EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.12.15

Richard Stallman: Why We Need Free Digital Hardware Designs

Posted in FSF, Hardware at 11:08 pm by Dr. Roy Schestowitz

To what extent do the ideas of free software extend to hardware? Is it a moral obligation to make our hardware designs free, just as it is to make our software free? Does maintaining our freedom require rejecting hardware made from nonfree designs?

Free software is a matter of freedom, not price; broadly speaking, it means that users are free to use the software and to copy and redistribute the software, with or without changes. More precisely, the definition is formulated in terms of the four essential freedoms.

  • The freedom to run the program as you wish, for any purpose.
  • The freedom to study the program’s source code, and change it so it does your computing as you wish.
  • The freedom to make exact copies and give them or sell them to others.
  • The freedom to make copies of your modified versions and give them or sell them to others.

Applying the same concept directly to hardware, free hardware means hardware that you are free to use and to copy and redistribute with or without changes. But, since there are no copiers for hardware, aside from keys, DNA, and plastic objects’ exterior shapes, is the concept of free hardware even possible? Well, most hardware is made by fabrication from some sort of design. The design comes before the hardware.

Thus, the concept we really need is that of a free hardware design. That’s simple: it means a design that permits users to use the design (i.e., fabricate hardware from it) and to copy and redistribute it, with or without changes. The design must provide the same four freedoms that define free software. Then “free hardware” means hardware with an available free design.

People first encountering the idea of free software often think it means you can get a copy gratis. Many free programs are available for zero price, since it costs you nothing to download your own copy, but that’s not what “free” means here. (In fact, some spyware programs such as Flash Player and Angry Birds are gratis although they are not free.) Saying “libre” along with “free” helps clarify the point.

For hardware, this confusion tends to go in the other direction; hardware costs money to produce, so commercially made hardware won’t be gratis (unless it is a loss-leader or a tie-in), but that does not prevent its design from being free/libre. Things you make in your own 3D printer can be quite cheap, but not exactly gratis since you will have to pay for the raw materials. In ethical terms, the freedom issue trumps the price issue totally, since a device that denies freedom to its users is worth less than nothing.

The terms “open hardware” and “open source hardware” are used by some with the same concrete meaning as “free hardware,” but those terms downplay freedom as an issue. They were derived from the term “open source software,” which refers more or less to free software but without talking about freedom or presenting the issue as a matter of right or wrong. To underline the importance of freedom, we make a point of referring to freedom whenever it is pertinent; since “open” fails to do that, let’s not substitute it for “free”.

Is Nonfree Hardware an Injustice?

Ethically, software must be free; a nonfree program is an injustice. Should we take the same view for hardware designs?

We certainly should, in the fields that 3D printing (or, more generally, any sort of personal fabrication) can handle. Printer patterns to make a useful, practical object (i.e., functional rather than decorative) must be free because they are works made for practical use. Users deserve control over these works, just as they deserve control over the software they use.

Distributing a nonfree functional object design is as wrong as distributing a nonfree program.

Be careful to choose 3D printers that work with exclusively free software; the Free Software Foundation endorses such printers. Some 3D printers are made from free hardware designs, but Makerbot’s hardware designs are nonfree.

Must we reject nonfree digital hardware?

Is a nonfree digital hardware(*) design an injustice? Must we, for our freedom’s sake, reject all digital hardware made from nonfree designs, as we must reject nonfree software?

Due to the conceptual parallel between hardware designs and software source code, many hardware hackers are quick to condemn nonfree hardware designs just like nonfree software. I disagree because the circumstances for hardware and software are different.

Present-day chip and board fabrication technology resembles the printing press: it lends itself to mass production in a factory. It is more like copying books in 1950 than like copying software today.

Freedom to copy and change software is an ethical imperative because those activities are feasible for those who use software: the equipment that enables you to use the software (a computer) is also sufficient to copy and change it. Today’s mobile computers are too weak to be good for this, but anyone can find a computer that’s powerful enough.

Moreover, a computer suffices to download and run a version changed by someone else who knows how, even if you are not a programmer. Indeed, nonprogrammers download software and run it every day. This is why free software makes a real difference to nonprogrammers.

How much of this applies to hardware? Not everyone who can use digital hardware knows how to change a circuit design, or a chip design, but anyone who has a PC has the equipment needed to do so. Thus far, hardware is parallel to software, but next comes the big difference.

You can’t build and run a circuit design or a chip design in your computer. Constructing a big circuit is a lot of painstaking work, and that’s once you have the circuit board. Fabricating a chip is not feasible for individuals today; only mass production can make them cheap enough. With today’s hardware technology, users can’t download and run John H Hacker’s modified version of a digital hardware design, as they could run John S Hacker’s modified version of a program. Thus, the four freedoms don’t give users today collective control over a hardware design as they give users collective control over a program. That’s where the reasoning showing that all software must be free fails to apply to today’s hardware technology.

In 1983 there was no free operating system, but it was clear that if we had one, we could immediately use it and get software freedom. All that was missing was the code for one.

In 2014, if we had a free design for a CPU chip suitable for a PC, mass-produced chips made from that design would not give us the same freedom in the hardware domain. If we’re going to buy a product mass produced in a factory, this dependence on the factory causes most of the same problems as a nonfree design. For free designs to give us hardware freedom, we need future fabrication technology.

We can envision a future in which our personal fabricators can make chips, and our robots can assemble and solder them together with transformers, switches, keys, displays, fans and so on. In that future we will all make our own computers (and fabricators and robots), and we will all be able to take advantage of modified designs made by those who know hardware. The arguments for rejecting nonfree software will then apply to nonfree hardware designs too.

That future is years away, at least. In the meantime, there is no need to reject hardware with nonfree designs on principle.

*As used here, “digital hardware” includes hardware with some analog circuits and components in addition to digital ones.

We need free digital hardware designs

Although we need not reject digital hardware made from nonfree designs in today’s circumstances, we need to develop free designs and should use them when feasible. They provide advantages today, and in the future they may be the only way to use free software.

Free hardware designs offer practical advantages. Multiple companies can fabricate one, which reduces dependence on a single vendor. Groups can arrange to fabricate them in quantity. Having circuit diagrams or HDL code makes it possible to study the design to look for errors or malicious functionalities (it is known that the NSA has procured malicious weaknesses in some computing hardware). Furthermore, free designs can serve as building blocks to design computers and other complex devices, whose specs will be published and which will have fewer parts that could be used against us.

Free hardware designs may become usable for some parts of our computers and networks, and for embedded systems, before we are able to make entire computers this way.

Free hardware designs may become essential even before we can fabricate the hardware personally, if they become the only way to avoid nonfree software. As common commercial hardware is increasingly designed to subjugate users, it becomes increasingly incompatible with free software, because of secret specifications and requirements for code to be signed by someone other than you. Cell phone modem chips and even some graphics accelerators already require firmware to be signed by the manufacturer. Any program in your computer, that someone else is allowed to change but you’re not, is an instrument of unjust power over you; hardware that imposes that requirement is malicious hardware. In the case of cell phone modem chips, all the models now available are malicious.

Some day, free-design digital hardware may be the only platform that permits running a free system at all. Let us aim to have the necessary free digital designs before then, and hope that we have the means to fabricate them cheaply enough for all users.

If you design hardware, please make your designs free. If you use hardware, please join in urging and pressuring companies to make hardware designs free.

Copyright 2015 Richard Stallman. Released under Creative Commons Attribution No Derivatives 3.0 license.

Links 12/3/2015: Continued Catchup and News

Posted in News Roundup at 9:32 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Science

    • Why are women leaving the tech industry in droves?

      Ana Redmond launched into a technology career for an exciting challenge and a chance to change the world. She was well-equipped to succeed too: An ambitious math and science wiz, she could code faster, with fewer errors, than anyone she knew.

      In 2011, after 15 years, she left before achieving a management position.

      Garann Means became a programmer for similar reasons. After 13 years, she quit too, citing a hostile and unwelcoming environment for women.

  • Health/Nutrition

  • Security

  • Defence/Police/Secrecy/Aggression

  • Environment/Energy/Wildlife

  • PR/AstroTurf/Lobbying

  • Censorship

  • Privacy

    • What the Hack! 56 Suspected Hackers arrested in the UK

      The UK National Crime Agency arrested 56 suspected hackers, including one 23-year-old male who allegedly attempted to hack his way into the U.S.’ Department of Defense in 2014. Not attempting to minimize the potential risks of hacking but how much does cyber-crime actually cost, what are the risks and what about those who hack the data of billions of internet users per day to, allegedly, “keep all of us safe?”

    • Beijing Strikes Back in US-China Tech Wars

      China’s new draft anti-terror legislation has sent waves across the U.S. tech community. If there is a brewing tech war between U.S. and China over government surveillance backdoors and a preference for indigenous software, China’s new draft terror law makes it clear that Beijing is happy to give the United States a taste of its own medicine. The law has already drawn considerable criticism from international human rights groups, including Amnesty International and Human Rights Watch for its purported attempts to legitimize wanton human rights violations in the name of counter-terrorism. Additionally, China has opted to implement its own definition of terrorism, placing “any thought, speech, or activity that, by means of violence, sabotage, or threat, aims to generate social panic, influence national policy-making, create ethnic hatred, subvert state power, or split the state” under the umbrella of the overused T-word.

    • Canadian risks prison for not giving up phone’s passcode

      A Canadian charged for refusing to give border agents his smartphone passcode was expected Thursday to become the first to test whether border inspections can include information stored on devices.

    • The Ambassador who worked from a Nairobi bathroom to avoid State Dept. IT

      However, another Obama administration appointee—the former ambassador to Kenya—did do that, essentially refusing to use any of the Nairobi embassy’s internal IT. He worked out of a bathroom because it was the only place in the embassy where he could use an unsecured network and his personal computer, using Gmail to conduct official business. And he did all this during a time when Chinese hackers were penetrating the personal Gmail inboxes of a number of US diplomats.

    • CIA spends years trying to break Apple security

      Documents obtained by The Intercept reveal the security researchers’ work, presented at an annual gathering called the “Jamboree” at a Lockheed Martin facility in northern Virginia. Attendees of the CIA-sponsored, secretive event — which has run for nearly a decade — discuss the exploitation of vulnerabilities and flaws found in commercial electronics, such as Apple’s iPhone and iPad product ranges.

    • Yahoo exec goes mano a mano with NSA director over crypto backdoors
    • Data Retention: Mass Surveillance Challenged Across Europe

      On 8 April 2014, the European Union Court of Justice invalidated the 2006 Directive on Data Retention. Through this decision, all the European legislations on data retention were seriously undermined, as the EUCJ considered that the generalised retention of data on non-suspicious individuals, furthermore for an extended period of time, is a form of mass surveillance incompatible with fundamental rights.

    • NSA Probably Doesn’t Have ALL of Hillary’s Emails … But Maybe Someone Should

      I’m among those who believes Hillary Clinton’s use of a privately run email server is an abuse of power. Doing so appears to have skirted laws ensuring good governance and it may well have exposed her communications to adversaries (including some who would have reason to use the contents of her email to help Republicans win the White House), even if her email would have been just as targeted at State, per reports about persistent hacking of it. While I don’t buy — in the absence of evidence — she did so to hide ties with the Clinton Foundation, I do think she did so not just for convenience, but for control, as I laid out last week.

    • Encryption Backdoors Will Always Turn Around And Bite You In The Ass

      As you may have heard, the law enforcement and intelligence communities have been pushing strongly for backdoors in encryption. They talk about ridiculous things like “golden keys,” pretending that it’s somehow possible to create something that only the good guys can use. Many in the security community have been pointing out that this is flat-out impossible. The second you introduce a backdoor, there is no way to say that only “the good guys” can use it.

      As if to prove that, an old “golden key” from the 90s came back to bite a whole bunch of the internet this week… including the NSA. Some researchers discovered a problem which is being called FREAK for “Factoring RSA Export Keys.” The background story is fairly involved and complex, but here’s a short version (that leaves out a lot of details): back during the first “cryptowars” when Netscape was creating SSL (mainly to protect the early e-commerce market), the US still considered exporting strong crypto to be a crime. To deal with this, RSA offered “export grade encryption” that was deliberately weak (very, very weak) that could be used abroad. As security researcher Matthew Green explains, in order to deal with the fact that SSL-enabled websites had to deal with both strong crypto and weak “export grade” crypto, — the “golden key” — there was a system that would try to determine which type of encryption to use on each connection. If you were in the US, it should go to strong encryption. Outside the US? Downgrade to “export grade.”

    • Snowden GCSB revelations: Leaked documents show New Zealand spies on its Pacific friends and sends data to US

      New Zealand’s spies are targeting the entire email, phone and social media communications of the country’s closest, friendliest and most vulnerable neighbours, according to documents supplied by United States fugitive and whistleblower Edward Snowden.

      Snowden’s files reveal a heavy focus on “full-take collection” from the Pacific with nearly two dozen countries around the world targeted by our Government Communications Security Bureau.

    • Why I’m Saying Goodbye to Apple, Google and Microsoft
    • Online Privacy Is Worth The Extra Work

      This past week, Laura Poitras’s documentary, Citizen Four, won the Academy Award for Best Documentary. When he provided the documents that revealed the details of universal spying by the US National Security Agency (NSA), the subject of the documentary, Edward Snowden, wrote an accompanying manifesto. His “sole motive”, he wrote, was “to inform the public as to that which is done in their name and that which is done against them. The U.S. government, in conspiracy with client states, chiefest among them the Five Eyes – the United Kingdom, Canada, Australia, and New Zealand – have inflicted upon the world a system of secret, pervasive surveillance from which there is no refuge.” (1)

  • Civil Rights

    • 20% of Germans want revolution, majority say democracy ‘isn’t real’ – study
    • Ferguson cop won’t face civil rights charges in Michael Brown shooting
    • Daniel Ellsberg: Petraeus Case Shows Hypocrisy of Whistleblower Crackdown

      The U.S. government’s “hand-slap” treatment of former CIA director David Petraeus, who in 2012 leaked classified military information to his biographer and mistress, Paula Broadwell, stands in stark contrast to the Obama administration’s aggressive crackdown on whistleblowers like Chelsea Manning, Edward Snowden, Jeffrey Sterling, and John Kiriakou—and should be the turning point away from such policies.

      So says renowned Pentagon Papers whistleblower Daniel Ellsberg, who was charged under the Espionage Act for disclosing secret U.S. military documents related to the Vietnam War in 1971. Snowden, who leaked a trove of classified NSA documents to journalists, now also faces prosecution under the Espionage Act.

      Speaking to Trevor Timm at the Guardian on Thursday, Ellsberg noted that the “actual charges against [Edward Snowden] are not more serious, as violations of the classification regulations and non-disclosure agreements, than those Petraeus has admitted to, which are actually quite spectacular.”

    • PETRAEUS PLEA DEAL REVEALS TWO-TIER JUSTICE SYSTEM FOR LEAKS

      David Petraeus, the former Army general and CIA director, admitted today that he gave highly-classified journals to his onetime lover and that he lied to the FBI about it. But he only has to plead guilty to a single misdemeanor that will not involve a jail sentence thanks to a deal with federal prosecutors. The deal is yet another example of a senior official treated leniently for the sorts of violations that lower-level officials are punished severely for.

      According to the plea deal, Petraeus, while leading American forces in Afghanistan, maintained eight notebooks that he filled with highly-sensitive information about the identities of covert officers, military strategy, intelligence capabilities and his discussions with senior government officials, including President Obama. Rather than handing over these “Black Books,” as the plea agreement calls them, to the Department of Defense when he retired from the military in 2011 to head the CIA, Petraeus retained them at his home and lent them, for several days, to Paula Broadwell, his authorized biographer and girlfriend.

  • Internet/Net Neutrality

    • Jeb Bush Is The Latest Politician To Demonstrate Absolutely No Understanding Of Net Neutrality

      Like many folks, I’m dreading the seeming inevitability of a Clinton-Bush presidential campaign next year involving Hillary Clinton against Jeb Bush. I’m 40-years-old and half of my life has involved a Clinton or a Bush in the Oval Office (and it’s even worse if you count Vice Presidency). Both seem completely out of touch with the real issues of today. Instead, both are so surrounded by political cronies and yes-men that it’s difficult to see either candidate as being willing to actually take on the real challenges facing the world today. Clinton is currently dealing with the fallout from her decision to expose her emails to spies while shielding them from the American public. And Jeb Bush is now spouting pure nonsense on net neutrality.

    • EU Digital Commissioner: Net Neutrality Is A ‘Taliban-Like’ Issue

      Until recently, most people probably assumed that real net neutrality was more likely to come to Europe than to the US. But in one of those ironic little twists, not only has the FCC voted in favor of net neutrality, but attacks on the idea in Europe have suddenly multiplied, leaving the final outcome there in doubt. Worryingly, one of the strongest verbal assaults on net neutrality comes from the very EU Commissioner who is in charge of the relevant legislation, Günther Oettinger.

    • Net Neutrality Clears Hurdle & Other Things

      Well, much of the focus for the week was on the Federal Communications Commission vote on increased net neutrality protections, and according to rational news sources reporting on the issue (e.g., just about everyone but Fox News and their wannabes), this is a good thing.

  • Intellectual Monopolies

    • Copyrights

      • Hollywood’s Anti-Piracy Secrets Must Be Revealed, Court Rules

        All records that are part of the now-closed case between Hotfile and the MPAA will be unsealed in the interests of the public. In a decision that will be a disappointment to the industry group, U.S. District Court Judge Kathleen Williams declined a request from the MPAA who wanted to keep sensitive court filings sealed indefinitely claiming they may benefit pirates.

      • Movie Group To “Kill Piracy” By Not Releasing Movies For Months

        There have been some radical solutions to online piracy in recent years but one coming out of India today is perhaps the most ‘ambitious’ so far. The Tamil Film Producer’s Council says it is in discussion to stop releasing all films for at least three months which means that pirates will have nothing to copy and will therefore go out of business.

      • Perceptions on piracy: Pirate Party evangelist Rick Falkvinge on a perennial problem

        We spoke to Pirate Party evangelist Rick Falkvinge to get his take on the current situation.

        He believes that the copyright cops, and the copyright mechanisms that they use, are a “preposterous” failure and that only a global change in perception will make a difference.

        Falkvinge, perhaps unsurprisingly, is low on sympathy for the copyright industry and its messages and solutions.

      • Aussie Anti-Piracy Plans Boost Demand for Anonymous VPNs

        Australians’ interest in VPN services has skyrocketed after local ISPs announced plans for a three-strikes anti-piracy system. With potential lawsuits against consumers on the table, many subscribers are now planning ahead to stay on the safe side.

Links 12/3/2015: Two-week Catchup

Posted in News Roundup at 5:21 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Apple’s watch is just another data-gathering device

    Whether Apple’s watch fails or not — and that is a relative question — it matters not one whit to the company. This is just another device which will help to boost the company’s data gathering.

  • Nine reasons only a tool would buy the Apple Watch
  • Apple Watch May Be DOA As Cook Admits Battery Life As Low As 3 Hours

    The Apple Watch may be pretty… but you are going to need up to 8 of them to make it through a full day. While Tim Cook proclaimed 18 hours of “all-day battery-life” – itself not particularly impressive compared to competing products, hidden deep in Apple Watch’s product page is a little admission that battery life (in use) could be as low as 3 hours…

  • Apple Watch battery lasts as little as three hours

    Using new device that costs up to £12,000 for phone conversations means it will die after three hours, Apple admits in post buried deep on its product page

  • Pioneering tech blog Gigaom shuts down after running out of money

    Gigaom, the influential technology website founded by Om Malik nearly a decade ago, is no more. Although Monday saw a lot of new content on the site, including a flood of news and analysis from Apple’s event, the site’s management ended the day at 5.57PM PT by posting a message notifying readers that “all operations have ceased” as a result of the company becoming unable to pay its creditors.

  • Gigaom shuts down as it runs out of money

    One of the oldest and most prominent technology blogs Gigaom has shut down after running out of money.

  • Disney’s $1 Billion Bet on a Magical Wristband

    If you want to imagine how the world will look in just a few years, once our cell phones become the keepers of both our money and identity, skip Silicon Valley and book a ticket to Orlando. Go to Disney World. Then, reserve a meal at a restaurant called Be Our Guest, using the Disney World app to order your food in advance.

  • Noam Chomsky on Life & Love: Still Going at 86, Renowned Dissident is Newly Married

    NOAM CHOMSKY: I’m a very private person. I’ve never talked about my own life much. But, you know, I’ve—personally, I’ve been very fortunate in my life, with—there have been tragedies. There have been wonderful things. And Valeria’s sudden appearance is one of those wonderful things.

    AARON MATÉ: You said, after your first wife, Carol, died, that life without love is empty—something along those lines. Can you talk about that?

    NOAM CHOMSKY: Well, I could produce some clichés, which have the merit of being true. Life without love is a pretty empty affair.

    AARON MATÉ: And your own tireless schedule, keeping up with your lectures, writing extensive articles, and still tirelessly answering the emails, from correspondence from people around the world—when I was in college, I remember I wrote you several times and got back these long, detailed answers on complex questions. And there’s people across the globe who could attest to a similar experience. Do you feel a certain obligation to respond to people? Because nobody would fault you, at the age of 86 now, if you took more time for yourself.

    NOAM CHOMSKY: I don’t know if it’s an obligation exactly. It’s a privilege, really. These are the important people in the world. I remember a wonderful comment by Howard Zinn about the countless number of unknown people who are the driving force in history and in progress. And that’s people like—I didn’t know you, but people like you writing from college. These are people that deserve respect, encouragement. They’re the hope for the future. They’re an inspiration for me personally.

  • Hardware

    • How Intel and PC makers prevent you from modifying your laptop’s firmware

      Modern UEFI firmware is a closed-source, proprietary blob of software baked into your PC’s hardware. This binary blob even includes remote management and monitoring features, which make it a potential security and privacy threat.

    • Easy Way to Get Coreboot

      Replacing the proprietary BIOS firmware on most computers is a process that often can be frustrating. It’s possible that your computer could be rendered unuseable in the process. Back in 2010 I managed to get coreboot working on the Gigabyte GA-6BCX motherboard and although the process went fairly smoothly it did consume a fair bit of time. Fortunately we now have an inexpensive way of obtaining a ready to go coreboot computer.

  • Health/Nutrition

  • Security

  • Defence/Police/Secrecy/Aggression

    • Venezuelan Parliament Passes Law to Confront US Aggression

      President Nicolas Maduro said the country’s National Assembly elections must go on “whether the empire wants it or not.”

      The Venezuelan National Asembly passed the enabling law that allows the country’s president to act to protect the peace against recent threats made by the United States government of Barack Obama.

      The bill, which received 99 percent of votes from the Great Patriotic Pole alliance – the largest voting bloc in the assembly, will now move to a second reading for final approval. The move follows a statement by the United States government Monday that declared Venezuela a “threat to the national security” and calling a national emergency.

    • The Possibility of Escape

      During my four stints in U.S. federal prisons, I’ve witnessed long-term inmates’ unconquerably humane response when a newcomer arrives. An unscripted choreography occurs and the new prisoner finds that other women will help her through the trauma of adjustment to being locked up for many months or years. Halfway through a three-month sentence myself, I’m saddened to realize that I’ll very likely adapt to an outside world for which these women, and prisoners throughout the U.S. prison system, are often completely invisible.

  • Transparency Reporting

    • Associated Press sues State Dept. over Hillary Clinton’s emails

      “The Associated Press filed a lawsuit Wednesday against the State Department to force the release of email correspondence and government documents from Hillary Rodham Clinton’s tenure as secretary of state.”

      Good for the AP. If only more news organizations would do more of this.

      “The legal action comes after repeated requests filed under the U.S. Freedom of Information Act have gone unfulfilled. They include one request AP made five years ago and others pending since the summer of 2013.’

    • Trade Secrets: We Must Act To Protect Whistleblowers!

      In late April 2015, the “trade secrets” directive will be discussed in the European Parliament. Having already given in to the pressure of journalists to remove the article on trade secrets in the French Macron Bill, La Quadrature du Net, Pila and a number of other organisations now call on president François Hollande and European representatives to defend whistleblowers, to define and protect their status and to ensure the necessary means are provided for judiciary follow-up on the crimes and offences that are revealed. The situation of whistleblowers, such as Edward Snowden or Chelsea Manning, is often dramatic and they must be protected and their safety guaranteed in order to safeguard fundamental freedoms.

  • Environment/Energy/Wildlife

  • PR/AstroTurf/Lobbying

  • Privacy

    • Romanian spy chief warns of ‘threat for EU from Hungary’

      Eduard Hellvig, currently a conservative MEP who has been chosen by President Klaus Iohannis to be the next chief of the Romanian foreign intelligence service, has published an article in which he warns of the “threat for the EU” from the rapprochement of Hungary with Moscow.

    • Can the NSA Break Microsoft’s BitLocker?

      The Intercept has a new story on the CIA’s — yes, the CIA, not the NSA — efforts to break encryption. These are from the Snowden documents, and talk about a conference called the Trusted Computing Base Jamboree. There are some interesting documents associated with the article, but not a lot of hard information.

    • The CIA Campaign to Steal Apple’s Secrets
    • Quebec resident Alain Philippon to fight charge for not giving up phone password at airport

      A Quebec man charged with obstructing border officials by refusing to give up his smartphone password says he will fight the charge.

      The case has raised a new legal question in Canada, a law professor says.

      Alain Philippon, 38, of Ste-Anne-des-Plaines, Que., refused to divulge his cellphone password to Canada Border Services Agency during a customs search Monday night at Halifax Stanfield International Airport.

    • America’s real secret revealed: Clinton, Petraeus & how elites protect their legacies

      That’s one of the conclusions American citizens might draw from two stories that broke this week: that former Secretary of State Hillary Clinton had conducted official State Department business using emails run through her own server, and that former CIA Director David Petraeus had kept 8 notebooks of unbelievably sensitive secrets in a rucksack in his home and, when she asked, had shared them with his mistress, Paula Broadwell.

    • Canadian Spies Collect Domestic Emails in Secret Security Sweep

      Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents.

    • Snowden Calls for Disobedience Against the U.S. Government
    • DOJ Inspector General Complains About FBI Foot-dragging

      Late last week, the Inspector General (IG) for the Justice Department sent a letter to Congress complaining of the FBI’s refusal to set a timeline for turning over documents related to an IG investigation of the Drug Enforcement Agency’s use of subpoenas to gain access to and use certain bulk data collections.

    • FBI Now Holding Up Michael Horowitz’ Investigation into the DEA

      Man, at some point Congress is going to have to declare the FBI legally contemptuous and throw them in jail.

      They continue to refuse to cooperate with DOJ’s Inspector General, as they have been for basically 5 years. But in Michael Horowitz’ latest complaint to Congress, he adds a new spin: FBI is not only obstructing his investigation of the FBI’s management impaired surveillance, now FBI is obstructing his investigation of DEA’s management impaired surveillance.

    • NZ Prime Minister: ‘I’ll Resign If GCSB Did Mass Surveillance’; GCSB: ‘We Did Mass Surveillance’; NZPM: ‘Uh…’

      Back in the summer of 2013 as the various “Five Eyes” countries were still reeling from the initial Snowden disclosures, New Zealand’s Prime Minister John Key promised to resign if it was ever proven that the GCSB (New Zealand’s equivalent to the NSA) had engaged in mass surveillance of New Zealanders — but with some caveats. He later said that he meant if it was proven that there was illegal surveillance going on. But of course, what’s legal can vary based on who’s in charge. Either way, late last year there were Snowden documents that proved GCSB regularly scooped up data on New Zealanders, and Key reacted to it by calling Glenn Greenwald “a loser.” Not quite the resignation you might have expected.

    • UK Foreign Secretary Philip Hammond says it’s time to ‘move on’ from Snowden

      The documents revealed today show how New Zealand’s spy agencies hacked into government-linked mobile phones in Asia to install malicious software to route data to the NSA.

      The disclosure shows how an “Asean target”, or member of the Association of Southeast Asian Nations, was targeted by the GCSB in March 2013.

    • U.K. Parliament says banning Tor is unacceptable and impossible

      Just months after U.K. Prime Minister David Cameron said he wants to ban encryption and online anonymity, the country’s parliament today released a briefing saying that the such an act is neither acceptable nor technically feasible.

      The briefing, issued by the Parliamentary Office of Science and Technology, specifically referenced the Tor anonymity network and its notorious ability to slide right around such censorship schemes.

    • Germany pushes for widespread end-to-end email encryption

      The De-Mail initiative dates back to 2011, when the German government decided to push for trusted email both as an e-government tool and as a way to cut down on official and corporate paper mail. De-Mail addresses are provided by the likes of Deutsche Telekom and United Internet’s Web.de, and those signing up for them need to show a form of official identification to do so. Receiving emails on a De-Mail address is free but sending them costs money.

    • Wikipedia co-founder Jimmy Wales slams federal government data retention laws

      Wikipedia co-founder and influential technology entrepreneur Jimmy Wales has slammed the federal government’s plan to make telcos store the metadata of every phone and internet user as a “human rights violation” and is considering the launch of his new mobile service in Australia.

    • Photo’s from mass surveillance, liberty & activism talk
    • Privacy, digital rights and social equality.

      Something that doesn’t really get aired very often is that dragnet surveillance can – and should – be flagged as a social issue, with serious implications for social mobility. The tools that are available to circumvent this kind of surveillance are overwhelmingly out of reach of poor, marginalised groups; the ability to buy in to specialist encryption like PGP is, sadly, still overwhelmingly out of reach for many people. Reliable encryption remains firmly in the realm of the IT savvy: people with a certain level of education, money and, to use a hot-button word: privilege (sorry).

    • Wikipedia Sues NSA Over Dragnet Internet Surveillance

      The lawsuit argues that this broad surveillance, revealed in documents leaked by former NSA contractor Edward Snowden, violates the First Amendment by chilling speech and the open exchange of information, and that it also runs up against Fourth Amendment privacy protections.

    • CIA ‘tried to crack security of Apple devices’

      The CIA led sophisticated intelligence agency efforts to undermine the encryption used in Apple phones, as well as insert secret surveillance back doors into apps, top-secret documents published by the Intercept online news site have revealed.

    • You Can Watch ‘Citizenfour’ Online Right Now For Free
    • THE “SNOWDEN IS READY TO COME HOME!” STORY: A CASE STUDY IN TYPICAL MEDIA DECEIT

      Most sentient people rationally accept that the U.S. media routinely disseminates misleading stories and outright falsehoods in the most authoritative tones. But it’s nonetheless valuable to examine particularly egregious case studies to see how that works. In that spirit, let’s take yesterday’s numerous, breathless reports trumpeting the “BREAKING” news that “Edward Snowden now wants to come home!” and is “now negotiating the terms of his return!”

      Ever since Snowden revealed himself to the public 20 months ago, he has repeatedly said the same exact thing when asked about his returning to the U.S.: I would love to come home, and would do so if I could get a fair trial, but right now, I can’t.

      His primary rationale for this argument has long been that under the Espionage Act, the 1917 statute under which he has been charged, he would be barred by U.S. courts from even raising his key defense: that the information he revealed to journalists should never have been concealed in the first place and he was thus justified in disclosing it to journalists. In other words, when U.S. political and media figures say Snowden should “man up,” come home and argue to a court that he did nothing wrong, they are deceiving the public, since they have made certain that whistleblowers charged with “espionage” are legally barred from even raising that defense.

      [...]

      CNN’s “expert” is apparently unaware that the DOJ very frequently — almost always, in fact — negotiates with people charged with very serious felonies over plea agreements. He’s also apparently unaware of this thing called “asylum,” which the U.S. routinely grants to people charged by other countries with crimes on the ground that they’d be persecuted with imprisonment if they returned home.

    • Edward Snowden archive aims to ‘piece together the bigger picture’

      A Canadian team has created a searchable database of all the publicly released classified documents leaked by former U.S. National Security Agency contractor Edward Snowden in hopes it’ll help citizens better understand the complex files trickling out around the world.

      The Canadian Journalists for Free Expression and the Politics of Surveillance Project at University of Toronto’s faculty of information revealed the archive on Wednesday before hosting a live Q&A with Snowden, the U.S. whistleblower and subject of the Oscar-winning documentary Citizenfour.

      “What we’re hoping this database can do is start to piece together the bigger picture,” said Laura Tribe, CJFE’s national and digital programs lead.

    • EFF, ACLU, Other NGOs Urging U.N. to Create Privacy Watchdog

      A coalition of 63 non-governmental organizations (NGOs) from around the world are calling on national governments to support the establishment of a special rapporteur on the right to privacy within the United Nations.

  • Civil Rights

    • Michigan Attorney General Slaps Reporter With Bogus Subpoenas For Doing Her Job

      That makes no sense at all. Defending the state from lawsuits should never involve sending reporters subpoenas demanding all of their notes. It’s a clear intimidation technique that violates all basic concepts of a free and open press.

    • Porn and the patrol car—one cop’s 2 hour-a-day habit

      Pornography, though prevalent in the modern world, still isn’t the sort of thing one expects to see while waiting in traffic behind a cop car. That’s especially true at the busiest downtown intersection of a wealthy Chicago suburb like Wheaton, Illinois, best known for being the home of an evangelical Christian college once attended by Billy Graham.

      But pornography is exactly what an irate Wheaton resident named Robin said he witnessed. On the morning of September 18, 2013, while sitting in his conversion van and waiting for a stoplight to change, Robin found himself directly behind Wheaton Police squad car 359. The height of his seat gave him a perfect view through the rear windshield of the squad car, and he could see the car’s mobile data computer displaying “scrolling pictures of completely naked women.”

    • AG backs off subpoenas over inmates’ allegations

      Attorney General Bill Schuette’s office ordered and then withdrew three subpoenas of journalists reporting on a juvenile prisoner abuse lawsuit against the state, including one seeking a reporter’s notes from interviewing inmates inside two state prisons.

    • Michigan AG withdraws subpoenas against Michigan Radio, Huffington Post

      Michigan’s Attorney General’s office has decided to withdraw subpoenas it served on news media outlets, including Michigan Radio.

    • Man who posed for his driver’s licence with a PASTA STRAINER on his head is told he must have his photo retaken… but he claims it’s just discrimination against the Church of the Flying Spaghetti Monster

      A follower of the Church of the Flying Spaghetti Monster claims he was discriminated against when he was told he may no longer wear a colander on his head in a driver’s licence photo.

      Last year, Preshalin Moodley, 20, was issued a provisional driver’s licence by staff at Service NSW Parramatta, in Sydney’s west.

      He was photographed for the licence wearing the spaghetti strainer on his head after asking staff whether it was OK to wear a religious symbol.

    • Jeff Bezos relies on lowly grunts like me: Life as a cog in the Amazon machine

      In my father’s capitalism, employees were nurtured by their company and encouraged to learn new skills. Today’s major corporations hire disposable temp workers to do the work of a full-time employee, without the obligation of providing benefits. Temp workers are familiar with dead ends: They are hired with a predetermined exit date. The moment they feel comfortable in a role, the contract expires and it’s on to the next job.

    • Tony Robinson Killing Highlights Wisconsin’s Racial Inequities

      Soon after becoming governor in 2011, Scott Walker eliminated funding for the state’s first program to track and remedy Wisconsin’s worst-in-the-country rate of racial disparities. The program, aimed at monitoring racial profiling during traffic stops, had only taken effect one month earlier, and Walker declared that the repeal “allows law enforcement agencies to focus on doing their jobs.”

    • How Thatcher’s Government Covered Up a VIP Pedophile Ring

      A newspaper editor was handed startling evidence that Britain’s top law enforcement official knew there was a VIP pedophile network in Westminster, at the heart of the British government. What happened next in the summer of 1984 helps to explain how shocking allegations of rape and murder against some of the country’s most powerful men went unchecked for decades.

    • Atheist Group Blasts ‘Absurd’ Decision to Censor Its Easter Billboards

      The group American Atheists addressed the controversy surrounding its billboards in Nashville, Tennessee by pointing out that it’s hypocritical of the company to censor the group’s advertising when Christian groups routinely promote antigay, pro-religion messages in their own publicity materials.

      In an interview with Raw Story, American Atheists’ Danielle Muscato said, “This is just absurd. It’s just because we’re atheists. It’s discriminatory.”

    • Ferguson police report: Most shocking parts

      Summer of 2012. A 32-year-old African-American was cooling off in his car after a basketball game in a public park.

      What comes next is a series of civil rights violations described in the Justice Department report that resulted in the man losing his job as a federal contractor.

      A Ferguson police officer demands the man’s Social Security number and identification before accusing him of being a pedophile and ordering the man out of his car.

      When the officer asked to search the man’s car, the 32-year-old refused, invoking his constitutional right.

      The response? The officer arrested the man at gunpoint, slapped him with eight charges, including for not wearing a seat belt, despite the fact that he was sitting in a parked car. The officer also cited him for “making a false declaration” because he gave his name as ‘Mike’ instead of ‘Michael.’

  • Internet/Net Neutrality

    • FCC approves net neutrality rules, reclassifies broadband as a utility

      It’s a good day for proponents of an open internet: The Federal Communications Commission just approved its long-awaited network neutrality plan, which reclassifies broadband internet as a Title II public utility and gives the agency more regulatory power in the process. And unlike the FCC’s last stab at net neutrality in 2010, today’s new rules also apply to mobile broadband. FCC Chairman Tom Wheeler laid out the basic gist of the plan earlier this month — it’ll ban things like paid prioritization, a tactic some ISPs used to get additional fees from bandwidth-heavy companies like Netflix, as well as the slowdown of “lawful content.” But now Wheeler’s vision is more than just rhetoric; it’s something the FCC can actively enforce.

    • FCC votes to protect the internet with Title II regulation

      Net neutrality has won at the FCC. In a 3-to-2 vote, the Federal Communications Commission today established a new Open Internet Order that implements strict net neutrality rules, including prohibitions on site and app blocking, speed throttling, and paid fast lanes.

    • Net neutrality is only the beginning of an open internet

      Net neutrality is the principle of making sure that your internet service provider doesn’t make it easier for you to access one service over another – the Guardian over the Telegraph, say – or otherwise distorting your use of internet services just because someone dropped a few extra quid in their pocket.

    • Latest Net Neutrality proposal in the EU: a wolf in sheep’s clothing?
  • Intellectual Monopolies

    • How Corporate Sovereignty In Trade Agreements Can Force National Laws To Be Changed

      As we noted recently, one of the most worrying aspects of corporate sovereignty chapters in trade agreements is the chilling effect that they can have on future legislation. That’s something that the supporters of this investor-state dispute settlement (ISDS) mechanism never talk about. What they do say, though, is that corporate sovereignty cannot force governments to change existing laws.

    • TTIP Updates – The Glyn Moody blogs
    • Copyrights

      • Copyright In Brussels: Two Reports, More Than Meets the Eye

        Just as the Julia Reda report (GREEN/EFA – DE MEP) on copyright reform was being discussed this week in the European Parliament Committee on Legal Affairs (JURI), another report was examined today by the Committee on Culture and Education (CULT). The latter concerns the reinforcement of the “Intellectual Property” rights, and contains a number of disturbing points regarding repression and enforcement that bring back to mind highly contested provisions from the ACTA agreement, and encourages an extra-legislative approach to fighting “commercial scale counterfeiting”. Citizens should get ready to mobilise on a large scale, both to support the positive evolutions of the Reda report, and to denounce the dangerous proposals pushed by the European Commission and some Member States, among which France.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts