surveillance-vs-democracy.html (36019B)
1 <!--#include virtual="/server/header.html" --> 2 <!-- Parent-Version: 1.97 --> 3 <!-- This page is derived from /server/standards/boilerplate.html --> 4 <!--#set var="TAGS" value="essays cultural evils" --> 5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --> 6 <title>How Much Surveillance Can Democracy Withstand? 7 - GNU Project - Free Software Foundation</title> 8 <style type="text/css" media="print,screen"><!-- 9 #intro { margin: 2em auto 1.5em; } 10 .toc { width: auto; } 11 .pict.wide { width: 23em; } 12 .pict p { margin-bottom: 0; } 13 #conclusion { visibility: hidden; margin-top: 0; } 14 @media (min-width: 55em) { 15 #intro { max-width: 55em; } 16 .toc { max-width: 51em; } 17 .toc li { display: inline-block; width: 90%; } 18 } 19 --> 20 </style> 21 <!-- GNUN: localize URL /graphics/dog.small.jpg --> 22 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" --> 23 <!--#include virtual="/server/banner.html" --> 24 <!--#include virtual="/philosophy/ph-breadcrumb.html" --> 25 <!--GNUN: OUT-OF-DATE NOTICE--> 26 <!--#include virtual="/server/top-addendum.html" --> 27 <div class="article"> 28 <h2 class="center">How Much Surveillance Can Democracy Withstand?</h2> 29 30 <address class="byline center">by 31 <a href="https://www.stallman.org/">Richard Stallman</a></address> 32 33 <div id="intro"> 34 <div class="pict wide"> 35 <a href="/graphics/dog.html"> 36 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the three ads that popped up on his computer screen..." /></a> 37 <p>“How did they find out I'm a dog?”</p> 38 </div> 39 40 <p>Thanks to Edward Snowden's disclosures, we know that the current 41 level of general surveillance in society is incompatible with human 42 rights. Expecting every action to be noted down <a href="https://www.socialcooling.com/">makes people censor and 43 limit themselves</a>. The repeated harassment and prosecution of dissidents, 44 sources, and journalists in the US and elsewhere provides 45 confirmation. We need to reduce the level of general surveillance, 46 but how far? Where exactly is the 47 <em>maximum tolerable level of surveillance</em>, which we must ensure 48 is not exceeded? It is the level beyond which surveillance starts to 49 interfere with the functioning of democracy, in that whistleblowers 50 (such as Snowden) are likely to be caught.</p> 51 </div> 52 53 <div class="columns" style="clear:both"> 54 <p>Faced with government secrecy, we the people depend on 55 whistleblowers 56 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell 57 us what the state is doing</a>. (We were reminded of this in 2019 as 58 various whistleblowers gave the public increments 59 of <a href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy">information 60 about Trump's attempt to shake down the president of Ukraine</a>.) 61 However, today's surveillance intimidates potential whistleblowers, 62 which means it is too much. To recover our democratic control over 63 the state, we must reduce surveillance to the point where 64 whistleblowers know they are safe.</p> 65 66 <p>Using free/libre 67 software, <a href="/philosophy/free-software-even-more-important.html">as 68 I've advocated since 1983</a>, is the first step in taking control 69 of our digital lives, and that includes preventing surveillance. We 70 can't trust nonfree software; the NSA 71 <a href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a> 72 and 73 even <a href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a> 74 security weaknesses in nonfree software to invade our own computers 75 and routers. Free software gives us control of our own computers, 76 but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't 77 protect our privacy once we set foot on the Internet</a>.</p> 78 79 <p><a 80 href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan 81 legislation to “curtail the domestic surveillance 82 powers”</a> in the U.S. is being drawn up, but it relies on 83 limiting the government's use of our virtual dossiers. That won't 84 suffice to protect whistleblowers if “catching the 85 whistleblower” is grounds for access sufficient to identify him 86 or her. We need to go further.</p> 87 </div> 88 89 <div class="toc" style="clear: both"> 90 <hr class="no-display" /> 91 <h3 class="no-display">Table of contents</h3> 92 <ul class="columns"> 93 <li><a href="#upperlimit">The Upper Limit on Surveillance in a Democracy</a></li> 94 <li><a href="#willbemisused">Information, Once Collected, Will Be Misused</a></li> 95 <li><a href="#technical">Robust Protection for Privacy Must Be Technical</a></li> 96 <li><a href="#commonsense">First, Don't Be Foolish</a></li> 97 <li><a href="#privacybydesign">We Must Design Every System for Privacy</a></li> 98 <li><a href="#dispersal">Remedy for Collecting Data: Leaving It Dispersed</a></li> 99 <li><a href="#digitalcash">Remedy for Internet Commerce Surveillance</a></li> 100 <li><a href="#travel">Remedy for Travel Surveillance</a></li> 101 <li><a href="#communications">Remedy for Communications Dossiers</a></li> 102 <li><a href="#necessary">But Some Surveillance Is Necessary</a></li> 103 <li><a href="#conclusion">Conclusion</a></li> 104 </ul> 105 <hr class="no-display" /> 106 </div> 107 108 <h3 id="upperlimit">The Upper Limit on Surveillance in a Democracy</h3> 109 110 <div class="columns"> 111 <p>If whistleblowers don't dare reveal crimes and lies, we lose the 112 last shred of effective control over our government and institutions. 113 That's why surveillance that enables the state to find out who has 114 talked with a reporter is too much surveillance—too much for 115 democracy to endure.</p> 116 117 <p>An unnamed U.S. government official ominously told journalists in 118 2011 that 119 the <a href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S. would 120 not subpoena reporters because “We know who you're talking 121 to.”</a> 122 Sometimes <a href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists' 123 phone call records are subpoenaed</a> to find this out, but Snowden 124 has shown us that in effect they subpoena all the phone call records 125 of everyone in the U.S., all the 126 time, <a href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from 127 Verizon</a> 128 and <a href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from 129 other companies too</a>.</p> 130 131 <p>Opposition and dissident activities need to keep secrets from 132 states that are willing to play dirty tricks on them. The ACLU has 133 demonstrated the U.S. government's <a 134 href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic 135 practice of infiltrating peaceful dissident groups</a> on the pretext 136 that there might be terrorists among them. The point at which 137 surveillance is too much is the point at which the state can find who 138 spoke to a known journalist or a known dissident.</p> 139 </div> 140 141 <h3 id="willbemisused">Information, Once Collected, Will Be Misused</h3> 142 143 <div class="columns"> 144 <p>When people recognize 145 that the level of general surveillance is too 146 high, the first response is to propose limits on access to the 147 accumulated data. That sounds nice, but it won't fix the problem, not 148 even slightly, even supposing that the government obeys the rules. 149 (The NSA has misled the FISA court, which said it 150 was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable 151 to effectively hold the NSA accountable</a>.) Suspicion of a crime 152 will be grounds for access, so once a whistleblower is accused of 153 “espionage,” finding the “spy” will provide an 154 excuse to access the accumulated material.</p> 155 156 <p>In practice, we can't expect state agencies even to make up excuses 157 to satisfy the rules for using surveillance data—because US 158 agencies 159 already <a href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/"> 160 lie to cover up breaking the rules</a>. These rules are not seriously 161 meant to be obeyed; rather, they are a fairy-tale we can believe if we 162 like.</p> 163 164 <p>In addition, the state's surveillance staff will misuse the data 165 for personal reasons. Some NSA 166 agents <a href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used 167 U.S. surveillance systems to track their lovers</a>—past, 168 present, or wished-for—in a practice called 169 “LOVEINT.” The NSA says it has caught and punished this a 170 few times; we don't know how many other times it wasn't caught. But 171 these events shouldn't surprise us, because police have 172 long <a href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">used 173 their access to driver's license records to track down someone 174 attractive</a>, a practice known as “running a plate for a 175 date.” This practice has expanded 176 with <a href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new 177 digital systems</a>. In 2016, a prosecutor was accused of forging 178 judges' signatures to get authorization 179 to <a href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"> 180 wiretap someone who was the object of a romantic obsession</a>. The AP 181 knows 182 of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many 183 other instances in the US</a>. 184 </p> 185 186 <p>Surveillance data will always be used for other purposes, even if 187 this is prohibited. Once the data has been accumulated and the state 188 has the possibility of access to it, it can misuse that data in 189 dreadful ways, as shown by examples 190 from <a href="https://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>, 191 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the 192 US</a>, and most 193 recently <a href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>. 194 (Turkey's confusion about who had really used the Bylock program only 195 exacerbated the basic deliberate injustice of arbitrarily punishing 196 people for having used it.) 197 </p> 198 199 <p>You may feel your government won't use your personal data for 200 repression, but you can't rely on that feeling, because governments do 201 change. As of 2021, many ostensibly democratic states 202 are <a href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan">ruled 203 by people with authoritarian leanings</a>, and the Taliban have taken 204 over Afghanistan's systems of biometric identification that were set 205 up at the instigation of the US. The UK is working on a law 206 to <a href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom">repress 207 nonviolent protests that might be described as causing “serious 208 disruption.”</a> The US could become permanently repressive in 209 2025, for all we know. 210 </p> 211 212 <p>Personal data collected by the state is also likely to be obtained 213 by outside crackers that break the security of the servers, even 214 by <a href="https://www.techdirt.com/2015/06/12/second-opm-hack-revealed-even-worse-than-first/">crackers 215 working for hostile states</a>.</p> 216 217 <p>Governments can easily use massive surveillance capability 218 to <a href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert 219 democracy directly</a>.</p> 220 221 <p>Total surveillance accessible to the state enables the state to 222 launch a massive fishing expedition against any person. To make 223 journalism and democracy safe, we must limit the accumulation of data 224 that is easily accessible to the state.</p> 225 </div> 226 227 <h3 id="technical">Robust Protection for Privacy Must Be Technical</h3> 228 229 <div class="columns"> 230 <p>The Electronic Frontier Foundation and other organizations propose 231 a set of legal principles designed to <a 232 href="https://necessaryandproportionate.org">prevent the 233 abuses of massive surveillance</a>. These principles include, 234 crucially, explicit legal protection for whistleblowers; as a 235 consequence, they would be adequate for protecting democratic 236 freedoms—if adopted completely and enforced without exception 237 forever.</p> 238 239 <p>However, such legal protections are precarious: as recent history 240 shows, they can be repealed (as in the FISA Amendments Act), 241 suspended, or <a 242 href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p> 243 244 <p>Meanwhile, demagogues will cite the usual excuses as grounds for 245 total surveillance; any terrorist attack, even one that kills just a 246 handful of people, can be hyped to provide an opportunity.</p> 247 248 <p>If limits on access to the data are set aside, it will be as if 249 they had never existed: years worth of dossiers would suddenly become 250 available for misuse by the state and its agents and, if collected by 251 companies, for their private misuse as well. If, however, we stop the 252 collection of dossiers on everyone, those dossiers won't exist, and 253 there will be no way to compile them retroactively. A new illiberal 254 regime would have to implement surveillance afresh, and it would only 255 collect data starting at that date. As for suspending or momentarily 256 ignoring this law, the idea would hardly make sense.</p> 257 </div> 258 259 <h3 id="commonsense">First, Don't Be Foolish</h3> 260 261 <div class="columns"> 262 <p>To have privacy, you must not throw it away: the first one who has 263 to protect your privacy is you. Avoid identifying yourself to web 264 sites, contact them with Tor, and use browsers that block the schemes 265 they use to track visitors. Use the GNU Privacy Guard to encrypt the 266 contents of your email. Pay for things with cash.</p> 267 268 <p>Keep your own data; don't store your data in a company's 269 “convenient” server. It's safe, however, to entrust a 270 data backup to a commercial service, provided you put the files in an 271 archive and encrypt the whole archive, including the names of the 272 files, with free software on your own computer before uploading 273 it.</p> 274 275 <p>For privacy's sake, you must avoid nonfree software; if you give 276 control of your computer's operations to companies, they 277 are <a href="/malware/proprietary-surveillance.html">likely to make it 278 spy on you</a>. 279 Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service 280 as a software substitute</a>; in addition to giving others control of 281 how your computing is done, it requires you to hand over all the 282 pertinent data to the company's server.</p> 283 284 <p>Protect your friends' and acquaintances' privacy, 285 too. <a href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't 286 give out their personal information</a> except how to contact them, 287 and never give any web site your list of email or phone contacts. 288 Don't tell a company such as Facebook anything about your friends that 289 they might not wish to publish in a newspaper. Better yet, don't be 290 used by Facebook at all. Reject communication systems that require 291 users to give their real names, even if you are happy to divulge yours, 292 since they pressure other people to surrender their privacy.</p> 293 294 <p>Self-protection is essential, but even the most rigorous 295 self-protection is insufficient to protect your privacy on or from 296 systems that don't belong to you. When we communicate with others or 297 move around the city, our privacy depends on the practices of society. 298 We can avoid some of the systems that surveil our communications and 299 movements, but not all of them. Clearly, the better solution is to 300 make all these systems stop surveilling people other than legitimate 301 suspects.</p> 302 </div> 303 304 <h3 id="privacybydesign">We Must Design Every System for Privacy</h3> 305 306 <div class="columns"> 307 <p>If we don't want a total surveillance society, we must consider 308 surveillance a kind of social pollution, and limit the surveillance 309 impact of each new digital system just as we limit the environmental 310 impact of physical construction.</p> 311 312 <p>For example: “smart” meters for electricity are touted 313 for sending the power company moment-by-moment data about each 314 customer's electric usage, including how usage compares with users in 315 general. This is implemented based on general surveillance, but does 316 not require any surveillance. It would be easy for the power company 317 to calculate the average usage in a residential neighborhood by 318 dividing the total usage by the number of subscribers, and send that 319 to the meters. Each customer's meter could compare her usage, over 320 any desired period of time, with the average usage pattern for that 321 period. The same benefit, with no surveillance!</p> 322 323 <p>We need to design such privacy into all our digital 324 systems [<a href="#ambientprivacy">1</a>].</p> 325 </div> 326 327 <h3 id="dispersal">Remedy for Collecting Data: Leaving It Dispersed</h3> 328 329 <div class="columns"> 330 <p>One way to make monitoring safe for privacy is 331 to keep the data dispersed and inconvenient to 332 access. Old-fashioned security cameras were no threat to privacy(<a href="#privatespace">*</a>). 333 The recording was stored on the premises, and kept for a few weeks at 334 most. Because of the inconvenience of accessing these recordings, it 335 was never done massively; they were accessed only in the places where 336 someone reported a crime. It would not be feasible to physically 337 collect millions of tapes every day and watch them or copy them.</p> 338 339 <p>Nowadays, security cameras have become surveillance cameras: they 340 are connected to the Internet so recordings can be collected in a data 341 center and saved forever. In Detroit, the cops pressure businesses to 342 give them <a 343 href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited 344 access to their surveillance cameras</a> so that they can look through 345 them at any and all times. This is already dangerous, but it 346 is going to get worse. Advances in <a href="#facial-recognition">facial 347 recognition</a> may bring the day when suspected journalists can 348 be tracked on the street all the time to see who they talk with.</p> 349 350 <p>Internet-connected cameras often have lousy digital security 351 themselves, which means <a 352 href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html">anyone 353 can watch what those cameras see</a>. This makes internet-connected 354 cameras a major threat to security as well as privacy. For privacy's 355 sake, we should ban the use of Internet-connected cameras aimed where 356 and when the public is admitted, except when carried by people. 357 Everyone must be free to post photos and video recordings 358 occasionally, but the systematic accumulation of such data on the 359 Internet must be limited.</p> 360 361 <div class="infobox" style="margin-top: 1.5em"> 362 <p id="privatespace">(*) I assume here that the security 363 camera points at the inside of a store, or at the street. Any camera 364 pointed at someone's private space by someone else violates privacy, 365 but that is another issue.</p> 366 </div> 367 </div> 368 369 <div class="announcement comment" role="complementary"> 370 <hr class="no-display" /> 371 <p>Also consider reading “<a 372 href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A 373 radical proposal to keep your personal data safe</a>,” published in 374 <cite>The Guardian</cite> in April 2018.</p> 375 <hr class="no-display" /> 376 </div> 377 378 <h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3> 379 380 <div class="columns"> 381 <p>Most data collection comes from people's own digital activities. 382 Usually the data is collected first by companies. But when it comes 383 to the threat to privacy and democracy, it makes no difference whether 384 surveillance is done directly by the state or farmed out to a 385 business, because the data that the companies collect is 386 systematically available to the state.</p> 387 388 <p>The NSA, through PRISM, 389 has <a href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten 390 into the databases of many large Internet corporations</a>. AT&T 391 has saved all its phone call records since 1987 392 and <a href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes 393 them available to the DEA</a> to search on request. Strictly 394 speaking, the U.S. government does not possess that data, but in 395 practical terms it may as well possess it. Some companies are praised 396 for <a href="https://www.eff.org/who-has-your-back-government-data-requests-2015">resisting 397 government data requests to the limited extent they can</a>, but that 398 can only partly compensate for the harm they do to by collecting that 399 data in the first place. In addition, many of those companies misuse 400 the data directly or provide it to data brokers.</p> 401 402 <p>The goal of making journalism and democracy safe therefore requires 403 that we reduce the data collected about people by any organization, 404 not just by the state. We must redesign digital systems so that they 405 do not accumulate data about their users. If they need digital data 406 about our transactions, they should not be allowed to keep them more 407 than a short time beyond what is inherently necessary for their 408 dealings with us.</p> 409 410 <p>One of the motives for the current level of surveillance of the 411 Internet is that sites are financed through advertising based on 412 tracking users' activities and propensities. This converts a mere 413 annoyance—advertising that we can learn to ignore—into a 414 surveillance system that harms us whether we know it or not. 415 Purchases over the Internet also track their users. And we are all 416 aware that “privacy policies” are more excuses to violate 417 privacy than commitments to uphold it.</p> 418 419 <p>We could correct both problems by adopting a system of anonymous 420 payments—anonymous for the payer, that is. (We don't want to 421 help the payee dodge 422 taxes.) <a href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin 423 is not anonymous</a>, though there are efforts to develop ways to pay 424 anonymously with Bitcoin. However, technology 425 for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital 426 cash was first developed in the 1980s</a>; the GNU software for doing 427 this is called <a href="https://taler.net/">GNU Taler</a>. Now we need 428 only suitable business arrangements, and for the state not to obstruct 429 them.</p> 430 431 <p>Another possible method for anonymous payments would 432 use <a href="/philosophy/phone-anonymous-payment.html">prepaid 433 phone cards</a>. It is less convenient, but very easy to 434 implement.</p> 435 436 <p>A further threat from sites' collection of personal data is that 437 security breakers might get in, take it, and misuse it. This includes 438 customers' credit card details. An anonymous payment system would end 439 this danger: a security hole in the site can't hurt you if the site 440 knows nothing about you.</p> 441 </div> 442 443 <h3 id="travel">Remedy for Travel Surveillance</h3> 444 445 <div class="columns"> 446 <p>We must convert digital toll collection to anonymous payment (using 447 digital cash, for instance). License-plate recognition systems 448 <a href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"> 449 recognize all cars' license plates</a>, and 450 the <a href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data 451 can be kept indefinitely</a>; they should be required by law to notice 452 and record only those license numbers that are on a list of cars 453 sought by court orders. A less secure alternative would record all 454 cars locally but only for a few days, and not make the full data 455 available over the Internet; access to the data should be limited to 456 searching for a list of court-ordered license-numbers.</p> 457 458 <p>The U.S. “no-fly” list must be abolished because it is 459 <a href="https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional">punishment 460 without trial</a>.</p> 461 462 <p>It is acceptable to have a list of people whose person and luggage 463 will be searched with extra care, and anonymous passengers on domestic 464 flights could be treated as if they were on this list. It is also 465 acceptable to bar non-citizens, if they are not permitted to enter the 466 country at all, from boarding flights to the country. This ought to 467 be enough for all legitimate purposes.</p> 468 469 <p>Many mass transit systems use some kind of smart cards or RFIDs for 470 payment. These systems accumulate personal data: if you once make the 471 mistake of paying with anything but cash, they associate the card 472 permanently with your name. Furthermore, they record all travel 473 associated with each card. Together they amount to massive 474 surveillance. This data collection must be reduced.</p> 475 476 <p>Navigation services do surveillance: the user's computer tells the 477 map service the user's location and where the user wants to go; then 478 the server determines the route and sends it back to the user's 479 computer, which displays it. Nowadays, the server probably records 480 the user's locations, since there is nothing to prevent it. This 481 surveillance is not inherently necessary, and redesign could avoid it: 482 free/libre software in the user's computer could download map data for 483 the pertinent regions (if not downloaded previously), compute the 484 route, and display it, without ever telling anyone where the user is 485 or wants to go.</p> 486 487 <p>Systems for borrowing bicycles, etc., can be designed so that the 488 borrower's identity is known only inside the station where the item 489 was borrowed. Borrowing would inform all stations that the item is 490 “out,” so when the user returns it at any station (in 491 general, a different one), that station will know where and when that 492 item was borrowed. It will inform the other station that the item is 493 no longer “out.” It will also calculate the user's bill, 494 and send it (after waiting some random number of minutes) to 495 headquarters along a ring of stations, so that headquarters would not 496 find out which station the bill came from. Once this is done, the 497 return station would forget all about the transaction. If an item 498 remains “out” for too long, the station where it was 499 borrowed can inform headquarters; in that case, it could send the 500 borrower's identity immediately.</p> 501 </div> 502 503 <h3 id="communications">Remedy for Communications Dossiers</h3> 504 505 <div class="columns"> 506 <p>Internet service providers and telephone companies keep extensive 507 data on their users' contacts (browsing, phone calls, etc). With 508 mobile phones, they 509 also <a href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record 510 the user's physical location</a>. They keep these dossiers for a long 511 time: over 30 years, in the case of AT&T. Soon they will 512 even <a href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record 513 the user's body activities</a>. It appears that 514 the <a href="https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations">NSA 515 collects cell phone location data</a> in bulk.</p> 516 517 <p>Unmonitored communication is impossible where systems create such 518 dossiers. So it should be illegal to create or keep them. ISPs and 519 phone companies must not be allowed to keep this information for very 520 long, in the absence of a court order to surveil a certain party.</p> 521 522 <p>This solution is not entirely satisfactory, because it won't 523 physically stop the government from collecting all the information 524 immediately as it is generated—which is what 525 the <a href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S. does 526 with some or all phone companies</a>. We would have to rely on 527 prohibiting that by law. However, that would be better than the 528 current situation, where the relevant law (the PAT RIOT Act) does not 529 clearly prohibit the practice. In addition, if the government did 530 resume this sort of surveillance, it would not get data about 531 everyone's phone calls made prior to that time.</p> 532 533 <p>For privacy about who you exchange email with, a simple partial 534 solution is for you and others to use email services in a country that 535 would never cooperate with your own government, and which communicate 536 with each other using encryption. However, Ladar Levison (owner of 537 the mail service Lavabit that US surveillance sought to corrupt 538 completely) has a more sophisticated idea for an encryption system 539 through which your email service would know only that you sent mail to 540 some user of my email service, and my email service would know only 541 that I received mail from some user of your email service, but it 542 would be hard to determine that you had sent mail to me.</p> 543 </div> 544 545 <h3 id="necessary">But Some Surveillance Is Necessary</h3> 546 547 <div class="columns"> 548 <p>For the state to find criminals, it needs to be able to investigate 549 specific crimes, or specific suspected planned crimes, under a court 550 order. With the Internet, the power to tap phone conversations would 551 naturally extend to the power to tap Internet connections. This power 552 is easy to abuse for political reasons, but it is also necessary. 553 Fortunately, this won't make it possible to find whistleblowers after 554 the fact, if (as I recommend) we prevent digital systems from accumulating 555 massive dossiers before the fact.</p> 556 557 <p>Individuals with special state-granted power, such as police, 558 forfeit their right to privacy and must be monitored. (In fact, 559 police have their own jargon term for perjury, 560 “<a href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,” 561 since they do it so frequently, particularly about protesters 562 and <a href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"> 563 photographers</a>.) 564 One city in California that required police to wear video cameras all 565 the time 566 found <a href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their 567 use of force fell by 60%</a>. The ACLU is in favor of this.</p> 568 569 <p><a 570 href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations 571 are not people, and not entitled to human rights</a>. It is 572 legitimate to require businesses to publish the details of processes 573 that might cause chemical, biological, nuclear, fiscal, computational 574 (e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or political 575 (e.g., lobbying) hazards to society, to whatever level is needed for 576 public well-being. The danger of these operations (consider the BP 577 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs 578 that of terrorism.</p> 579 580 <p>However, journalism must be protected from surveillance even when 581 it is carried out as part of a business.</p> 582 </div> 583 584 <h3 id="conclusion">Conclusion</h3> 585 586 <div class="reduced-width"> 587 <p>Digital technology has brought about a tremendous increase in the 588 level of surveillance of our movements, actions, and communications. 589 It is far more than we experienced in the 1990s, and <a 590 href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far 591 more than people behind the Iron Curtain experienced</a> in the 1980s, 592 and proposed legal limits on state use of the accumulated data would 593 not alter that.</p> 594 595 <p>Companies are designing even more intrusive surveillance. Some 596 project that pervasive surveillance, hooked to companies such as 597 Facebook, could have deep effects on <a 598 href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how 599 people think</a>. Such possibilities are imponderable; but the threat 600 to democracy is not speculation. It exists and is visible today.</p> 601 602 <p>Unless we believe that our free countries previously suffered from 603 a grave surveillance deficit, and ought to be surveilled more than the 604 Soviet Union and East Germany were, we must reverse this increase. 605 That requires stopping the accumulation of big data about people.</p> 606 <div class="column-limit"></div> 607 608 <h3 class="footnote">End Note</h3> 609 <ol> 610 <li id="ambientprivacy">The condition of <em>not being monitored</em> 611 has been referred to as <a 612 href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient 613 privacy</a>.</li> 614 615 <li id="facial-recognition">In the 2020s, facial recognition deepens 616 the danger of surveillance cameras. China already identifies people 617 by their faces so as to punish them, 618 and <a href="https://www.theguardian.com/global-development/2022/sep/05/iran-government-facial-recognition-technology-hijab-law-crackdown">Iran 619 is planning to use it to punish women who violate religion-imposed 620 dress codes</a>.</li> 621 </ol> 622 623 <div class="infobox extra" role="complementary"> 624 <hr /> 625 <!-- rms: I deleted the link because of Wired's announced 626 anti-ad-block system --> 627 <p>A version of this article was first published in 628 <cite>Wired</cite> in October 2013.</p> 629 </div> 630 </div> 631 </div> 632 633 </div><!-- for id="content", starts in the include above --> 634 <!--#include virtual="/server/footer.html" --> 635 <div id="footer" role="contentinfo"> 636 <div class="unprintable"> 637 638 <p>Please send general FSF & GNU inquiries to 639 <a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>. 640 There are also <a href="/contact/">other ways to contact</a> 641 the FSF. Broken links and other corrections or suggestions can be sent 642 to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p> 643 644 <p><!-- TRANSLATORS: Ignore the original text in this paragraph, 645 replace it with the translation of these two: 646 647 We work hard and do our best to provide accurate, good quality 648 translations. However, we are not exempt from imperfection. 649 Please send your comments and general suggestions in this regard 650 to <a href="mailto:web-translators@gnu.org"> 651 <web-translators@gnu.org></a>.</p> 652 653 <p>For information on coordinating and contributing translations of 654 our web pages, see <a 655 href="/server/standards/README.translations.html">Translations 656 README</a>. --> 657 Please see the <a 658 href="/server/standards/README.translations.html">Translations 659 README</a> for information on coordinating and contributing translations 660 of this article.</p> 661 </div> 662 663 <!-- Regarding copyright, in general, standalone pages (as opposed to 664 files generated as part of manuals) on the GNU web server should 665 be under CC BY-ND 4.0. Please do NOT change or remove this 666 without talking with the webmasters or licensing team first. 667 Please make sure the copyright date is consistent with the 668 document. For web pages, it is ok to list just the latest year the 669 document was modified, or published. 670 671 If you wish to list earlier years, that is ok too. 672 Either "2001, 2002, 2003" or "2001-2003" are ok for specifying 673 years, as long as each year in the range is in fact a copyrightable 674 year, i.e., a year in which the document was published (including 675 being publicly visible on the web or in a revision control system). 676 677 There is more detail about copyright years in the GNU Maintainers 678 Information document, www.gnu.org/prep/maintain. --> 679 680 <p>Copyright © 2013-2019, 2021, 2022 Richard Stallman</p> 681 682 <p>This page is licensed under a <a rel="license" 683 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative 684 Commons Attribution-NoDerivatives 4.0 International License</a>.</p> 685 686 <!--#include virtual="/server/bottom-notes.html" --> 687 688 <p class="unprintable">Updated: 689 <!-- timestamp start --> 690 $Date: 2022/09/17 18:24:26 $ 691 <!-- timestamp end --> 692 </p> 693 </div> 694 </div><!-- for class="inner", starts in the banner include --> 695 </body> 696 </html>