America against democracy

The Economist:

That would have been some real democracy-promotion, right here in the homeland. What happened? Is it naive to think Mr Obama really believed this stuff? I’ll admit, with some embarrassment, that I’d thought he did believe it. But this “commitment” has been so thoroughly forsaken one is forced to consider whether it was ever sincere. It has been so thoroughly forsaken one wonders whether to laugh or cry. What kind of message are we sending about the viability these democratic ideals—about openness, transparency, public participation, public collaboration? How hollow must American exhortations to democracy sound to foreign ears? Mr Snowden may be responsible for having exposed this hypocrisy, for having betrayed the thug omertà at the heart of America’s domestic democracy-suppression programme, but the hypocrisy is America’s. I’d very much like to know what led Mr Obama to change his mind, to conclude that America is not after all safe for democracy, though I know he’s not about to tell us. The matter is settled. It has been decided, and not by us. We can’t handle the truth.

Circumventing Invasive Internet Surveillance with Carrier Pigeons

Laetus in Praesens:

Recent disclosures have revealed the extreme level of surveillance of telephone and internet communications, as discussed separately with respect to the US National Security Agency, the UK GCHQ, and other members of the Five Eyes Anglosphere agreement (Vigorous Application of Derivative Thinking to Derivative Problems, 2013). There is therefore a case for exploring how such surveillance can be avoided, if that is considered desirable. The situation can be compared to that in any wilderness where predators deliberately create zones of fear through the manner of their engagement with potential prey — prior to any attack, as recently noted (Scared to death: how predators really kill, New Scientist, 5 June 2013, pp. 36-39).

Extensive use has been made in the past of carrier pigeons for secure communications, notably in arenas of threat, and most notably in World War I, continuing into World War II, but to a lesser degree. The founder of the news agency Reuters made use of carrier pigeons for the delivery of vital financial data in parallel with introduction of the telegraph. Other little-known examples are cited in what follows.

With the current development in the insecurity of computer and internet technology, there is a case for exploring alternative possibilities in the light of the threat of internet surveillance and the need for secure communications. Security agencies are effectively framing the “war on terrorism” as a global war in which independent governments and institutions are a source of potential security threat — as well as the world population at large.

It is to be expected that active consideration will be given to possibilities of secure communications by diplomatic services following the Wikileaks disclosures (Alleged Breach of UN Treaty Obligations by US, 2010). It is also to be expected that governments with any interest in preserving the confidentiality of their own communications, including developing countries and delegations to international conferences, will want to consider their need for such facilities — especially in the light of the recent disclosures regarding communications in such contexts (Ewen MacAskill, et al., GCHQ intercepted foreign politicians’ communications at G20 summits, The Guardian, 17 June 2013; GCHQ taps fibre-optic cables for secret access to world’s communications, The Guardian, 21 June 2013). Clearly use of internet facilities has become increasingly untrustworthy.

NSA scandal delivers record numbers of internet users to DuckDuckGo

Charles Arthur

. Taking a class in stained-glass making, he discovered that the teacher’s handout with “useful web links” didn’t tally with Google’s results at all. “I realised that there were millions of people who knew the right list of search terms and would make a better engine than Google.”

Then he noticed growing amounts of junk sites in Google results – pushed there by experts who had gamed the giant’s algorithms. He decided that by hooking into web services such as Wikipedia, Yelp and Qype, he could get focused answers cheaply. By using a combination of those services and crowdsourced links, he built the site’s first search index.

Of the privacy angle, he says: “I kind of backed into that.” It wasn’t a political decision, but a personal one. “It’s hard to define my politics. I take every issue seriously and come to my own conclusion. I don’t really feel like I belong to any political party in the US … I guess I’m more on the liberal side.”

The reason he decided not to store search data was because it reveals so much about us. In 2005, AOL accidentally released details of searches made by 650,000 of its users via Google; reporters from the New York Times were able to use the information to identify one of the users: a 62-year-old woman in Georgia. Nowadays Google would also have your IP address (indicating your ISP and perhaps precise location) and, if you were logged in, all your previous search history. If you logged in to use Google on your mobile, it would have your location history too.

Having decided that searching is intimately personal, he deduced that governments would want to get hold of search data. “I looked at the search fiascos such as the AOL data release, and decided that government requests were real and would be inevitable, and that search engines and content companies would be handing over that data [to government] in increasing amounts.”