diff options
-rw-r--r-- | docs/surveillance-vs-democracy.md | 327 |
1 files changed, 303 insertions, 24 deletions
diff --git a/docs/surveillance-vs-democracy.md b/docs/surveillance-vs-democracy.md index 91b0ff3..d33b7b3 100644 --- a/docs/surveillance-vs-democracy.md +++ b/docs/surveillance-vs-democracy.md @@ -23,12 +23,24 @@ not exceeded? It is the level beyond which surveillance starts to interfere with the functioning of democracy, in that whistleblowers (such as Snowden) are likely to be caught. +多亏了爱德华•斯诺登的揭露,我们才知道当今社会中的普遍监控级别已经与人权 +不相容。在美国和世界其他地区持续发生的针对持不同政见者、信息来源和新闻工 +作者的骚扰和指控确认了这一点。我们需要适当降低普遍监控的级别,但是到底应 +当在多大程度上?我们所必须保证其不被超越的,可接受的最大监控级别到底是多 +少?这种监控级别应当这样定义:一旦超过了这样的级别,监控行为将会干涉民主 +的运行。此时揭露者(例如斯诺登)很可能因此而被逮捕。 + Faced with government secrecy, we the people depend on whistleblowers to tell us what the state is doing.[(1)](#FOOT1) However, today’s surveillance intimidates potential whistleblowers, which means it is too much. To recover our democratic control over the state, we must reduce surveillance to the point where whistleblowers know they are safe. +面对政府的保密政策,我们作为人民只能依靠揭露者告知国家正在做什么[(1)](#FOOT1)。 +然而,当今的监控对潜在的揭露者进行了威迫,也就是说监控程度过高。为了重获 +我们对于国家的民主控制,我们必须设法降低监控级别使得揭露者能够确信他们是 +安全的。 + Using free/libre software, as I’ve advocated for 30 years, is the first step in taking control of our digital lives, and that includes preventing surveillance. We can’t trust nonfree software; the NSA @@ -36,12 +48,18 @@ uses[(2)](#FOOT2) and even creates[(3)](#FOOT3) security weaknesses in nonfree software to invade our own computers and routers. Free software gives us control of our own computers, but that won’t protect our privacy once we set foot on the internet.[(4)](#FOOT4) -@firstcopyingnotice{{@footnoterule @smallskip Copyright © 2015 Richard + +如同我们所倡导了 30 多年的,使用自由软件是掌控我们自己的数字生活的第一步。 +这也包括了避免被监控。我们不可能信任任何私有软件;由于美国国家安全局(NSA) +通过利用[(2)](#FOOT2)甚至还有制造[(3)](#FOOT3)私有软件中的安全漏洞用于入 +侵我们自己的计算机和路由器。自由软件赋予了我们控制自己的计算机的权利,但 +仅凭这一点并不足以在我们涉足互联网的时候保护我们的隐私[(4)](#FOOT4)。 + +@firstcopyingnotice{{@footnoterule @smallskip 著作权所有 (C) 2015 Richard Stallman\ - {A version of this article was first published on the [Wired](Wired) -web site under the same title (Wired, 14 October 2013, -<http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance>). -This version is part of @fsfsthreecite} + {本文的一个版本最初以相同的标题发表于 [Wired](Wired) (Wired, 14 October 2013, +<http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance>)。 +此版本是 @fsfsthreecite 的一部分。} Bipartisan legislation to “curtail the domestic surveillance powers”[(5)](#FOOT5) in the US is being drawn up, but it relies on @@ -50,13 +68,23 @@ suffice to protect whistleblowers if “catching the whistleblower” is grounds for access sufficient to identify him or her. We need to go further. +美国国内“限制国内监控权力”(#FOOT5)的两党立法已经被提出,但它依赖于限制政 +府对我们的虚拟档案的使用。这不足以保护揭露者,如果“逮捕揭露者”是获取足够 +信息以确认此人身份的基础。 + ### The Upper Limit on Surveillance in a Democracy {#the-upper-limit-on-surveillance-in-a-democracy .subheading} +### 民主社会中的监控程度上限 {#the-upper-limit-on-surveillance-in-a-democracy .subheading} + If whistleblowers don’t dare reveal crimes and lies, we lose the last shred of effective control over our government and institutions. That’s why surveillance that enables the state to find out who has talked with a reporter is too much surveillance—too much for democracy to endure. +如果揭露者不敢揭发罪行和谎言,我们将会失去对我们的政府和制度的仅存的有效 +控制。这可以解释为何那种使得国家可以知道谁同记者进行交谈的监控行为是过分 +的——超出了民主所能承受的范围。 + An unnamed US government official ominously told journalists in 2011 that the US would not subpoena reporters because “We know who you’re talking to.”[(6)](#FOOT6) Sometimes journalists’ phone call records are @@ -64,6 +92,13 @@ subpoenaed[(7)](#FOOT7) to find this out, but Snowden has shown us that in effect they subpoena all the phone call records of everyone in the US, all the time, from Verizon[(8)](#FOOT8) and from other companies too.[(9)](#FOOT9)\ + +在 2011 年,一位匿名的美国政府官员不怀好意地告诉新闻工作者:美国政府在传 +唤记者时,并不会以“我们知道你同谁交谈”作为理由[(6)](#FOOT6)。有时,记者 +的通话记录将会被传唤以获知这个问题的答案[(7)](#FOOT7)。但是,斯诺登已经 +向我们展示,它们实际上将会在任何时刻传唤美国境内的任何人的所有通话记录, +通过 Verizon [(8)](#FOOT8)或其他通讯公司[(9)](#FOOT9)。\ + Opposition and dissident activities need to keep secrets from states that are willing to play dirty tricks on them. The ACLU has demonstrated the US government’s systematic practice of infiltrating peaceful @@ -72,8 +107,14 @@ terrorists among them. The point at which surveillance is too much is the point at which the state can find who spoke to a known journalist or a known dissident. +反对者和持不同政见者的活动需要对国家保密,由于国家将会主动对他们施展阴谋 +诡计。美国公民自由联盟(ACLU)已经指出美国政府对和平的持不同政见者和组织 +所进行的系统性渗透行为,理由是他们当中可能潜伏着恐怖分子[(10)](#FOOT10)。 + ### Information, Once Collected, Will Be Misused {#information-once-collected-will-be-misused .subheading} +### 信息,一旦被采集,将会被滥用 {#information-once-collected-will-be-misused .subheading} + When people recognize that the level of general surveillance is too high, the first response is to propose limits on access to the accumulated data. That sounds nice, but it won’t fix the problem, not @@ -84,6 +125,13 @@ grounds for access, so once a whistleblower is accused of “espionage,” finding the “spy” will provide an excuse to access the accumulated material. +当人们认识到普遍监控的级别过高的时候,他们的第一反应可能会是提议限制对所 +采集到的数据的访问。这听起来很好,但这甚至丝毫不能解决问题,即使假定政府 +遵守这条规则。(美国国家安全局(NSA)曾经欺骗美国外国情报监控法庭(FISA), +后者声称它不能有效地证实 NSA 对其监控行为有说明的义务。[(11)](#FOOT11)) +犯罪的嫌疑将成为访问这些数据的理由,于是,一旦揭露者被指控从事间谍活动, +试图找到这个间谍将会为访问所采集到的数据提供理由。 + In addition, the state’s surveillance staff will misuse the data for personal reasons. Some NSA agents used US surveillance systems to track their lovers—past, present, or wished-for—in a practice called @@ -93,26 +141,48 @@ these events shouldn’t surprise us, because police have long used their access to driver’s license records to track down someone attractive, a practice known as “running a plate for a date.”[(13)](#FOOT13) +此外,国家监控系统的工作人员将会出于个人原因滥用数据。一些 NSA 间谍使用 +美国国家监控系统来跟踪他们的情人——不论是过去的、现在的还是正在追求的—— +并称此行为为 LOVEINT [(12)](#FOOT12)。NSA 宣称它已经发现了几次这样的行为 +并对其进行了处罚;但是我们不知道还有多少次这样的行为未被抓到。然而,这些 +事件并不会让我们感到惊讶,由于警方已经长期利用他们可访问的驾照记录以跟踪 +那些迷倒了他们的对象。这种行为称之为“查询车牌获得约会”[(13)](#FOOT13)。 + Surveillance data will always be used for other purposes, even if this is prohibited. Once the data has been accumulated and the state has the possibility of access to it, it can misuse that data in dreadful ways, as shown by examples from Europe[(14)](#FOOT14) and the US.[(15)](#FOOT15) +监控数据总是会被用于其他目的,即使这是被禁止的。只要数据被采集,国家就有 +可能访问它们。国家可以以极坏的方式滥用这些数据,发生在欧洲[(14)](#FOOT14) +和美国[(15)](#FOOT15)的一些例子证实了这一点。 + Personal data collected by the state is also likely to be obtained by outside crackers that break the security of the servers, even by crackers working for hostile states.[(16)](#FOOT16) +国家所采集的个人信息同样可能由于服务器的安全措施被攻陷而被境外破解者获得, +甚至是被那些效力于敌对国家的破解者获得[(16)](#FOOT16)。 + Governments can easily use massive surveillance capability to subvert democracy directly.[(17)](#FOOT17) +政府可以轻松地利用大规模监控能力直接颠覆民主[(17)](#FOOT17)。 + Total surveillance accessible to the state enables the state to launch a massive fishing expedition against any person. To make journalism and democracy safe, we must limit the accumulation of data that is easily accessible to the state. +国家对监控数据的完全访问权力使得国家可能对任何人发动大规模的彻底搜查。为 +了保护新闻业和民主的安全,我们必须限制对信息的采集,而这些信息是国家可以 +轻松访问的。 + ### Robust Protection for Privacy Must Be Technical {#robust-protection-for-privacy-must-be-technical .subheading} +### 对隐私的有效保护必须是技术层面的 {#robust-protection-for-privacy-must-be-technical .subheading} + The Electronic Frontier Foundation and other organizations propose a set of legal principles designed to prevent the abuses of massive surveillance.[(18)](#FOOT18) These principles include, crucially, @@ -120,14 +190,25 @@ explicit legal protection for whistleblowers; as a consequence, they would be adequate for protecting democratic freedoms—if adopted completely and enforced without exception forever. +电子前哨基金会(EFF)和一些其他组织提出了一系列法律准则以期阻止大规模的 +监控滥用[(18)](#FOOT18)。这些准则关键性地包括了对揭露者的明确的法律保护。 +其结果是这些准则将足以保护民主自由——如果它们能够永久地得到完全采纳,并且 +被没有例外地严格强制执行。 + However, such legal protections are precarious: as recent history shows, they can be repealed (as in the FISA Amendments Act), suspended, or ignored.[(19)](#FOOT19) +然而,这样的法律保护是不牢靠的:如同最近多年的历史事实所展示的,它们可以 +被废除(如同在美国外国情报监控法案(FISA)修正案中)、被架空或者被无视[(19)](#FOOT19)。 + Meanwhile, demagogues will cite the usual excuses as grounds for total surveillance; any terrorist attack, even one that kills just a handful of people, can be hyped to provide an opportunity. +同时,一些蛊惑民心的政客将会援引常见的理由作为支持完全监控的基础;任何恐 +怖袭击,即使只是造成了极少的人员伤亡,也可以被夸大作为证据以支持上述理由。 + If limits on access to the data are set aside, it will be as if they had never existed: years’ worth of dossiers would suddenly become available for misuse by the state and its agents and, if collected by companies, @@ -138,20 +219,39 @@ implement surveillance afresh, and it would only collect data starting at that date. As for suspending or momentarily ignoring this law, the idea would hardly make sense. +如果对数据访问的限制被搁置一旁,它就如同从未存在过一般:多年来的有价值的 +档案将会立即可被国家和它的间谍所滥用。如果这些档案被商业公司获得,也会被 +这些商业公司出于其私有目的而被滥用。然而,如果我们能够阻止对每个人的档案 +的采集,这些档案将不复存在,并且国家不能反动地对它们进行编译。一种新的不 +允许言论或行动自由的政体将会不得不从头实施监控,并且它自成立之初只会采集 +新的数据。至于架空或者立即无视这条法律,这种想法几乎没有任何意义。 + ### First, Don’t Be Foolish {#first-dont-be-foolish .subheading} +### 最重要的是,不要犯傻! {#first-dont-be-foolish .subheading} + To have privacy, you must not throw it away: the first one who has to protect your privacy is you. Avoid identifying yourself to web sites, contact them with Tor, and use browsers that block the schemes they use to track visitors. Use the GNU Privacy Guard to encrypt the contents of your email. Pay for things with cash. +如果您想要拥有隐私,您一定不要主动将其放弃:有义务保护您的隐私的最重要的 +人就是您自己!您必须避免向网站暴露自己的身份,您可以使用 Tor 同它们联络, +或者使用那些能够阻止网站用于跟踪访问者的阴谋诡计的浏览器。您可以使用 GNU +隐私卫士(GNU PG)加密您的邮件内容。您可以使用现金支付任何费用。 + Keep your own data; don’t store your data in a company’s “convenient” server. It’s safe, however, to entrust a data backup to a commercial service, provided you put the files in an archive and encrypt the whole archive, including the names of the files, with free software on your own computer before uploading it. +保护您自己的数据;不要将您的数据储存在某家商业公司的“简便易用”的服务器上。 +然而,在下面这种情况下,将数据存储在商业服务之上是安全的:只要您将文件置 +于归档文件中,并且加密整个归档文件,包括文件名。务必使用自由软件在您自己 +的计算机上进行操作,然后再上传。 + For privacy’s sake, you must avoid nonfree software since, as a consequence of giving others control of your computing, it is likely to spy on you.[(20)](#FOOT20) Avoid service as a software @@ -159,6 +259,11 @@ substitute;[(21)](#FOOT21) as well as giving others control of your computing, it requires you to hand over all the pertinent data to the server. +出于隐私考虑,您必须避免使用私有软件,这是由于私有软件赋予他人控制您的计 +算机使用的权力,它们很可能在监控您[(20)](#FOOT20)。您还应该拒绝使用“软件 +即服务”(SaaSS)[(21)](#FOOT21),同样由于这赋予了他人控制您的计算机使用 +的权力,它要求您将全部相关数据提交到它们的服务器。 + Protect your friends’ and acquaintances’ privacy, too. Don’t give out their personal information[(22)](#FOOT22) except how to contact them, and never give any web site your list of email or phone contacts. Don’t @@ -168,6 +273,13 @@ Facebook at all. Reject communication systems that require users to give their real names, even if you are going to give yours, since they pressure other people to surrender their privacy. +您也需要保护您的朋友或熟人的隐私。除了联系方式以外,不要泄露他们的任何个 +人信息[(22)](#FOOT22)。并且不要向任何网站泄露您的邮件列表或者电话联系人。 +不要将您的朋友的任何信息告诉诸如 Facebook 这样的公司,因为您的朋友也许并 +不想在报纸上公布他们的名字。如果可能,根本不要被 Facebook 所利用。拒绝使 +用任何要求用户提供真实姓名的通讯系统,即使您愿意供出您的名字,由于这些通 +讯系统向他人施压以迫使他们交出隐私。 + Self-protection is essential, but even the most rigorous self-protection is insufficient to protect your privacy on or from systems that don’t belong to you. When we communicate with others or move around the city, @@ -176,13 +288,24 @@ the systems that surveil our communications and movements, but not all of them. Clearly, the better solution is to make all these systems stop surveilling people other than legitimate suspects. +自我保护是至关重要的,但即使是最严密的自我保护也不足以保护您的隐私免于被 +不属于您的系统所泄露。当我们与他人通讯或者在城市内出行的时候,我们的隐私 +取决于社会的实践。我们可以避开一些但不是全部的可以监控我们的通讯或行踪的 +系统。显然,更佳的解决方案是使得所有这些系统停止监控人们,而非使嫌疑对象 +合法。 + ### We Must Design Every System for Privacy {#we-must-design-every-system-for-privacy .subheading} +### 我们必须为了隐私而去设计各种系统 {#we-must-design-every-system-for-privacy .subheading} + If we don’t want a total surveillance society, we must consider surveillance a kind of social pollution, and limit the surveillance impact of each new digital system just as we limit the environmental impact of physical construction. +如果我们不想要一个全面监控的社会,我们必须将监控视为一种社会污染,并且限 +制每一个新的数字系统的监控影响,如同我们限制实体建设的环境影响。 + For example: “smart” meters for electricity are touted for sending the power company moment-by-moment data about each customer’s electric usage, including how usage compares with users in general. This is @@ -194,10 +317,21 @@ customer’s meter could compare her usage, over any desired period of time, with the average usage pattern for that period. The same benefit, with no surveillance! +例如,智能电表宣称它能够向电力公司持续发送每位用户的电力消耗,包括与普通 +用户相比较的情况。这种统计是基于普遍监控而实现的,但实际上却又不需要任何 +监控行为。电力公司可以容易地计算出某一居住区的平均电力消耗,通过将总消耗 +除以购电者的数量,并且将这个平均值发送至电表。每个用户的电表可以将本人的 +电力使用情况同任何时期的平均电力使用相比较,这样就可以不用监控而实现所有 +好处。 + We need to design such privacy into all our digital systems. +我们需要将这样的隐私设计融入我们所有的数字系统。 + ### Remedy for Collecting Data: Leaving It Dispersed {#remedy-for-collecting-data-leaving-it-dispersed .subheading} +### 针对数据采集的补救:让数据分散开来 {#remedy-for-collecting-data-leaving-it-dispersed .subheading} + One way to make monitoring safe for privacy is to keep the data dispersed and inconvenient to access. Old-fashioned security cameras were no threat to privacy.[(23)](#FOOT23) The recording was stored on @@ -207,6 +341,13 @@ massively; they were accessed only in the places where someone reported a crime. It would not be feasible to physically collect millions of tapes every day and watch them or copy them. +使监控行为不危害隐私的一种方式是保持数据处于分散状态从而难于访问。老式的 +安全摄像机对于隐私很少构成威胁[(23)](#FOOT23),由于录像数据存储在安装这 +些设备的营业场所内,并且至多被保存几周。由于访问这些数据相对困难,这种数 +据采集行动从未被大规模部署;只有当某人报导一起犯罪行为时,这些影响数据才 +会被访问。每天对数以百万计的数据卡带进行人工采集再进行观看或复制可能是不 +现实的。 + Nowadays, security cameras have become surveillance cameras: they are connected to the internet so recordings can be collected in a data center and saved forever. This is already dangerous, but it is going to @@ -214,6 +355,11 @@ get worse. Advances in face recognition may bring the day when suspected journalists can be tracked on the street all the time to see who they talk with. +如今,安全摄像机已经变成了监控摄像机:由于它们被连接到互联网,影像记录可 +以被采集到一所数据中心并被永久保存。这已经是很危险的了,但事情正在变得更 +坏。面部识别技术的发展使得这样的事情成为可能:对可疑的新闻记者在街道上进 +行不间断跟踪以便察看他们同何人交谈。 + Internet-connected cameras often have lousy digital security themselves, so anyone could watch what the camera sees.[(24)](#FOOT24) To restore privacy, we should ban the use of internet-connected cameras aimed where @@ -221,8 +367,15 @@ and when the public is admitted, except when carried by people. Everyone must be free to post photos and video recordings occasionally, but the systematic accumulation of such data on the internet must be limited. +通常,联网的摄像机自身的数据安全措施极差,使得几乎任何人都能察看它所记录 +的内容[(24)](#FOOT24)。为了重获隐私,我们应当禁止在针对公众的场合使用联 +网的摄像机,除非它由人进行操作。每个人必须被允许偶尔发布照片或视频记录, +但对于互联网上的相关数据的系统性采集行为必须受到限制。 + ### Remedy for Internet Commerce Surveillance {#remedy-for-internet-commerce-surveillance .subheading} +### 针对互联网商业监控的补救 {#remedy-for-internet-commerce-surveillance .subheading} + Most data collection comes from people’s own digital activities. Usually the data is collected first by companies. But when it comes to the threat to privacy and democracy, it makes no difference whether @@ -230,12 +383,22 @@ surveillance is done directly by the state or farmed out to a business, because the data that the companies collect is systematically available to the state. +大部分数据采集行为来自于人们自身的数字活动。数据通常首先由商业公司进行采 +集。但是,当讨论监控行为对隐私和民主的威胁的时候,监控行为直接由国家进行 +或者由商业公司代为进行并无本质区别,由于商业公司所采集的数据,国家也可以 +系统性地获取。 + The NSA, through PRISM, has gotten into the databases of many large internet corporations.[(25)](#FOOT25) AT&T has saved all its phone call records since 1987 and makes them available to the DEA[(26)](#FOOT26) to search on request. Strictly speaking, the US government does not possess that data, but in practical terms it may as well possess it. +NSA 通过棱镜计划(PRISM)进入了多家大型互联网公司的数据库[(25)](#FOOT25)。 +AT&T 自 1987 年起保存了所有通话记录并且允许美国缉毒局(DEA)对其所有数据 +进行搜索[(26)](#FOOT26)。严格地说,美国政府并不直接拥有这些数据,但它实际 +上拥有这些数据。 + The goal of making journalism and democracy safe therefore requires that we reduce the data collected about people by any organization, not just by the state. We must redesign digital systems so that they do not @@ -243,6 +406,11 @@ accumulate data about their users. If they need digital data about our transactions, they should not be allowed to keep them more than a short time beyond what is inherently necessary for their dealings with us. +因此,为了保证新闻业和民主的安全,我们必须减少由任何组织采集的关于个人的 +数据,而不仅仅是由国家采集的数据。我们必须这样重新设计各种数字系统以使其 +不再采集其用户的数据。如果它们确实需要关于我们的重要数字数据,当超出处理 +数据所需的基本时间以后,它们不应该被允许继续保留那些数据。 + One of the motives for the current level of surveillance of the internet is that sites are financed through advertising based on tracking users’ activities and propensities. This converts a mere annoyance—advertising @@ -251,6 +419,12 @@ whether we know it or not. Purchases over the internet also track their users. And we are all aware that “privacy policies” are more excuses to violate privacy than commitments to uphold it. +当前的互联网监控级别的动机之一是网站通过跟踪用户的活动和偏好的广告行为而 +获得经济支持。这使得广告,作为一种我们可以学会无视之的行为,从一种仅仅是 +恼人的行为变成了一种对我们造成伤害的监控系统,不论我们是否了解它的内情。 +互联网购物同样会跟踪用户,我们都已经意识到,所谓的“隐私条款”与其说是维护 +用户隐私的承诺,不如说是它们用于侵犯用户隐私的借口。 + We could correct both problems by adopting a system of anonymous payments—anonymous for the payer, that is. (We don’t want the payee to dodge taxes.) Bitcoin is not anonymous,[(27)](#FOOT27) though there are @@ -259,14 +433,26 @@ technology for digital cash was first developed in the 1980s;[(28)](#FOOT28)we need only suitable business arrangements, and for the state not to obstruct them. +我们可以通过采用一种匿名支付系统——即隐藏付款人的身份——来解决以上两个问题。 +(我们并不想协助收款人避税。)比特币不是匿名的[(27)](#FOOT27),尽管有人 +试图开发出允许使用比特币进行匿名支付的方式。然而,数字货币技术的开发始于 +20 世纪 80 年代[(28)](#FOOT28);我们只需要对商业规则进行适当调整,并且使 +得国家不会阻止它们。 + A further threat from sites’ collection of personal data is that security breakers might get in, take it, and misuse it. This includes customers’ credit card details. An anonymous payment system would end this danger: a security hole in the site can’t hurt you if the site knows nothing about you. +网站对个人数据的采集的更大的威胁在于破解者可以攻陷安全措施,获取并滥用个 +人数据。这可能还包括用户的信用卡信息。而匿名支付系统可以终结这种威胁:网 +站的安全漏洞不会危害您,如果网站并不知道您的任何信息。 + ### Remedy for Travel Surveillance {#remedy-for-travel-surveillance .subheading} +### 针对旅行监控的补救 {#remedy-for-travel-surveillance .subheading} + We must convert digital toll collection to anonymous payment (using digital cash, for instance). License-plate recognition systems recognize all license plates, and the data can be kept @@ -277,9 +463,17 @@ but only for a few days, and not make the full data available over the internet; access to the data should be limited to searching for a list of court-ordered license numbers. +我们必须将数字收费系统改为匿名支付系统(例如使用数字货币)。牌照识别系统 +将会识别各种牌照,而这些数据可以被无限期保存[(29)](#FOOT29);应该由法律 +要求它们仅仅记录那些由法庭命令要求追查的牌照号码。另一种不太安全的措施是 +在本地记录所有车辆牌照,但仅保存几天时间,并且不允许从网络访问所有数据; +对数据的访问应该限于搜索一系列由法庭命令要求追查的牌照号码之中。 + The US “no-fly” list must be abolished because it is punishment without trial.[(30)](#FOOT30) +美国“禁飞黑名单”必须被废除,由于这是一种未经审判的刑罚[(30)](#FOOT30)。 + It is acceptable to have a list of people whose person and luggage will be searched with extra care, and anonymous passengers on domestic flights could be treated as if they were on this list. It is also @@ -287,6 +481,10 @@ acceptable to bar non-citizens, if they are not permitted to enter the country at all, from boarding flights to the country. This ought to be enough for all legitimate purposes. +要求对某个黑名单上的乘客的行李进行额外的搜查是可以接受的,国内航班上的匿 +名乘客可以被视为在此黑名单之上。禁止非某国公民登上飞往该国的航班也是可以 +接受的,如果他们甚至未被批准入境。这些措施对于任何法律目的都是足够的。 + Many mass transit systems use some kind of smart cards or RFIDs for payment. These systems accumulate personal data: if you once make the mistake of paying with anything but cash, they associate the card @@ -294,6 +492,11 @@ permanently with your name. Furthermore, they record all travel associated with each card. Together they amount to massive surveillance. This data collection must be reduced. +很多公共交通系统使用某种智能卡或者射频识别(RFID)设备进行支付。这些系统 +将会采集个人数据:只要您错误地使用现金以外的任何方式进行支付,它们将会将 +此卡片和您的姓名永久关联起来。接下来,它们将会记录与每块卡片相关联的所有 +出行信息。这些行为加起来已经构成了大规模监控,这样的数据采集必须被限制。 + Navigation services do surveillance: the user’s computer tells the map service the user’s location and where the user wants to go; then the server determines the route and sends it back to the user’s computer, @@ -305,6 +508,13 @@ pertinent regions (if not downloaded previously), compute the route, and display it, without ever telling anyone where the user is or wants to go. +导航服务也会进行监控:用户的计算机将用户的所在地和目的地告知地图服务;而 +后服务器确定路线,返回用户的计算机并且显示出来。现在,服务器很可能会记录 +用户的位置信息,由于没有什么措施能够阻止它们这样做。这种监控行为本质上并 +不必要,并且可以通过重新设计来解决:用户计算机中的自由软件将会下载相关地 +区的地图数据(如果之前从未下载),计算出最佳路线并且显示出来,而无需告知 +任何人用户的所在地或目的地。 + Systems for borrowing bicycles, etc., can be designed so that the borrower’s identity is known only inside the station where the item was borrowed. Borrowing would inform all stations that the item is “out,” so @@ -319,8 +529,20 @@ If an item remains “out” for too long, the station where it was borrowed can inform headquarters; in that case, it could send the borrower’s identity immediately. +用于诸如自行车租借等目的的系统可以这样设计:租借者的身份仅在其借出物品的 +站点内可知。物品借出时,将会通知所有站点某件物品处于借出状态,这样,当用 +户将物品返还回任何站点(通常是另一处站点)的时候,该站点将会获知该物品被 +借出的时间和地点,同时将会告知所有其他站点该物品不再处于借出状态。站点还 +会计算用户的账单并将账单信息(等待随机长度的时间之后)沿着一系列环形拓扑 +结构的站点之间的线路发送至总部。这样,总部将不会获知账单信息来自哪个站点。 +当这一操作完成后,归还站点将会忘记所有与这笔已完成的业务有关的信息。如果 +某一物品长时间处于借出状态,借出该物品的站点将会告知总部。此时,它可以立 +即发送借用者的身份信息。 + ### Remedy for Communications Dossiers {#remedy-for-communications-dossiers .subheading} +### 关于通讯档案的补救 {#remedy-for-communications-dossiers .subheading} + Internet service providers and telephone companies keep extensive data on their users’ contacts (browsing, phone calls, etc.). With mobile phones, they also record the user’s physical location.[(31)](#FOOT31) @@ -328,11 +550,21 @@ They keep these dossiers for a long time: over 30 years, in the case of AT&T. Soon they will even record the user’s body activities.[(32)](#FOOT32) It appears that the NSA collects cell phone location data in bulk.[(33)](#FOOT33)\ + +互联网服务供应商(ISP)和电信公司保存着它们的用户的联系人的海量数据(浏 +览、通话记录等)。对于移动电话,还会记录用户的物理位置[(31)](#FOOT31), +例如 AT&T 已保存了超过 30 年。不久以后它们甚至还会记录用户的身体活动[(32)](#FOOT32)。 +并且 NSA 很可能正在大规模采集移动电话的物理位置数据[(33)](#FOOT33)。\ + Unmonitored communication is impossible where systems create such dossiers. So it should be illegal to create or keep them. ISPs and phone companies must not be allowed to keep this information for very long, in the absence of a court order to surveil a certain party. +只要通讯系统创建这样的通讯档案,不受监视的通讯就不可能实现。因此创建或记 +录这些通讯档案应该被判定为非法。ISP 和电信公司必须不被允许长期保存这些信 +息,或者在没有法庭命令的情况下长期监控某一特定人群。 + This solution is not entirely satisfactory, because it won’t physically stop the government from collecting all the information immediately as it is generated—which is what the US does with some or all phone @@ -342,6 +574,13 @@ relevant law (the PAT RIOT Act) does not clearly prohibit the practice. In addition, if the government did resume this sort of surveillance, it would not get data about everyone’s phone calls made prior to that time. +这种解决方案并不是完全令人满意,由于这并不能实际上阻止政府在通讯信息生成 +的时候立即对其进行采集——这正是美国政府对部分或全部电信公司所做的[(34)](#FOOT34)。 +我们可能想要依靠法律禁止这种行为。但是,这种假设比现实的状况好得多,现实 +中的相关法律(美国爱国者法案,我称之为 PAT RIOT Act)并不明确禁止这种行 +为。此外,如果政府重启这种监控,它不应得到重启监控的时间点之前发生的每位 +用户的通话记录数据。 + For privacy about who you exchange email with, a simple partial solution is for you and others to use email services in a country that would never cooperate with your own government, and which communicate with @@ -353,8 +592,17 @@ email service, and my email service would know only that I received mail from some user of your email service, but it would be hard to determine that you had sent mail to me. +为了保护您的电子邮件联系人的隐私,一种简单的方式是您和他人都使用某个不会 +与您所在国家政府进行合作的国家提供的邮件服务,并且在通讯过程中使用加密。 +然而,Ladar Levison(Lavabit 的拥有者,美国监控系统试图对其邮件服务实现 +完全控制)提出了一种更为高级的加密系统设想:您向我的邮件服务的某位客户发 +送邮件,我的邮件服务所知道的只是我收到了来自您所使用的邮件服务的某位用户 +的邮件,但难以确认是您向我发送了邮件。 + ### But Some Surveillance Is Necessary {#but-some-surveillance-is-necessary .subheading} +### 但是,适度的监控是必需的 {#but-some-surveillance-is-necessary .subheading} + For the state to find criminals, it needs to be able to investigate specific crimes, or specific suspected planned crimes, under a court order. With the internet, the power to tap phone conversations would @@ -364,6 +612,12 @@ Fortunately, this won’t make it possible to find whistleblowers after the fact, if (as I recommend) we prevent digital systems from accumulating massive dossiers before the fact. +国家为了缉捕罪犯,它需要能够在法庭命令下调查特定的犯罪行为或者疑似犯罪预 +谋。在互联网时代,监听通话的权力自然延伸到监听互联网连接的权力。这种权力 +容易处于政治原因而被滥用,但这也是必需的。幸运的是,这并不会使得在案件发 +生之后找到揭露者变为可能,如果(如我所建议的)能够阻止数字系统在事件发生 +之前进行大规模档案信息采集。 + Individuals with special state-granted power, such as police, forfeit their right to privacy and must be monitored. (In fact, police have their own jargon term for perjury, “testilying,”[(35)](#FOOT35) since @@ -372,6 +626,12 @@ photographers.[(36)](#FOOT36)) One city in California that required police to wear video cameras all the time found their use of force fell by 60 percent.[(37)](#FOOT37) The ACLU is in favor of this. +拥有国家赋予的权力的个人,例如警察,将被收回个人的隐私权并且必须被监视。 +(事实上,警察拥有属于他们自己的伪证罪的别名 testilying[(35)](#FOOT35)。 +由于他们经常做出这样的事情,特别是对于抗议者和摄影师[(36)](#FOOT36)。) +加州的某个城市要求警察随时随身携带摄像机之后,他们的武力使用下降了 60% [(37)](#FOOT37)。 +ACLU 对此表示欢迎。 + Corporations are not people, and not entitled to human rights.[(38)](#FOOT38) It is legitimate to require businesses to publish the details of processes that might cause chemical, biological, nuclear, @@ -381,26 +641,50 @@ well-being. The danger of these operations (consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism. +商业公司不是自然人,因此不应被赋予自然人的权利[(38)](#FOOT38)。要求商业 +公司公开其行为的细节是正当合理的,这些行为可能会造成对社会的化学、生物、 +核、财政、计算机相关(例如数字版权管理 DRM [(39)](#FOOT39))或者政治( +例如游说拉票行为)等方面的危害,这些危害级别必须被控制在公众幸福所要求 +的范围以内。这些行为造成的危害(考虑诸如墨西哥湾漏油事件、福岛核电站事 +故、2008 年财政危机等)更甚于恐怖主义。 + However, journalism must be protected from surveillance even when it is carried out as part of a business. +然而,新闻业必须被保护免遭监控,即使这种监控行为是作为某项业务的一部分而 +被执行的。 + Digital technology has brought about a tremendous increase in the level of surveillance of our movements, actions, and communications. It is far more than we experienced in the 1990s, and far more than people behind the Iron Curtain experienced in the 1980s,[(40)](#FOOT40) and proposed legal limits on state use of the accumulated data would not alter that. +数字技术的进展极大地提高了我们的出行、活动和通讯所受的监控水平。这种监控 +水平远远超过了 20 世纪 90 年代我们所经历过的,也远远超过了 20 世纪 80 年 +代生活在铁幕笼罩之下的人们所经历的[(40)](#FOOT40)。而提议对国家使用采集 +到的数据进行法律限制并不能改变这种状况。 + Companies are designing even more intrusive surveillance. Some project that pervasive surveillance, hooked to companies such as Facebook, could have deep effects on how people think.[(41)](#FOOT41)Such possibilities are imponderable; but the threat to democracy is not speculation. It exists and is visible today. +商业公司正在设计更具侵略性的监控设施。一些充斥着监控行为的工程依附于诸如 +Facebook 之类的公司,它们可能对人们的思考方式产生深远的影响[(41)](#FOOT41)。 +这样的可能性是不可预测的;然而它对民主的威胁已经不是推测。这种威胁无处不 +在,随时可见。 + Unless we believe that our free countries previously suffered from a grave surveillance deficit, and ought to be surveilled more than the Soviet Union and East Germany were, we must reverse this increase. That requires stopping the accumulation of big data about people. +除非我们坚信我们的自由国家之前的监控行为严重欠缺,并且我们理应受到更甚于 +苏联和联邦德国那样的监控。否则我们必须逆转这种监控升级的趋势,这依赖于阻 +止对民众的大数据进行大规模采集。 + <div class="footnote"> ------------------------------------------------------------------------ @@ -459,12 +743,10 @@ sep/24/yemen-leak-sachtleben-guilty-associated-press](http://www.theguardian.com ### [(8)](#DOCF8) -@raggedright See “Verizon forced to hand over telephone data—full court -ruling” (6 June 2013), at +@raggedright 参见 “Verizon forced to hand over telephone data—full court +ruling” (6 June 2013) 位于 <http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order>, -for the Foreign Intelligence Surveillance Court under which the US -government “is collecting the phone records of millions of US customers -of Verizon.” @end raggedright +以获得关于美国外国情报监控法庭(FISA)之下美国政府采集 Verizon 旗下数以百万计的美国客户的通话记录的信息。 @end raggedright ### [(9)](#DOCF9) @@ -508,8 +790,7 @@ Used against the Citizens,” 17 March 2012, ### [(15)](#DOCF15) -@raggedright Consider, for instance, the US internment of Japanese -Americans during WWII. @end raggedright +@raggedright 考虑二战期间被收容的日裔美国人。 @end raggedright ### [(16)](#DOCF16) @@ -539,20 +820,17 @@ Wiretaps Exceeded Law,” 15 April 2009, ### [(20)](#DOCF20) -@raggedright For decades, the free software movement has been denouncing -the abusive surveillance machine of proprietary software companies such -as Microsoft and Apple. For a growing list of the ways in which -surveillance has spread across industries, not only in the software -business, but also in the hardware and—away from the keyboard—in the -mobile computing industry, in the office, at home, in transportation -systems, and in the classroom, see +@raggedright 几十年来,自由软件运动一直致力于揭露私有软件公司诸如微软 +和苹果的专权的监控机制。监控行为已经在各行业之间蔓延,而不再限于软件产 +业,并且——离开键盘的限制——进入移动计算业界,在办公室、家庭、交通工具、 +教室内等。如需获知监控行为进入这些领域的不断增加的方式,参见 <http://gnu.org/philosophy/proprietary/proprietary-surveillance.html>. @end raggedright ### [(21)](#DOCF21) -@raggedright See “Who Does That Server Really Serve?” (@pageref{Server}) -for more information on this issue. @end raggedright +@raggedright 参见 “Who Does That Server Really Serve?” (@pageref{Server}) +一文以获取更多信息。 @end raggedright ### [(22)](#DOCF22) @@ -564,9 +842,8 @@ in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/](http://bits.blo ### [(23)](#DOCF23) -@raggedright I assume here that the security camera points at the inside -of a store, or at the street. Any camera pointed at someone’s private -space by someone else violates privacy, but that is another issue. @end +@raggedright 我在此假定安全摄像机用于诸如商店内部或大街上。任何由其他 +人架设的对准某人私人空间的摄像机侵犯了隐私,但这是另一个问题。 @end raggedright ### [(24)](#DOCF24) @@ -710,3 +987,5 @@ Things Result in Predictable People?” 10 August 2015, This document was generated by *tonghuix* on *March 25, 2016* using [*texi2html 1.82*](http://www.nongnu.org/texi2html/).\ + +汉化:Nadebula |