summaryrefslogtreecommitdiff
path: root/talermerchantdemos/blog/articles/en/surveillance-vs-democracy.html
blob: c69d3a73e166f080acd99a1d5b89d3e86ccecd54 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.90 -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
#intro { margin: 2em auto 1.5em; }
.pict.wide { width: 23em; }
.pict p { margin-top: .2em; }
@media (min-width: 55em) {
   #intro { max-width: 55em; }
   .pict.wide { margin-bottom: 0; }
}
--></style>
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>

<address class="byline center">by
<a href="http://www.stallman.org/">Richard Stallman</a></address>

<!-- rms: I deleted the link because of Wired's announced
     anti-ad-block system -->
<blockquote class="center"><p><em>A version of this article was first published in
<cite>Wired</cite> in October&nbsp;2013.<br />
Also consider reading &ldquo;<a
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
radical proposal to keep your personal data safe</a>,&rdquo; published in
<cite>The Guardian</cite> in April&nbsp;2018.</em></p></blockquote>

<div class="article">

<div id="intro">
<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the three ads that popped up on his computer screen..." /></a>
<p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
</div>

<p>Thanks to Edward Snowden's disclosures, we know that the current
level of general surveillance in society is incompatible with human
rights.  The repeated harassment and prosecution of dissidents,
sources, and journalists in the US and elsewhere provides
confirmation.  We need to reduce the level of general surveillance,
but how far?  Where exactly is the
<em>maximum tolerable level of surveillance</em>, which we must ensure
is not exceeded?  It is the level beyond which surveillance starts to
interfere with the functioning of democracy, in that whistleblowers
(such as Snowden) are likely to be caught.</p>
</div>
<div class="columns" style="clear:both">
<p>Faced with government secrecy, we the people depend on
whistleblowers
to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
us what the state is doing</a>.  (We were reminded of this in 2019 as
various whistleblowers gave the public increments
of <a href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy">information
about Trump's attempt to shake down the president of Ukraine</a>.)
However, today's surveillance intimidates potential whistleblowers,
which means it is too much.  To recover our democratic control over
the state, we must reduce surveillance to the point where
whistleblowers know they are safe.</p>

<p>Using free/libre
software, <a href="/philosophy/free-software-even-more-important.html">as
I've advocated since 1983</a>, is the first step in taking control
of our digital lives, and that includes preventing surveillance.  We
can't trust nonfree software; the NSA
<a href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
even <a href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
and routers.  Free software gives us control of our own computers,
but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
protect our privacy once we set foot on the Internet</a>.</p>

<p><a
href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
legislation to &ldquo;curtail the domestic surveillance
powers&rdquo;</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers.  That won't
suffice to protect whistleblowers if &ldquo;catching the
whistleblower&rdquo; is grounds for access sufficient to identify him
or her.  We need to go further.</p>
</div>

<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a Democracy</h3>

<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
last shred of effective control over our government and institutions.
That's why surveillance that enables the state to find out who has
talked with a reporter is too much surveillance&mdash;too much for
democracy to endure.</p>

<p>An unnamed U.S. government official ominously told journalists in
2011 that
the <a href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S. would
not subpoena reporters because &ldquo;We know who you're talking
to.&rdquo;</a>
Sometimes <a href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
and <a href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>

<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them.  The ACLU has
demonstrated the U.S. government's <a
href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them.  The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
</div>

<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>

<div  class="columns">
<p id="willbemisused">When people recognize
that the level of general surveillance is too
high, the first response is to propose limits on access to the
accumulated data.  That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
&ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
excuse to access the accumulated material.</p>

<p>In practice, we can't expect state agencies even to make up excuses
to satisfy the rules for using surveillance data&mdash;because US
agencies
already <a href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/">
lie to cover up breaking the rules</a>.  These rules are not seriously
meant to be obeyed; rather, they are a fairy-tale we can believe if we
like.</p>

<p>In addition, the state's surveillance staff will misuse the data
for personal reasons.  Some NSA
agents <a href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
U.S. surveillance systems to track their lovers</a>&mdash;past,
present, or wished-for&mdash;in a practice called
&ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
few times; we don't know how many other times it wasn't caught.  But
these events shouldn't surprise us, because police have
long <a href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">used
their access to driver's license records to track down someone
attractive</a>, a practice known as &ldquo;running a plate for a
date.&rdquo; This practice has expanded
with <a href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>.  In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
to <a href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
other instances in the US</a>.
</p>

<p>Surveillance data will always be used for other purposes, even if
this is prohibited.  Once the data has been accumulated and the state
has the possibility of access to it, it can misuse that data in
dreadful ways, as shown by examples
from <a href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
recently <a href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
</p>

<p>Personal data collected by the state is also likely to be obtained
by outside crackers that break the security of the servers, even
by <a href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
working for hostile states</a>.</p>

<p>Governments can easily use massive surveillance capability
to <a href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
democracy directly</a>.</p>

<p>Total surveillance accessible to the state enables the state to
launch a massive fishing expedition against any person.  To make
journalism and democracy safe, we must limit the accumulation of data
that is easily accessible to the state.</p>
</div>

<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>

<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
a set of legal principles designed to <a
href="https://necessaryandproportionate.org">prevent the
abuses of massive surveillance</a>.  These principles include,
crucially, explicit legal protection for whistleblowers; as a
consequence, they would be adequate for protecting democratic
freedoms&mdash;if adopted completely and enforced without exception
forever.</p>

<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>

<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
handful of people, can be hyped to provide an opportunity.</p>

<p>If limits on access to the data are set aside, it will be as if
they had never existed: years worth of dossiers would suddenly become
available for misuse by the state and its agents and, if collected by
companies, for their private misuse as well.  If, however, we stop the
collection of dossiers on everyone, those dossiers won't exist, and
there will be no way to compile them retroactively.  A new illiberal
regime would have to implement surveillance afresh, and it would only
collect data starting at that date.  As for suspending or momentarily
ignoring this law, the idea would hardly make sense.</p>
</div>

<h3 class="subheader">First, Don't Be Foolish</h3>

<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
to protect your privacy is you.  Avoid identifying yourself to web
sites, contact them with Tor, and use browsers that block the schemes
they use to track visitors.  Use the GNU Privacy Guard to encrypt the
contents of your email.  Pay for things with cash.</p>

<p>Keep your own data; don't store your data in a company's
&ldquo;convenient&rdquo; server.  It's safe, however, to entrust a
data backup to a commercial service, provided you put the files in an
archive and encrypt the whole archive, including the names of the
files, with free software on your own computer before uploading
it.</p>

<p>For privacy's sake, you must avoid nonfree software; if you give
control of your computer's operations to companies, they
are <a href="/malware/proprietary-surveillance.html">likely to make it
spy on you</a>.
Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
as a software substitute</a>; in addition to giving others control of
how your computing is done, it requires you to hand over all the
pertinent data to the company's server.</p>

<p>Protect your friends' and acquaintances' privacy,
too.  <a href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
they might not wish to publish in a newspaper.  Better yet, don't be
used by Facebook at all.  Reject communication systems that require
users to give their real names, even if you are happy to divulge yours,
since they pressure other people to surrender their privacy.</p>

<p>Self-protection is essential, but even the most rigorous
self-protection is insufficient to protect your privacy on or from
systems that don't belong to you.  When we communicate with others or
move around the city, our privacy depends on the practices of society.
We can avoid some of the systems that surveil our communications and
movements, but not all of them.  Clearly, the better solution is to
make all these systems stop surveilling people other than legitimate
suspects.</p>
</div>

<h3 class="subheader">We Must Design Every System for Privacy</h3>

<div class="columns">
<p>If we don't want a total surveillance society, we must consider
surveillance a kind of social pollution, and limit the surveillance
impact of each new digital system just as we limit the environmental
impact of physical construction.</p>

<p>For example: &ldquo;smart&rdquo; meters for electricity are touted
for sending the power company moment-by-moment data about each
customer's electric usage, including how usage compares with users in
general.  This is implemented based on general surveillance, but does
not require any surveillance.  It would be easy for the power company
to calculate the average usage in a residential neighborhood by
dividing the total usage by the number of subscribers, and send that
to the meters.  Each customer's meter could compare her usage, over
any desired period of time, with the average usage pattern for that
period.  The same benefit, with no surveillance!</p>

<p>We need to design such privacy into all our digital
systems&nbsp;[<a href="#ambientprivacy">1</a>].</p>
</div>

<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>

<div class="columns">
<p>One way to make monitoring safe for privacy is
to <a name="dispersal">keep the data dispersed and inconvenient to
access</a>.  Old-fashioned security cameras were no threat to privacy(<a href="#privatespace">*</a>).
The recording was stored on the premises, and kept for a few weeks at
most.  Because of the inconvenience of accessing these recordings, it
was never done massively; they were accessed only in the places where
someone reported a crime.  It would not be feasible to physically
collect millions of tapes every day and watch them or copy them.</p>

<p>Nowadays, security cameras have become surveillance cameras: they
are connected to the Internet so recordings can be collected in a data
center and saved forever.  In Detroit, the cops pressure businesses to
give them <a
href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
access to their surveillance cameras</a> so that they can look through
them at any and all times.  This is already dangerous, but it is going
to get worse.  Advances in face recognition may bring the day when
suspected journalists can be tracked on the street all the time to see
who they talk with.</p>

<p>Internet-connected cameras often have lousy digital security
themselves, which means <a
href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html">anyone
can watch what those cameras see</a>.  This makes internet-connected
cameras a major threat to security as well as privacy.  For privacy's
sake, we should ban the use of Internet-connected cameras aimed where
and when the public is admitted, except when carried by people.
Everyone must be free to post photos and video recordings
occasionally, but the systematic accumulation of such data on the
Internet must be limited.</p>

<p><a name="privatespace"><b>*</b></a> I assume here that the security
camera points at the inside of a store, or at the street.  Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
</div>

<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce Surveillance</h3>

<div class="columns">
<p>Most data collection comes from people's own digital activities.
Usually the data is collected first by companies.  But when it comes
to the threat to privacy and democracy, it makes no difference whether
surveillance is done directly by the state or farmed out to a
business, because the data that the companies collect is
systematically available to the state.</p>

<p>The NSA, through PRISM,
has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
into the databases of many large Internet corporations</a>.  AT&amp;T
has saved all its phone call records since 1987
and <a href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
them available to the DEA</a> to search on request.  Strictly
speaking, the U.S.  government does not possess that data, but in
practical terms it may as well possess it.  Some companies are praised
for <a href="https://www.eff.org/who-has-your-back-government-data-requests-2015">resisting
government data requests to the limited extent they can</a>, but that
can only partly compensate for the harm they do to by collecting that
data in the first place.  In addition, many of those companies misuse
the data directly or provide it to data brokers.</p>

<p>The goal of making journalism and democracy safe therefore requires
that we reduce the data collected about people by any organization,
not just by the state.  We must redesign digital systems so that they
do not accumulate data about their users.  If they need digital data
about our transactions, they should not be allowed to keep them more
than a short time beyond what is inherently necessary for their
dealings with us.</p>

<p>One of the motives for the current level of surveillance of the
Internet is that sites are financed through advertising based on
tracking users' activities and propensities.  This converts a mere
annoyance&mdash;advertising that we can learn to ignore&mdash;into a
surveillance system that harms us whether we know it or not.
Purchases over the Internet also track their users.  And we are all
aware that &ldquo;privacy policies&rdquo; are more excuses to violate
privacy than commitments to uphold it.</p>

<p>We could correct both problems by adopting a system of anonymous
payments&mdash;anonymous for the payer, that is.  (We don't want to
help the payee dodge
taxes.)  <a href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin.  However, technology
for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; the GNU software for doing
this is called <a href="http://taler.net/">GNU Taler</a>.  Now we need
only suitable business arrangements, and for the state not to obstruct
them.</p>

<p>Another possible method for anonymous payments would
use <a href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
phone cards</a>.  It is less convenient, but very easy to
implement.</p>

<p>A further threat from sites' collection of personal data is that
security breakers might get in, take it, and misuse it.  This includes
customers' credit card details.  An anonymous payment system would end
this danger: a security hole in the site can't hurt you if the site
knows nothing about you.</p>
</div>

<h3 class="subheader">Remedy for Travel Surveillance</h3>

<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
digital cash, for instance).  License-plate recognition systems
<a href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated">
recognize all cars' license plates</a>, and
the <a href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
can be kept indefinitely</a>; they should be required by law to notice
and record only those license numbers that are on a list of cars
sought by court orders.  A less secure alternative would record all
cars locally but only for a few days, and not make the full data
available over the Internet; access to the data should be limited to
searching for a list of court-ordered license-numbers.</p>

<p>The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is
<a href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
without trial</a>.</p>

<p>It is acceptable to have a list of people whose person and luggage
will be searched with extra care, and anonymous passengers on domestic
flights could be treated as if they were on this list.  It is also
acceptable to bar non-citizens, if they are not permitted to enter the
country at all, from boarding flights to the country.  This ought to
be enough for all legitimate purposes.</p>

<p>Many mass transit systems use some kind of smart cards or RFIDs for
payment.  These systems accumulate personal data: if you once make the
mistake of paying with anything but cash, they associate the card
permanently with your name.  Furthermore, they record all travel
associated with each card.  Together they amount to massive
surveillance.  This data collection must be reduced.</p>

<p>Navigation services do surveillance: the user's computer tells the
map service the user's location and where the user wants to go; then
the server determines the route and sends it back to the user's
computer, which displays it.  Nowadays, the server probably records
the user's locations, since there is nothing to prevent it.  This
surveillance is not inherently necessary, and redesign could avoid it:
free/libre software in the user's computer could download map data for
the pertinent regions (if not downloaded previously), compute the
route, and display it, without ever telling anyone where the user is
or wants to go.</p>

<p>Systems for borrowing bicycles, etc., can be designed so that the
borrower's identity is known only inside the station where the item
was borrowed.  Borrowing would inform all stations that the item is
&ldquo;out,&rdquo; so when the user returns it at any station (in
general, a different one), that station will know where and when that
item was borrowed.  It will inform the other station that the item is
no longer &ldquo;out.&rdquo; It will also calculate the user's bill,
and send it (after waiting some random number of minutes) to
headquarters along a ring of stations, so that headquarters would not
find out which station the bill came from.  Once this is done, the
return station would forget all about the transaction.  If an item
remains &ldquo;out&rdquo; for too long, the station where it was
borrowed can inform headquarters; in that case, it could send the
borrower's identity immediately.</p>
</div>

<h3 class="subheader">Remedy for Communications Dossiers</h3>

<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc).  With
mobile phones, they
also <a href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
the user's physical location</a>.  They keep these dossiers for a long
time: over 30 years, in the case of AT&amp;T.  Soon they will
even <a href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
the user's body activities</a>.  It appears that
the <a href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
collects cell phone location data</a> in bulk.</p>

<p>Unmonitored communication is impossible where systems create such
dossiers.  So it should be illegal to create or keep them.  ISPs and
phone companies must not be allowed to keep this information for very
long, in the absence of a court order to surveil a certain party.</p>

<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated&mdash;which is what
the <a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S. does
with some or all phone companies</a>.  We would have to rely on
prohibiting that by law.  However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
clearly prohibit the practice.  In addition, if the government did
resume this sort of surveillance, it would not get data about
everyone's phone calls made prior to that time.</p>

<p>For privacy about who you exchange email with, a simple partial
solution is for you and others to use email services in a country that
would never cooperate with your own government, and which communicate
with each other using encryption.  However, Ladar Levison (owner of
the mail service Lavabit that US surveillance sought to corrupt
completely) has a more sophisticated idea for an encryption system
through which your email service would know only that you sent mail to
some user of my email service, and my email service would know only
that I received mail from some user of your email service, but it
would be hard to determine that you had sent mail to me.</p>
</div>

<h3 class="subheader">But Some Surveillance Is Necessary</h3>

<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
specific crimes, or specific suspected planned crimes, under a court
order.  With the Internet, the power to tap phone conversations would
naturally extend to the power to tap Internet connections.  This power
is easy to abuse for political reasons, but it is also necessary.
Fortunately, this won't make it possible to find whistleblowers after
the fact, if (as I recommend) we prevent digital systems from accumulating
massive dossiers before the fact.</p>

<p>Individuals with special state-granted power, such as police,
forfeit their right to privacy and must be monitored.  (In fact,
police have their own jargon term for perjury,
&ldquo;<a href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302">testilying</a>,&rdquo;
since they do it so frequently, particularly about protesters
and <a href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/">
photographers</a>.)
One city in California that required police to wear video cameras all
the time
found <a href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
use of force fell by 60%</a>.  The ACLU is in favor of this.</p>

<p><a
href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
are not people, and not entitled to human rights</a>.  It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being.  The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
that of terrorism.</p>

<p>However, journalism must be protected from surveillance even when
it is carried out as part of a business.</p>
</div>
<div class="column-limit"></div>

<div class="reduced-width">
<p>Digital technology has brought about a tremendous increase in the
level of surveillance of our movements, actions, and communications.
It is far more than we experienced in the 1990s, and <a
href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far
more than people behind the Iron Curtain experienced</a> in the 1980s,
and proposed legal limits on state use of the accumulated data would
not alter that.</p>

<p>Companies are designing even more intrusive surveillance.  Some
project that pervasive surveillance, hooked to companies such as
Facebook, could have deep effects on <a
href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how
people think</a>.  Such possibilities are imponderable; but the threat
to democracy is not speculation.  It exists and is visible today.</p>

<p>Unless we believe that our free countries previously suffered from
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
</div>
<div class="column-limit"></div>

<h3 style="font-size: 1.2em">End Note</h3>
<ol>
<li id="ambientprivacy">The condition of <em>not being monitored</em>
has been referred to as <a
href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient
privacy</a>.</li>
</ol>
</div>

</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
<div class="unprintable">

<p>Please send general FSF &amp; GNU inquiries to
<a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>.
There are also <a href="/contact/">other ways to contact</a>
the FSF.  Broken links and other corrections or suggestions can be sent
to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>.</p>

<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
        replace it with the translation of these two:

        We work hard and do our best to provide accurate, good quality
        translations.  However, we are not exempt from imperfection.
        Please send your comments and general suggestions in this regard
        to <a href="mailto:web-translators@gnu.org">
        &lt;web-translators@gnu.org&gt;</a>.</p>

        <p>For information on coordinating and submitting translations of
        our web pages, see <a
        href="/server/standards/README.translations.html">Translations
        README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
README</a> for information on coordinating and submitting translations
of this article.</p>
</div>

<!-- Regarding copyright, in general, standalone pages (as opposed to
     files generated as part of manuals) on the GNU web server should
     be under CC BY-ND 4.0.  Please do NOT change or remove this
     without talking with the webmasters or licensing team first.
     Please make sure the copyright date is consistent with the
     document.  For web pages, it is ok to list just the latest year the
     document was modified, or published.
     
     If you wish to list earlier years, that is ok too.
     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
     years, as long as each year in the range is in fact a copyrightable
     year, i.e., a year in which the document was published (including
     being publicly visible on the web or in a revision control system).
     
     There is more detail about copyright years in the GNU Maintainers
     Information document, www.gnu.org/prep/maintain. -->

<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>

<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
Commons Attribution-NoDerivatives 4.0 International License</a>.</p>

<!--#include virtual="/server/bottom-notes.html" -->

<p class="unprintable">Updated:
<!-- timestamp start -->
$Date: 2020/10/06 08:00:33 $
<!-- timestamp end -->
</p>
</div>
</div><!-- for class="inner", starts in the banner include -->
</body>
</html>