such and in fact it keeps the message strictly confidential (explained to insiders, who will inevitably notice a system being abandoned)



  8. António Campinos Still Needs to Undo Battistelli's Union-Busting Activities at the EPO

    Solidarity and support for Laurent Prunier are needed because the new French president lacks empathy even for fellow Frenchmen whose sole 'crime' is that they represented EPO staff



  9. Links 18/2/2019: Linux 5.0 RC7, RISC-V Spreading Fast

    Links for the day



  10. António Campinos Still Needs to Hold Team Battistelli Accountable for Illegally Bringing Weapons to the EPO

    It is imperative that, in order to repair the reputation of the European Patent Office (EPO), António Campinos should pursue accountability for the managers who brought Benalla and firearms to the Office (very serious breach of German law, jail sentence included)



  11. Links 17/2/2019: Compiz 0.9.14.0, Geary 0.13.0, GNU FreeDink 109.6, Debian 9.8, Texinfo 6.6

    Links for the day



  12. Amazon's Patent Policy Should be Enough of a Reason to Boycott Amazon and AWS

    There are many things to criticise Amazon and its founder for; but rarely does the mainstream media bring up the company's appalling patent policy



  13. Don't Use Cloudflare Because You Impose This on People Who Least Want It

    Reasons to stop making the World Wide Web so heavily dependent on some dubious companies like Cloudflare, which already has a worrisome track record



  14. How Many/Most EPO Examiners View 'President' António Campinos

    Based on what readers/insiders have told us, there’s a prevalent perception that António Campinos is afraid of (thus controlled/directed by) Bergot, who is still doing Battistelli’s biddings at the European Patent Office (EPO)



  15. Techrights' Priorities Over the Years

    An old priority of ours, eliminating software patents in the United States, is no longer quite so relevant because such patents are perishing in US courts, with or without outside intervention such as activism



  16. Courts in Disagreement: Warning on Wrongly-Granted European Patents and the Looming Collapse of All Software Patents in Europe

    By devaluing patents and reducing their perceived worth (as is happening in China and Europe) patent offices risk decreasing participation in the very system they fundamentally depend on



  17. Computing Will Not Necessarily Make the World a Better Place

    The vision of "happy world" (because each person has a so-called 'smart' 'phone') is a yuppie delusion that overlooks business models and corporate interests



  18. EPO Grants Fake European Patents -- Including Software Patents -- and European Courts Keep Rejecting These

    The demise of the legitimacy or perceived validity of European Patents is measurable and the system isn't the same anymore; the EPO makes no effort to change this for the better, either



  19. Nobody But Patent Trolls and Litigators Will Benefit From the Corruption of the European Patent Office

    IAM, EPO leadership, Iancu and the rest of these raiders are enabling corruption and facilitating or supporting a racket; that money they collect comes at the expense of future victims of their "clients" or "customers" (that's what they call applicants, to whom they grant dubious monopolies as a matter of urgency)



  20. WSL is a Misleading Acronym/Name Because There's No Linux in It, It's Just Windows

    When Microsoft says "Linux" (as in "Microsoft loves Linux") what it actually means is Windows and/or Azure



  21. Links 16/2/2019: Ubuntu 18.04.2 LTS, PyCharm 2019.1 EAP 4

    Links for the day



  22. Outline/Index of the Alexandre Benalla/Battistelli Scandal

    Our writings about the scandals implicating Benalla and the European Patent Office (EPO)



  23. Reading Techrights on a Mobile Device Running Android

    A new Android app for reading this site is being tested



  24. Links 14/2/2019: “I Love Free Software Day” and Mesa 19.0 RC4 Released

    Links for the day



  25. “EPO Lawlessness Again”

    Blackberry uses bogus European Patents (on software) for lawsuits; "all of them pure software patents. Patents on programs for computers as such," as Müller puts it



  26. Unitary Patent (UPC) is All About Imposing Patent Maximalists' Ideology of Greed and Self Interest on Courts in the Name of 'Unification' or 'Consistency' or 'Community'

    Pushers of the Unified Patent Court (UPC) are upset that they don’t always get their way when independent judges get to decide; as it turns out, many European Patents are just fake patents, more so under António Campinos



  27. Battistelli's Bodyguard, Part V: Mediapart Explains the 'Raid' Attempt, Reporters Without Borders Involved

    Mediapart, an investigative site that unearths a lot of incriminating things about Battistelli's former bodyguard Alexandre Benalla, was the target of a raid attempt some weeks ago



  28. Links 13/2/2019: Tails 3.12.1, MongoDB Being Dumped

    Links for the day



  29. Battistelli's Bodyguard, Part IV: Suspected Offenses of Forgery and Possible Falsification

    In a very underworld fashion, Benalla continues to break the law and create yet more scandals



  30. Battistelli's Bodyguard, Part III: Mars, France Close Protection (Benalla's Family), and Russian Oligarchy

    An article which examines the business background of Benalla, the outrageous salaries, the severance indemnity pay, and contract with a Russian oligarch close to Vladimir Putin


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts