taler-merchant-demos

Python-based Frontends for the Demonstration Web site
Log | Files | Refs | Submodules | README | LICENSE

surveillance-vs-democracy.html (36019B)


      1 <!--#include virtual="/server/header.html" -->
      2 <!-- Parent-Version: 1.97 -->
      3 <!-- This page is derived from /server/standards/boilerplate.html -->
      4 <!--#set var="TAGS" value="essays cultural evils" -->
      5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
      6 <title>How Much Surveillance Can Democracy Withstand?
      7 - GNU Project - Free Software Foundation</title>
      8 <style type="text/css" media="print,screen"><!--
      9 #intro { margin: 2em auto 1.5em; }
     10 .toc { width: auto; }
     11 .pict.wide { width: 23em; }
     12 .pict p { margin-bottom: 0; }
     13 #conclusion { visibility: hidden; margin-top: 0; }
     14 @media (min-width: 55em) {
     15    #intro { max-width: 55em; }
     16    .toc { max-width: 51em; }
     17    .toc li { display: inline-block; width: 90%; }
     18 }
     19 -->
     20 </style>
     21 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
     22 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
     23 <!--#include virtual="/server/banner.html" -->
     24 <!--#include virtual="/philosophy/ph-breadcrumb.html" -->
     25 <!--GNUN: OUT-OF-DATE NOTICE-->
     26 <!--#include virtual="/server/top-addendum.html" -->
     27 <div class="article">
     28 <h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
     29 
     30 <address class="byline center">by
     31 <a href="https://www.stallman.org/">Richard Stallman</a></address>
     32 
     33 <div id="intro">
     34 <div class="pict wide">
     35 <a href="/graphics/dog.html">
     36 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the three ads that popped up on his computer screen..." /></a>
     37 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
     38 </div>
     39 
     40 <p>Thanks to Edward Snowden's disclosures, we know that the current
     41 level of general surveillance in society is incompatible with human
     42 rights.  Expecting every action to be noted down <a href="https://www.socialcooling.com/">makes people censor and
     43 limit themselves</a>.  The repeated harassment and prosecution of dissidents,
     44 sources, and journalists in the US and elsewhere provides
     45 confirmation.  We need to reduce the level of general surveillance,
     46 but how far?  Where exactly is the
     47 <em>maximum tolerable level of surveillance</em>, which we must ensure
     48 is not exceeded?  It is the level beyond which surveillance starts to
     49 interfere with the functioning of democracy, in that whistleblowers
     50 (such as Snowden) are likely to be caught.</p>
     51 </div>
     52 
     53 <div class="columns" style="clear:both">
     54 <p>Faced with government secrecy, we the people depend on
     55 whistleblowers
     56 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
     57 us what the state is doing</a>.  (We were reminded of this in 2019 as
     58 various whistleblowers gave the public increments
     59 of <a href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy">information
     60 about Trump's attempt to shake down the president of Ukraine</a>.)
     61 However, today's surveillance intimidates potential whistleblowers,
     62 which means it is too much.  To recover our democratic control over
     63 the state, we must reduce surveillance to the point where
     64 whistleblowers know they are safe.</p>
     65 
     66 <p>Using free/libre
     67 software, <a href="/philosophy/free-software-even-more-important.html">as
     68 I've advocated since 1983</a>, is the first step in taking control
     69 of our digital lives, and that includes preventing surveillance.  We
     70 can't trust nonfree software; the NSA
     71 <a href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
     72 and
     73 even <a href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
     74 security weaknesses in nonfree software to invade our own computers
     75 and routers.  Free software gives us control of our own computers,
     76 but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't
     77 protect our privacy once we set foot on the Internet</a>.</p>
     78 
     79 <p><a
     80 href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
     81 legislation to &ldquo;curtail the domestic surveillance
     82 powers&rdquo;</a> in the U.S. is being drawn up, but it relies on
     83 limiting the government's use of our virtual dossiers.  That won't
     84 suffice to protect whistleblowers if &ldquo;catching the
     85 whistleblower&rdquo; is grounds for access sufficient to identify him
     86 or her.  We need to go further.</p>
     87 </div>
     88 
     89 <div class="toc" style="clear: both">
     90 <hr class="no-display" />
     91 <h3 class="no-display">Table of contents</h3>
     92 <ul class="columns">
     93  <li><a href="#upperlimit">The Upper Limit on Surveillance in a Democracy</a></li>
     94  <li><a href="#willbemisused">Information, Once Collected, Will Be Misused</a></li>
     95  <li><a href="#technical">Robust Protection for Privacy Must Be Technical</a></li>
     96  <li><a href="#commonsense">First, Don't Be Foolish</a></li>
     97  <li><a href="#privacybydesign">We Must Design Every System for Privacy</a></li>
     98  <li><a href="#dispersal">Remedy for Collecting Data: Leaving It Dispersed</a></li>
     99  <li><a href="#digitalcash">Remedy for Internet Commerce Surveillance</a></li>
    100  <li><a href="#travel">Remedy for Travel Surveillance</a></li>
    101  <li><a href="#communications">Remedy for Communications Dossiers</a></li>
    102  <li><a href="#necessary">But Some Surveillance Is Necessary</a></li>
    103  <li><a href="#conclusion">Conclusion</a></li>
    104 </ul>
    105 <hr class="no-display" />
    106 </div>
    107 
    108 <h3 id="upperlimit">The Upper Limit on Surveillance in a Democracy</h3>
    109 
    110 <div class="columns">
    111 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
    112 last shred of effective control over our government and institutions.
    113 That's why surveillance that enables the state to find out who has
    114 talked with a reporter is too much surveillance&mdash;too much for
    115 democracy to endure.</p>
    116 
    117 <p>An unnamed U.S. government official ominously told journalists in
    118 2011 that
    119 the <a href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S. would
    120 not subpoena reporters because &ldquo;We know who you're talking
    121 to.&rdquo;</a>
    122 Sometimes <a href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
    123 phone call records are subpoenaed</a> to find this out, but Snowden
    124 has shown us that in effect they subpoena all the phone call records
    125 of everyone in the U.S., all the
    126 time, <a href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
    127 Verizon</a>
    128 and <a href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
    129 other companies too</a>.</p>
    130 
    131 <p>Opposition and dissident activities need to keep secrets from
    132 states that are willing to play dirty tricks on them.  The ACLU has
    133 demonstrated the U.S. government's <a
    134 href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
    135 practice of infiltrating peaceful dissident groups</a> on the pretext
    136 that there might be terrorists among them.  The point at which
    137 surveillance is too much is the point at which the state can find who
    138 spoke to a known journalist or a known dissident.</p>
    139 </div>
    140 
    141 <h3 id="willbemisused">Information, Once Collected, Will Be Misused</h3>
    142 
    143 <div class="columns">
    144 <p>When people recognize
    145 that the level of general surveillance is too
    146 high, the first response is to propose limits on access to the
    147 accumulated data.  That sounds nice, but it won't fix the problem, not
    148 even slightly, even supposing that the government obeys the rules.
    149 (The NSA has misled the FISA court, which said it
    150 was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
    151 to effectively hold the NSA accountable</a>.) Suspicion of a crime
    152 will be grounds for access, so once a whistleblower is accused of
    153 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
    154 excuse to access the accumulated material.</p>
    155 
    156 <p>In practice, we can't expect state agencies even to make up excuses
    157 to satisfy the rules for using surveillance data&mdash;because US
    158 agencies
    159 already <a href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/">
    160 lie to cover up breaking the rules</a>.  These rules are not seriously
    161 meant to be obeyed; rather, they are a fairy-tale we can believe if we
    162 like.</p>
    163 
    164 <p>In addition, the state's surveillance staff will misuse the data
    165 for personal reasons.  Some NSA
    166 agents <a href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
    167 U.S. surveillance systems to track their lovers</a>&mdash;past,
    168 present, or wished-for&mdash;in a practice called
    169 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
    170 few times; we don't know how many other times it wasn't caught.  But
    171 these events shouldn't surprise us, because police have
    172 long <a href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">used
    173 their access to driver's license records to track down someone
    174 attractive</a>, a practice known as &ldquo;running a plate for a
    175 date.&rdquo; This practice has expanded
    176 with <a href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
    177 digital systems</a>.  In 2016, a prosecutor was accused of forging
    178 judges' signatures to get authorization
    179 to <a href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
    180 wiretap someone who was the object of a romantic obsession</a>. The AP
    181 knows
    182 of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
    183 other instances in the US</a>.
    184 </p>
    185 
    186 <p>Surveillance data will always be used for other purposes, even if
    187 this is prohibited.  Once the data has been accumulated and the state
    188 has the possibility of access to it, it can misuse that data in
    189 dreadful ways, as shown by examples
    190 from <a href="https://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
    191 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
    192 US</a>, and most
    193 recently <a href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
    194 (Turkey's confusion about who had really used the Bylock program only
    195 exacerbated the basic deliberate injustice of arbitrarily punishing
    196 people for having used it.)
    197 </p>
    198 
    199 <p>You may feel your government won't use your personal data for
    200 repression, but you can't rely on that feeling, because governments do
    201 change.  As of 2021, many ostensibly democratic states
    202 are <a href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan">ruled
    203 by people with authoritarian leanings</a>, and the Taliban have taken
    204 over Afghanistan's systems of biometric identification that were set
    205 up at the instigation of the US.  The UK is working on a law
    206 to <a href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom">repress
    207 nonviolent protests that might be described as causing &ldquo;serious
    208 disruption.&rdquo;</a>  The US could become permanently repressive in
    209 2025, for all we know.
    210 </p>
    211 
    212 <p>Personal data collected by the state is also likely to be obtained
    213 by outside crackers that break the security of the servers, even
    214 by <a href="https://www.techdirt.com/2015/06/12/second-opm-hack-revealed-even-worse-than-first/">crackers
    215 working for hostile states</a>.</p>
    216 
    217 <p>Governments can easily use massive surveillance capability
    218 to <a href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
    219 democracy directly</a>.</p>
    220 
    221 <p>Total surveillance accessible to the state enables the state to
    222 launch a massive fishing expedition against any person.  To make
    223 journalism and democracy safe, we must limit the accumulation of data
    224 that is easily accessible to the state.</p>
    225 </div>
    226 
    227 <h3 id="technical">Robust Protection for Privacy Must Be Technical</h3>
    228 
    229 <div class="columns">
    230 <p>The Electronic Frontier Foundation and other organizations propose
    231 a set of legal principles designed to <a
    232 href="https://necessaryandproportionate.org">prevent the
    233 abuses of massive surveillance</a>.  These principles include,
    234 crucially, explicit legal protection for whistleblowers; as a
    235 consequence, they would be adequate for protecting democratic
    236 freedoms&mdash;if adopted completely and enforced without exception
    237 forever.</p>
    238 
    239 <p>However, such legal protections are precarious: as recent history
    240 shows, they can be repealed (as in the FISA Amendments Act),
    241 suspended, or <a
    242 href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
    243 
    244 <p>Meanwhile, demagogues will cite the usual excuses as grounds for
    245 total surveillance; any terrorist attack, even one that kills just a
    246 handful of people, can be hyped to provide an opportunity.</p>
    247 
    248 <p>If limits on access to the data are set aside, it will be as if
    249 they had never existed: years worth of dossiers would suddenly become
    250 available for misuse by the state and its agents and, if collected by
    251 companies, for their private misuse as well.  If, however, we stop the
    252 collection of dossiers on everyone, those dossiers won't exist, and
    253 there will be no way to compile them retroactively.  A new illiberal
    254 regime would have to implement surveillance afresh, and it would only
    255 collect data starting at that date.  As for suspending or momentarily
    256 ignoring this law, the idea would hardly make sense.</p>
    257 </div>
    258 
    259 <h3 id="commonsense">First, Don't Be Foolish</h3>
    260 
    261 <div class="columns">
    262 <p>To have privacy, you must not throw it away: the first one who has
    263 to protect your privacy is you.  Avoid identifying yourself to web
    264 sites, contact them with Tor, and use browsers that block the schemes
    265 they use to track visitors.  Use the GNU Privacy Guard to encrypt the
    266 contents of your email.  Pay for things with cash.</p>
    267 
    268 <p>Keep your own data; don't store your data in a company's
    269 &ldquo;convenient&rdquo; server.  It's safe, however, to entrust a
    270 data backup to a commercial service, provided you put the files in an
    271 archive and encrypt the whole archive, including the names of the
    272 files, with free software on your own computer before uploading
    273 it.</p>
    274 
    275 <p>For privacy's sake, you must avoid nonfree software; if you give
    276 control of your computer's operations to companies, they
    277 are <a href="/malware/proprietary-surveillance.html">likely to make it
    278 spy on you</a>.
    279 Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
    280 as a software substitute</a>; in addition to giving others control of
    281 how your computing is done, it requires you to hand over all the
    282 pertinent data to the company's server.</p>
    283 
    284 <p>Protect your friends' and acquaintances' privacy,
    285 too.  <a href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
    286 give out their personal information</a> except how to contact them,
    287 and never give any web site your list of email or phone contacts.
    288 Don't tell a company such as Facebook anything about your friends that
    289 they might not wish to publish in a newspaper.  Better yet, don't be
    290 used by Facebook at all.  Reject communication systems that require
    291 users to give their real names, even if you are happy to divulge yours,
    292 since they pressure other people to surrender their privacy.</p>
    293 
    294 <p>Self-protection is essential, but even the most rigorous
    295 self-protection is insufficient to protect your privacy on or from
    296 systems that don't belong to you.  When we communicate with others or
    297 move around the city, our privacy depends on the practices of society.
    298 We can avoid some of the systems that surveil our communications and
    299 movements, but not all of them.  Clearly, the better solution is to
    300 make all these systems stop surveilling people other than legitimate
    301 suspects.</p>
    302 </div>
    303 
    304 <h3 id="privacybydesign">We Must Design Every System for Privacy</h3>
    305 
    306 <div class="columns">
    307 <p>If we don't want a total surveillance society, we must consider
    308 surveillance a kind of social pollution, and limit the surveillance
    309 impact of each new digital system just as we limit the environmental
    310 impact of physical construction.</p>
    311 
    312 <p>For example: &ldquo;smart&rdquo; meters for electricity are touted
    313 for sending the power company moment-by-moment data about each
    314 customer's electric usage, including how usage compares with users in
    315 general.  This is implemented based on general surveillance, but does
    316 not require any surveillance.  It would be easy for the power company
    317 to calculate the average usage in a residential neighborhood by
    318 dividing the total usage by the number of subscribers, and send that
    319 to the meters.  Each customer's meter could compare her usage, over
    320 any desired period of time, with the average usage pattern for that
    321 period.  The same benefit, with no surveillance!</p>
    322 
    323 <p>We need to design such privacy into all our digital
    324 systems&nbsp;[<a href="#ambientprivacy">1</a>].</p>
    325 </div>
    326 
    327 <h3 id="dispersal">Remedy for Collecting Data: Leaving It Dispersed</h3>
    328 
    329 <div class="columns">
    330 <p>One way to make monitoring safe for privacy is
    331 to keep the data dispersed and inconvenient to
    332 access.  Old-fashioned security cameras were no threat to privacy(<a href="#privatespace">*</a>).
    333 The recording was stored on the premises, and kept for a few weeks at
    334 most.  Because of the inconvenience of accessing these recordings, it
    335 was never done massively; they were accessed only in the places where
    336 someone reported a crime.  It would not be feasible to physically
    337 collect millions of tapes every day and watch them or copy them.</p>
    338 
    339 <p>Nowadays, security cameras have become surveillance cameras: they
    340 are connected to the Internet so recordings can be collected in a data
    341 center and saved forever.  In Detroit, the cops pressure businesses to
    342 give them <a
    343 href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
    344 access to their surveillance cameras</a> so that they can look through
    345 them at any and all times.  This is already dangerous, but it
    346 is  going to get worse.  Advances in <a href="#facial-recognition">facial
    347 recognition</a> may bring the day when suspected journalists can
    348 be tracked on the street all the time to see who they talk with.</p>
    349 
    350 <p>Internet-connected cameras often have lousy digital security
    351 themselves, which means <a
    352 href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html">anyone
    353 can watch what those cameras see</a>.  This makes internet-connected
    354 cameras a major threat to security as well as privacy.  For privacy's
    355 sake, we should ban the use of Internet-connected cameras aimed where
    356 and when the public is admitted, except when carried by people.
    357 Everyone must be free to post photos and video recordings
    358 occasionally, but the systematic accumulation of such data on the
    359 Internet must be limited.</p>
    360 
    361 <div class="infobox" style="margin-top: 1.5em">
    362 <p id="privatespace">(*) I assume here that the security
    363 camera points at the inside of a store, or at the street.  Any camera
    364 pointed at someone's private space by someone else violates privacy,
    365 but that is another issue.</p>
    366 </div>
    367 </div>
    368 
    369 <div class="announcement comment" role="complementary">
    370 <hr class="no-display" />
    371 <p>Also consider reading &ldquo;<a
    372 href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
    373 radical proposal to keep your personal data safe</a>,&rdquo; published in
    374 <cite>The Guardian</cite> in April&nbsp;2018.</p>
    375 <hr class="no-display" />
    376 </div>
    377 
    378 <h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
    379 
    380 <div class="columns">
    381 <p>Most data collection comes from people's own digital activities.
    382 Usually the data is collected first by companies.  But when it comes
    383 to the threat to privacy and democracy, it makes no difference whether
    384 surveillance is done directly by the state or farmed out to a
    385 business, because the data that the companies collect is
    386 systematically available to the state.</p>
    387 
    388 <p>The NSA, through PRISM,
    389 has <a href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten
    390 into the databases of many large Internet corporations</a>.  AT&amp;T
    391 has saved all its phone call records since 1987
    392 and <a href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
    393 them available to the DEA</a> to search on request.  Strictly
    394 speaking, the U.S.  government does not possess that data, but in
    395 practical terms it may as well possess it.  Some companies are praised
    396 for <a href="https://www.eff.org/who-has-your-back-government-data-requests-2015">resisting
    397 government data requests to the limited extent they can</a>, but that
    398 can only partly compensate for the harm they do to by collecting that
    399 data in the first place.  In addition, many of those companies misuse
    400 the data directly or provide it to data brokers.</p>
    401 
    402 <p>The goal of making journalism and democracy safe therefore requires
    403 that we reduce the data collected about people by any organization,
    404 not just by the state.  We must redesign digital systems so that they
    405 do not accumulate data about their users.  If they need digital data
    406 about our transactions, they should not be allowed to keep them more
    407 than a short time beyond what is inherently necessary for their
    408 dealings with us.</p>
    409 
    410 <p>One of the motives for the current level of surveillance of the
    411 Internet is that sites are financed through advertising based on
    412 tracking users' activities and propensities.  This converts a mere
    413 annoyance&mdash;advertising that we can learn to ignore&mdash;into a
    414 surveillance system that harms us whether we know it or not.
    415 Purchases over the Internet also track their users.  And we are all
    416 aware that &ldquo;privacy policies&rdquo; are more excuses to violate
    417 privacy than commitments to uphold it.</p>
    418 
    419 <p>We could correct both problems by adopting a system of anonymous
    420 payments&mdash;anonymous for the payer, that is.  (We don't want to
    421 help the payee dodge
    422 taxes.)  <a href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
    423 is not anonymous</a>, though there are efforts to develop ways to pay
    424 anonymously with Bitcoin.  However, technology
    425 for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
    426 cash was first developed in the 1980s</a>; the GNU software for doing
    427 this is called <a href="https://taler.net/">GNU Taler</a>.  Now we need
    428 only suitable business arrangements, and for the state not to obstruct
    429 them.</p>
    430 
    431 <p>Another possible method for anonymous payments would
    432 use <a href="/philosophy/phone-anonymous-payment.html">prepaid
    433 phone cards</a>.  It is less convenient, but very easy to
    434 implement.</p>
    435 
    436 <p>A further threat from sites' collection of personal data is that
    437 security breakers might get in, take it, and misuse it.  This includes
    438 customers' credit card details.  An anonymous payment system would end
    439 this danger: a security hole in the site can't hurt you if the site
    440 knows nothing about you.</p>
    441 </div>
    442 
    443 <h3 id="travel">Remedy for Travel Surveillance</h3>
    444 
    445 <div class="columns">
    446 <p>We must convert digital toll collection to anonymous payment (using
    447 digital cash, for instance).  License-plate recognition systems
    448 <a href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated">
    449 recognize all cars' license plates</a>, and
    450 the <a href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
    451 can be kept indefinitely</a>; they should be required by law to notice
    452 and record only those license numbers that are on a list of cars
    453 sought by court orders.  A less secure alternative would record all
    454 cars locally but only for a few days, and not make the full data
    455 available over the Internet; access to the data should be limited to
    456 searching for a list of court-ordered license-numbers.</p>
    457 
    458 <p>The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is
    459 <a href="https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional">punishment
    460 without trial</a>.</p>
    461 
    462 <p>It is acceptable to have a list of people whose person and luggage
    463 will be searched with extra care, and anonymous passengers on domestic
    464 flights could be treated as if they were on this list.  It is also
    465 acceptable to bar non-citizens, if they are not permitted to enter the
    466 country at all, from boarding flights to the country.  This ought to
    467 be enough for all legitimate purposes.</p>
    468 
    469 <p>Many mass transit systems use some kind of smart cards or RFIDs for
    470 payment.  These systems accumulate personal data: if you once make the
    471 mistake of paying with anything but cash, they associate the card
    472 permanently with your name.  Furthermore, they record all travel
    473 associated with each card.  Together they amount to massive
    474 surveillance.  This data collection must be reduced.</p>
    475 
    476 <p>Navigation services do surveillance: the user's computer tells the
    477 map service the user's location and where the user wants to go; then
    478 the server determines the route and sends it back to the user's
    479 computer, which displays it.  Nowadays, the server probably records
    480 the user's locations, since there is nothing to prevent it.  This
    481 surveillance is not inherently necessary, and redesign could avoid it:
    482 free/libre software in the user's computer could download map data for
    483 the pertinent regions (if not downloaded previously), compute the
    484 route, and display it, without ever telling anyone where the user is
    485 or wants to go.</p>
    486 
    487 <p>Systems for borrowing bicycles, etc., can be designed so that the
    488 borrower's identity is known only inside the station where the item
    489 was borrowed.  Borrowing would inform all stations that the item is
    490 &ldquo;out,&rdquo; so when the user returns it at any station (in
    491 general, a different one), that station will know where and when that
    492 item was borrowed.  It will inform the other station that the item is
    493 no longer &ldquo;out.&rdquo; It will also calculate the user's bill,
    494 and send it (after waiting some random number of minutes) to
    495 headquarters along a ring of stations, so that headquarters would not
    496 find out which station the bill came from.  Once this is done, the
    497 return station would forget all about the transaction.  If an item
    498 remains &ldquo;out&rdquo; for too long, the station where it was
    499 borrowed can inform headquarters; in that case, it could send the
    500 borrower's identity immediately.</p>
    501 </div>
    502 
    503 <h3 id="communications">Remedy for Communications Dossiers</h3>
    504 
    505 <div class="columns">
    506 <p>Internet service providers and telephone companies keep extensive
    507 data on their users' contacts (browsing, phone calls, etc).  With
    508 mobile phones, they
    509 also <a href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
    510 the user's physical location</a>.  They keep these dossiers for a long
    511 time: over 30 years, in the case of AT&amp;T.  Soon they will
    512 even <a href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
    513 the user's body activities</a>.  It appears that
    514 the <a href="https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations">NSA
    515 collects cell phone location data</a> in bulk.</p>
    516 
    517 <p>Unmonitored communication is impossible where systems create such
    518 dossiers.  So it should be illegal to create or keep them.  ISPs and
    519 phone companies must not be allowed to keep this information for very
    520 long, in the absence of a court order to surveil a certain party.</p>
    521 
    522 <p>This solution is not entirely satisfactory, because it won't
    523 physically stop the government from collecting all the information
    524 immediately as it is generated&mdash;which is what
    525 the <a href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S. does
    526 with some or all phone companies</a>.  We would have to rely on
    527 prohibiting that by law.  However, that would be better than the
    528 current situation, where the relevant law (the PAT RIOT Act) does not
    529 clearly prohibit the practice.  In addition, if the government did
    530 resume this sort of surveillance, it would not get data about
    531 everyone's phone calls made prior to that time.</p>
    532 
    533 <p>For privacy about who you exchange email with, a simple partial
    534 solution is for you and others to use email services in a country that
    535 would never cooperate with your own government, and which communicate
    536 with each other using encryption.  However, Ladar Levison (owner of
    537 the mail service Lavabit that US surveillance sought to corrupt
    538 completely) has a more sophisticated idea for an encryption system
    539 through which your email service would know only that you sent mail to
    540 some user of my email service, and my email service would know only
    541 that I received mail from some user of your email service, but it
    542 would be hard to determine that you had sent mail to me.</p>
    543 </div>
    544 
    545 <h3 id="necessary">But Some Surveillance Is Necessary</h3>
    546 
    547 <div class="columns">
    548 <p>For the state to find criminals, it needs to be able to investigate
    549 specific crimes, or specific suspected planned crimes, under a court
    550 order.  With the Internet, the power to tap phone conversations would
    551 naturally extend to the power to tap Internet connections.  This power
    552 is easy to abuse for political reasons, but it is also necessary.
    553 Fortunately, this won't make it possible to find whistleblowers after
    554 the fact, if (as I recommend) we prevent digital systems from accumulating
    555 massive dossiers before the fact.</p>
    556 
    557 <p>Individuals with special state-granted power, such as police,
    558 forfeit their right to privacy and must be monitored.  (In fact,
    559 police have their own jargon term for perjury,
    560 &ldquo;<a href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302">testilying</a>,&rdquo;
    561 since they do it so frequently, particularly about protesters
    562 and <a href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/">
    563 photographers</a>.)
    564 One city in California that required police to wear video cameras all
    565 the time
    566 found <a href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
    567 use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
    568 
    569 <p><a
    570 href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
    571 are not people, and not entitled to human rights</a>.  It is
    572 legitimate to require businesses to publish the details of processes
    573 that might cause chemical, biological, nuclear, fiscal, computational
    574 (e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or political
    575 (e.g., lobbying) hazards to society, to whatever level is needed for
    576 public well-being.  The danger of these operations (consider the BP
    577 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
    578 that of terrorism.</p>
    579 
    580 <p>However, journalism must be protected from surveillance even when
    581 it is carried out as part of a business.</p>
    582 </div>
    583 
    584 <h3 id="conclusion">Conclusion</h3>
    585 
    586 <div class="reduced-width">
    587 <p>Digital technology has brought about a tremendous increase in the
    588 level of surveillance of our movements, actions, and communications.
    589 It is far more than we experienced in the 1990s, and <a
    590 href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far
    591 more than people behind the Iron Curtain experienced</a> in the 1980s,
    592 and proposed legal limits on state use of the accumulated data would
    593 not alter that.</p>
    594 
    595 <p>Companies are designing even more intrusive surveillance.  Some
    596 project that pervasive surveillance, hooked to companies such as
    597 Facebook, could have deep effects on <a
    598 href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how
    599 people think</a>.  Such possibilities are imponderable; but the threat
    600 to democracy is not speculation.  It exists and is visible today.</p>
    601 
    602 <p>Unless we believe that our free countries previously suffered from
    603 a grave surveillance deficit, and ought to be surveilled more than the
    604 Soviet Union and East Germany were, we must reverse this increase.
    605 That requires stopping the accumulation of big data about people.</p>
    606 <div class="column-limit"></div>
    607 
    608 <h3 class="footnote">End Note</h3>
    609 <ol>
    610 <li id="ambientprivacy">The condition of <em>not being monitored</em>
    611 has been referred to as <a
    612 href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient
    613 privacy</a>.</li>
    614 
    615 <li id="facial-recognition">In the 2020s, facial recognition deepens
    616 the danger of surveillance cameras.  China already identifies people
    617 by their faces so as to punish them,
    618 and <a href="https://www.theguardian.com/global-development/2022/sep/05/iran-government-facial-recognition-technology-hijab-law-crackdown">Iran
    619 is planning to use it to punish women who violate religion-imposed
    620 dress codes</a>.</li>
    621 </ol>
    622 
    623 <div class="infobox extra" role="complementary">
    624 <hr />
    625 <!-- rms: I deleted the link because of Wired's announced
    626      anti-ad-block system -->
    627 <p>A version of this article was first published in
    628 <cite>Wired</cite> in October&nbsp;2013.</p>
    629 </div>
    630 </div>
    631 </div>
    632 
    633 </div><!-- for id="content", starts in the include above -->
    634 <!--#include virtual="/server/footer.html" -->
    635 <div id="footer" role="contentinfo">
    636 <div class="unprintable">
    637 
    638 <p>Please send general FSF &amp; GNU inquiries to
    639 <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>.
    640 There are also <a href="/contact/">other ways to contact</a>
    641 the FSF.  Broken links and other corrections or suggestions can be sent
    642 to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>.</p>
    643 
    644 <p><!-- TRANSLATORS: Ignore the original text in this paragraph,
    645         replace it with the translation of these two:
    646 
    647         We work hard and do our best to provide accurate, good quality
    648         translations.  However, we are not exempt from imperfection.
    649         Please send your comments and general suggestions in this regard
    650         to <a href="mailto:web-translators@gnu.org">
    651         &lt;web-translators@gnu.org&gt;</a>.</p>
    652 
    653         <p>For information on coordinating and contributing translations of
    654         our web pages, see <a
    655         href="/server/standards/README.translations.html">Translations
    656         README</a>. -->
    657 Please see the <a
    658 href="/server/standards/README.translations.html">Translations
    659 README</a> for information on coordinating and contributing translations
    660 of this article.</p>
    661 </div>
    662 
    663 <!-- Regarding copyright, in general, standalone pages (as opposed to
    664      files generated as part of manuals) on the GNU web server should
    665      be under CC BY-ND 4.0.  Please do NOT change or remove this
    666      without talking with the webmasters or licensing team first.
    667      Please make sure the copyright date is consistent with the
    668      document.  For web pages, it is ok to list just the latest year the
    669      document was modified, or published.
    670      
    671      If you wish to list earlier years, that is ok too.
    672      Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
    673      years, as long as each year in the range is in fact a copyrightable
    674      year, i.e., a year in which the document was published (including
    675      being publicly visible on the web or in a revision control system).
    676      
    677      There is more detail about copyright years in the GNU Maintainers
    678      Information document, www.gnu.org/prep/maintain. -->
    679 
    680 <p>Copyright &copy; 2013-2019, 2021, 2022 Richard Stallman</p>
    681 
    682 <p>This page is licensed under a <a rel="license"
    683 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
    684 Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
    685 
    686 <!--#include virtual="/server/bottom-notes.html" -->
    687 
    688 <p class="unprintable">Updated:
    689 <!-- timestamp start -->
    690 $Date: 2022/09/17 18:24:26 $
    691 <!-- timestamp end -->
    692 </p>
    693 </div>
    694 </div><!-- for class="inner", starts in the banner include -->
    695 </body>
    696 </html>