summaryrefslogtreecommitdiff
path: root/docs/surveillance-vs-democracy.md
diff options
context:
space:
mode:
Diffstat (limited to 'docs/surveillance-vs-democracy.md')
-rw-r--r--docs/surveillance-vs-democracy.md709
1 files changed, 709 insertions, 0 deletions
diff --git a/docs/surveillance-vs-democracy.md b/docs/surveillance-vs-democracy.md
new file mode 100644
index 0000000..bff9e5b
--- /dev/null
+++ b/docs/surveillance-vs-democracy.md
@@ -0,0 +1,709 @@
+---
+Generator: 'texi2html 1.82'
+description: Untitled Document
+distribution: global
+keywords: Untitled Document
+resource-type: document
+title: Untitled Document
+...
+
+1. How Much Surveillance Can Democracy Withstand? {#how-much-surveillance-can-democracy-withstand .chapter}
+=================================================
+
+Thanks to Edward Snowden’s disclosures, we know that the current level
+of general surveillance in society is incompatible with human rights.
+The repeated harassment and prosecution of dissidents, sources, and
+journalists in the US and elsewhere provides confirmation. We need to
+reduce the level of general surveillance, but how far? Where exactly is
+the *maximum tolerable level of surveillance,* which we must ensure is
+not exceeded? It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.
+
+Faced with government secrecy, we the people depend on whistleblowers to
+tell us what the state is doing.[(1)](#FOOT1) However, today’s
+surveillance intimidates potential whistleblowers, which means it is too
+much. To recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.
+
+Using free/libre software, as I’ve advocated for 30 years, is the first
+step in taking control of our digital lives, and that includes
+preventing surveillance. We can’t trust nonfree software; the NSA
+uses[(2)](#FOOT2) and even creates[(3)](#FOOT3) security weaknesses in
+nonfree software to invade our own computers and routers. Free software
+gives us control of our own computers, but that won’t protect our
+privacy once we set foot on the internet.[(4)](#FOOT4)
+@firstcopyingnotice{{@footnoterule @smallskip Copyright © 2015 Richard
+Stallman\
+ {A version of this article was first published on the [Wired](Wired)
+web site under the same title (Wired, 14 October 2013,
+<http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance>).
+This version is part of @fsfsthreecite}
+
+Bipartisan legislation to “curtail the domestic surveillance
+powers”[(5)](#FOOT5) in the US is being drawn up, but it relies on
+limiting the government’s use of our virtual dossiers. That won’t
+suffice to protect whistleblowers if “catching the whistleblower” is
+grounds for access sufficient to identify him or her. We need to go
+further.
+
+### The Upper Limit on Surveillance in a Democracy {#the-upper-limit-on-surveillance-in-a-democracy .subheading}
+
+If whistleblowers don’t dare reveal crimes and lies, we lose the last
+shred of effective control over our government and institutions. That’s
+why surveillance that enables the state to find out who has talked with
+a reporter is too much surveillance—too much for democracy to endure.
+
+An unnamed US government official ominously told journalists in 2011
+that the US would not subpoena reporters because “We know who you’re
+talking to.”[(6)](#FOOT6) Sometimes journalists’ phone call records are
+subpoenaed[(7)](#FOOT7) to find this out, but Snowden has shown us that
+in effect they subpoena all the phone call records of everyone in the
+US, all the time, from Verizon[(8)](#FOOT8) and from other companies
+too.[(9)](#FOOT9)\
+ Opposition and dissident activities need to keep secrets from states
+that are willing to play dirty tricks on them. The ACLU has demonstrated
+the US government’s systematic practice of infiltrating peaceful
+dissident groups[(10)](#FOOT10) on the pretext that there might be
+terrorists among them. The point at which surveillance is too much is
+the point at which the state can find who spoke to a known journalist or
+a known dissident.
+
+### Information, Once Collected, Will Be Misused {#information-once-collected-will-be-misused .subheading}
+
+When people recognize that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data. That sounds nice, but it won’t fix the problem, not
+even slightly, even supposing that the government obeys the rules. (The
+NSA has misled the FISA court, which said it was unable to effectively
+hold the NSA accountable.)[(11)](#FOOT11) Suspicion of a crime will be
+grounds for access, so once a whistleblower is accused of “espionage,”
+finding the “spy” will provide an excuse to access the accumulated
+material.
+
+In addition, the state’s surveillance staff will misuse the data for
+personal reasons. Some NSA agents used US surveillance systems to track
+their lovers—past, present, or wished-for—in a practice called
+“LOVEINT.”[(12)](#FOOT12) The NSA says it has caught and punished this a
+few times; we don’t know how many other times it wasn’t caught. But
+these events shouldn’t surprise us, because police have long used their
+access to driver’s license records to track down someone attractive, a
+practice known as “running a plate for a date.”[(13)](#FOOT13)
+
+Surveillance data will always be used for other purposes, even if this
+is prohibited. Once the data has been accumulated and the state has the
+possibility of access to it, it can misuse that data in dreadful ways,
+as shown by examples from Europe[(14)](#FOOT14) and the
+US.[(15)](#FOOT15)
+
+Personal data collected by the state is also likely to be obtained by
+outside crackers that break the security of the servers, even by
+crackers working for hostile states.[(16)](#FOOT16)
+
+Governments can easily use massive surveillance capability to subvert
+democracy directly.[(17)](#FOOT17)
+
+Total surveillance accessible to the state enables the state to launch a
+massive fishing expedition against any person. To make journalism and
+democracy safe, we must limit the accumulation of data that is easily
+accessible to the state.
+
+### Robust Protection for Privacy Must Be Technical {#robust-protection-for-privacy-must-be-technical .subheading}
+
+The Electronic Frontier Foundation and other organizations propose a set
+of legal principles designed to prevent the abuses of massive
+surveillance.[(18)](#FOOT18) These principles include, crucially,
+explicit legal protection for whistleblowers; as a consequence, they
+would be adequate for protecting democratic freedoms—if adopted
+completely and enforced without exception forever.
+
+However, such legal protections are precarious: as recent history shows,
+they can be repealed (as in the FISA Amendments Act), suspended, or
+ignored.[(19)](#FOOT19)
+
+Meanwhile, demagogues will cite the usual excuses as grounds for total
+surveillance; any terrorist attack, even one that kills just a handful
+of people, can be hyped to provide an opportunity.
+
+If limits on access to the data are set aside, it will be as if they had
+never existed: years’ worth of dossiers would suddenly become available
+for misuse by the state and its agents and, if collected by companies,
+for their private misuse as well. If, however, we stop the collection of
+dossiers on everyone, those dossiers won’t exist, and there will be no
+way to compile them retroactively. A new illiberal regime would have to
+implement surveillance afresh, and it would only collect data starting
+at that date. As for suspending or momentarily ignoring this law, the
+idea would hardly make sense.
+
+### First, Don’t Be Foolish {#first-dont-be-foolish .subheading}
+
+To have privacy, you must not throw it away: the first one who has to
+protect your privacy is you. Avoid identifying yourself to web sites,
+contact them with Tor, and use browsers that block the schemes they use
+to track visitors. Use the GNU Privacy Guard to encrypt the contents of
+your email. Pay for things with cash.
+
+Keep your own data; don’t store your data in a company’s “convenient”
+server. It’s safe, however, to entrust a data backup to a commercial
+service, provided you put the files in an archive and encrypt the whole
+archive, including the names of the files, with free software on your
+own computer before uploading it.
+
+For privacy’s sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it is likely to
+spy on you.[(20)](#FOOT20) Avoid service as a software
+substitute;[(21)](#FOOT21) as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.
+
+Protect your friends’ and acquaintances’ privacy, too. Don’t give out
+their personal information[(22)](#FOOT22) except how to contact them,
+and never give any web site your list of email or phone contacts. Don’t
+tell a company such as Facebook anything about your friends that they
+might not wish to publish in a newspaper. Better yet, don’t be used by
+Facebook at all. Reject communication systems that require users to give
+their real names, even if you are going to give yours, since they
+pressure other people to surrender their privacy.
+
+Self-protection is essential, but even the most rigorous self-protection
+is insufficient to protect your privacy on or from systems that don’t
+belong to you. When we communicate with others or move around the city,
+our privacy depends on the practices of society. We can avoid some of
+the systems that surveil our communications and movements, but not all
+of them. Clearly, the better solution is to make all these systems stop
+surveilling people other than legitimate suspects.
+
+### We Must Design Every System for Privacy {#we-must-design-every-system-for-privacy .subheading}
+
+If we don’t want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.
+
+For example: “smart” meters for electricity are touted for sending the
+power company moment-by-moment data about each customer’s electric
+usage, including how usage compares with users in general. This is
+implemented based on general surveillance, but does not require any
+surveillance. It would be easy for the power company to calculate the
+average usage in a residential neighborhood by dividing the total usage
+by the number of subscribers, and send that to the meters. Each
+customer’s meter could compare her usage, over any desired period of
+time, with the average usage pattern for that period. The same benefit,
+with no surveillance!
+
+We need to design such privacy into all our digital systems.
+
+### Remedy for Collecting Data: Leaving It Dispersed {#remedy-for-collecting-data-leaving-it-dispersed .subheading}
+
+One way to make monitoring safe for privacy is to keep the data
+dispersed and inconvenient to access. Old-fashioned security cameras
+were no threat to privacy.[(23)](#FOOT23) The recording was stored on
+the premises, and kept for a few weeks at most. Because of the
+inconvenience of accessing these recordings, it was never done
+massively; they were accessed only in the places where someone reported
+a crime. It would not be feasible to physically collect millions of
+tapes every day and watch them or copy them.
+
+Nowadays, security cameras have become surveillance cameras: they are
+connected to the internet so recordings can be collected in a data
+center and saved forever. This is already dangerous, but it is going to
+get worse. Advances in face recognition may bring the day when suspected
+journalists can be tracked on the street all the time to see who they
+talk with.
+
+Internet-connected cameras often have lousy digital security themselves,
+so anyone could watch what the camera sees.[(24)](#FOOT24) To restore
+privacy, we should ban the use of internet-connected cameras aimed where
+and when the public is admitted, except when carried by people. Everyone
+must be free to post photos and video recordings occasionally, but the
+systematic accumulation of such data on the internet must be limited.
+
+### Remedy for Internet Commerce Surveillance {#remedy-for-internet-commerce-surveillance .subheading}
+
+Most data collection comes from people’s own digital activities. Usually
+the data is collected first by companies. But when it comes to the
+threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a business,
+because the data that the companies collect is systematically available
+to the state.
+
+The NSA, through PRISM, has gotten into the databases of many large
+internet corporations.[(25)](#FOOT25) AT&T has saved all its phone call
+records since 1987 and makes them available to the DEA[(26)](#FOOT26) to
+search on request. Strictly speaking, the US government does not possess
+that data, but in practical terms it may as well possess it.
+
+The goal of making journalism and democracy safe therefore requires that
+we reduce the data collected about people by any organization, not just
+by the state. We must redesign digital systems so that they do not
+accumulate data about their users. If they need digital data about our
+transactions, they should not be allowed to keep them more than a short
+time beyond what is inherently necessary for their dealings with us.
+
+One of the motives for the current level of surveillance of the internet
+is that sites are financed through advertising based on tracking users’
+activities and propensities. This converts a mere annoyance—advertising
+that we can learn to ignore—into a surveillance system that harms us
+whether we know it or not. Purchases over the internet also track their
+users. And we are all aware that “privacy policies” are more excuses to
+violate privacy than commitments to uphold it.
+
+We could correct both problems by adopting a system of anonymous
+payments—anonymous for the payer, that is. (We don’t want the payee to
+dodge taxes.) Bitcoin is not anonymous,[(27)](#FOOT27) though there are
+efforts to develop ways to pay anonymously with Bitcoin. However,
+technology for digital cash was first developed in the
+1980s;[(28)](#FOOT28)we need only suitable business arrangements, and
+for the state not to obstruct them.
+
+A further threat from sites’ collection of personal data is that
+security breakers might get in, take it, and misuse it. This includes
+customers’ credit card details. An anonymous payment system would end
+this danger: a security hole in the site can’t hurt you if the site
+knows nothing about you.
+
+### Remedy for Travel Surveillance {#remedy-for-travel-surveillance .subheading}
+
+We must convert digital toll collection to anonymous payment (using
+digital cash, for instance). License-plate recognition systems recognize
+all license plates, and the data can be kept
+indefinitely;[(29)](#FOOT29) they should be required by law to notice
+and record only those license numbers that are on a list of cars sought
+by court orders. A less secure alternative would record all cars locally
+but only for a few days, and not make the full data available over the
+internet; access to the data should be limited to searching for a list
+of court-ordered license numbers.
+
+The US “no-fly” list must be abolished because it is punishment without
+trial.[(30)](#FOOT30)
+
+It is acceptable to have a list of people whose person and luggage will
+be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list. It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country. This ought to be
+enough for all legitimate purposes.
+
+Many mass transit systems use some kind of smart cards or RFIDs for
+payment. These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name. Furthermore, they record all travel
+associated with each card. Together they amount to massive surveillance.
+This data collection must be reduced.
+
+Navigation services do surveillance: the user’s computer tells the map
+service the user’s location and where the user wants to go; then the
+server determines the route and sends it back to the user’s computer,
+which displays it. Nowadays, the server probably records the user’s
+locations, since there is nothing to prevent it. This surveillance is
+not inherently necessary, and redesign could avoid it: free/libre
+software in the user’s computer could download map data for the
+pertinent regions (if not downloaded previously), compute the route, and
+display it, without ever telling anyone where the user is or wants to
+go.
+
+Systems for borrowing bicycles, etc., can be designed so that the
+borrower’s identity is known only inside the station where the item was
+borrowed. Borrowing would inform all stations that the item is “out,” so
+when the user returns it at any station (in general, a different one),
+that station will know where and when that item was borrowed. It will
+inform the other station that the item is no longer “out.” It will also
+calculate the user’s bill, and send it (after waiting some random number
+of minutes) to headquarters along a ring of stations, so that
+headquarters would not find out which station the bill came from. Once
+this is done, the return station would forget all about the transaction.
+If an item remains “out” for too long, the station where it was borrowed
+can inform headquarters; in that case, it could send the borrower’s
+identity immediately.
+
+### Remedy for Communications Dossiers {#remedy-for-communications-dossiers .subheading}
+
+Internet service providers and telephone companies keep extensive data
+on their users’ contacts (browsing, phone calls, etc.). With mobile
+phones, they also record the user’s physical location.[(31)](#FOOT31)
+They keep these dossiers for a long time: over 30 years, in the case of
+AT&T. Soon they will even record the user’s body
+activities.[(32)](#FOOT32) It appears that the NSA collects cell phone
+location data in bulk.[(33)](#FOOT33)\
+ Unmonitored communication is impossible where systems create such
+dossiers. So it should be illegal to create or keep them. ISPs and phone
+companies must not be allowed to keep this information for very long, in
+the absence of a court order to surveil a certain party.
+
+This solution is not entirely satisfactory, because it won’t physically
+stop the government from collecting all the information immediately as
+it is generated—which is what the US does with some or all phone
+companies.[(34)](#FOOT34) We would have to rely on prohibiting that by
+law. However, that would be better than the current situation, where the
+relevant law (the PAT RIOT Act) does not clearly prohibit the practice.
+In addition, if the government did resume this sort of surveillance, it
+would not get data about everyone’s phone calls made prior to that time.
+
+For privacy about who you exchange email with, a simple partial solution
+is for you and others to use email services in a country that would
+never cooperate with your own government, and which communicate with
+each other using encryption. However, Ladar Levison (owner of the mail
+service Lavabit that US surveillance sought to corrupt completely) has a
+more sophisticated idea for an encryption system through which your
+email service would know only that you sent mail to some user of my
+email service, and my email service would know only that I received mail
+from some user of your email service, but it would be hard to determine
+that you had sent mail to me.
+
+### But Some Surveillance Is Necessary {#but-some-surveillance-is-necessary .subheading}
+
+For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order. With the internet, the power to tap phone conversations would
+naturally extend to the power to tap internet connections. This power is
+easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won’t make it possible to find whistleblowers after
+the fact, if (as I recommend) we prevent digital systems from
+accumulating massive dossiers before the fact.
+
+Individuals with special state-granted power, such as police, forfeit
+their right to privacy and must be monitored. (In fact, police have
+their own jargon term for perjury, “testilying,”[(35)](#FOOT35) since
+they do it so frequently, particularly about protesters and
+photographers.[(36)](#FOOT36)) One city in California that required
+police to wear video cameras all the time found their use of force fell
+by 60 percent.[(37)](#FOOT37) The ACLU is in favor of this.
+
+Corporations are not people, and not entitled to human
+rights.[(38)](#FOOT38) It is legitimate to require businesses to publish
+the details of processes that might cause chemical, biological, nuclear,
+fiscal, computational (e.g., DRM[(39)](#FOOT39)) or political (e.g.,
+lobbying) hazards to society, to whatever level is needed for public
+well-being. The danger of these operations (consider the BP oil spill,
+the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+terrorism.
+
+However, journalism must be protected from surveillance even when it is
+carried out as part of a business.
+
+Digital technology has brought about a tremendous increase in the level
+of surveillance of our movements, actions, and communications. It is far
+more than we experienced in the 1990s, and far more than people behind
+the Iron Curtain experienced in the 1980s,[(40)](#FOOT40) and proposed
+legal limits on state use of the accumulated data would not alter that.
+
+Companies are designing even more intrusive surveillance. Some project
+that pervasive surveillance, hooked to companies such as Facebook, could
+have deep effects on how people think.[(41)](#FOOT41)Such possibilities
+are imponderable; but the threat to democracy is not speculation. It
+exists and is visible today.
+
+Unless we believe that our free countries previously suffered from a
+grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase. That
+requires stopping the accumulation of big data about people.
+
+<div class="footnote">
+
+------------------------------------------------------------------------
+
+### Footnotes
+
+### [(1)](#DOCF1)
+
+@raggedright Maira Sutton, “We’re TPP Activists: Reddit Asked Us
+Everything,” 21 November 2013,
+<https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama>. @end raggedright
+
+### [(2)](#DOCF2)
+
+@raggedright Glyn Moody, “How Can Any Company Ever Trust Microsoft
+Again?” 17 June 2013,
+<http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/>.
+@end raggedright
+
+### [(3)](#DOCF3)
+
+@raggedright James Ball, Julian Borger and Glenn Greenwald, “Revealed:
+How US and UK Spy Agencies Defeat Internet Privacy and Security,”
+6 September 2013,
+<http://theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security>.
+@end raggedright
+
+### [(4)](#DOCF4)
+
+@raggedright Bruce Schneier, “Want to Evade NSA Spying? Don’t Connect to
+the Internet,” 7 October 2013, <http://www.wired.com/2013/10/149481/>.
+@end raggedright
+
+### [(5)](#DOCF5)
+
+@raggedright Dan Roberts, “Patriot Act Author Prepares Bill to Put NSA
+Bulk Collection ’Out of Business,’” 10 October 2013,
+<http://theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill>.
+@end raggedright
+
+### [(6)](#DOCF6)
+
+@raggedright Lucy Dalglish, “Lessons from Wye River,” The News Media &
+the Law (Summer 2011): p. 1,
+[http://www.rcfp.org/browse-media-law-resources/\
+news-media-law/news-media-and-law-summer-2011/lessons-wye-river](http://www.rcfp.org/browse-media-law-resources/%3Cbr%3Enews-media-law/news-media-and-law-summer-2011/lessons-wye-river).
+@end raggedright
+
+### [(7)](#DOCF7)
+
+@raggedright Washington Agencies, “Yemen leak: former FBI man admits
+passing information to Associated Press,” 24 September 2013,
+[http://www.theguardian.com/media/2013/\
+sep/24/yemen-leak-sachtleben-guilty-associated-press](http://www.theguardian.com/media/2013/%3Cbr%3Esep/24/yemen-leak-sachtleben-guilty-associated-press).
+@end raggedright
+
+### [(8)](#DOCF8)
+
+@raggedright See “Verizon forced to hand over telephone data—full court
+ruling” (6 June 2013), at
+<http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order>,
+for the Foreign Intelligence Surveillance Court under which the US
+government “is collecting the phone records of millions of US customers
+of Verizon.” @end raggedright
+
+### [(9)](#DOCF9)
+
+@raggedright Siobhan Gorman, Evan Perez, and Janet Hook, “NSA
+Data-Mining Digs into Networks Beyond Verizon,” 7 June 2013,
+<http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07>.
+@end raggedright
+
+### [(10)](#DOCF10)
+
+@raggedright ACLU, “Policing Free Speech: Police Surveillance And
+Obstruction of First Amendment-Protected Activity,” 29 June 2010,
+<https://www.aclu.org/files/assets/Spyfiles_2_0.pdf>. @end raggedright
+
+### [(11)](#DOCF11)
+
+@raggedright David Kravets, Kim Zetter, Kevin Poulsen, “NSA Illegally
+Gorged on U.S. Phone Records for Three Years,” 10 September 2013,
+<http://www.wired.com/2013/09/nsa-violations/>. @end raggedright
+
+### [(12)](#DOCF12)
+
+@raggedright Adam Gabbatt and agencies, “NSA Analysts ‘Wilfully
+Violated’ Surveillance Systems, Agency Admits,” 24 August 2013,
+<http://theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems>.
+@end raggedright
+
+### [(13)](#DOCF13)
+
+@raggedright M. L. Elrick, “Cops Tap Database to Harass, Intimidate,”
+31 July 2001,
+<http://sweetliberty.org/issues/privacy/lein1.htm#.VeQiuxcpDow>. @end
+raggedright
+
+### [(14)](#DOCF14)
+
+@raggedright Rick Falkvinge, “Collected Personal Data Will Always Be
+Used against the Citizens,” 17 March 2012,
+<http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/>.
+@end raggedright
+
+### [(15)](#DOCF15)
+
+@raggedright Consider, for instance, the US internment of Japanese
+Americans during WWII. @end raggedright
+
+### [(16)](#DOCF16)
+
+@raggedright Mike Masnick, “Second OPM Hack Revealed: Even Worse Than
+the First,” 12 June 2015,
+<https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml>.
+@end raggedright
+
+### [(17)](#DOCF17)
+
+@raggedright Joanna Berendt, “Macedonia Government Is Blamed for
+Wiretapping Scandal,” 21 June 2015,
+<http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html?_r=0>.
+@end raggedright
+
+### [(18)](#DOCF18)
+
+@raggedright “International Principles on the Application of Human
+Rights to Communications Surveillance,” last modified May 2014,\
+ <https://en.necessaryandproportionate.org/text>. @end raggedright
+
+### [(19)](#DOCF19)
+
+@raggedright Eric Lichtblau and James Risen, “Officials Say U.S.
+Wiretaps Exceeded Law,” 15 April 2009,
+<http://nytimes.com/2009/04/16/us/16nsa.html>. @end raggedright
+
+### [(20)](#DOCF20)
+
+@raggedright For decades, the free software movement has been denouncing
+the abusive surveillance machine of proprietary software companies such
+as Microsoft and Apple. For a growing list of the ways in which
+surveillance has spread across industries, not only in the software
+business, but also in the hardware and—away from the keyboard—in the
+mobile computing industry, in the office, at home, in transportation
+systems, and in the classroom, see
+<http://gnu.org/philosophy/proprietary/proprietary-surveillance.html>.
+@end raggedright
+
+### [(21)](#DOCF21)
+
+@raggedright See “Who Does That Server Really Serve?” (@pageref{Server})
+for more information on this issue. @end raggedright
+
+### [(22)](#DOCF22)
+
+@raggedright Nicole Perlroth, “In Cybersecurity, Sometimes the Weakest
+Link Is a Family Member,” 21 May 2014,
+[http://bits.blogs.nytimes.com/2014/05/21/\
+in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/](http://bits.blogs.nytimes.com/2014/05/21/%3Cbr%3Ein-cybersecurity-sometimes-the-weakest-link-is-a-family-member/).
+@end raggedright
+
+### [(23)](#DOCF23)
+
+@raggedright I assume here that the security camera points at the inside
+of a store, or at the street. Any camera pointed at someone’s private
+space by someone else violates privacy, but that is another issue. @end
+raggedright
+
+### [(24)](#DOCF24)
+
+@raggedright Ms. Smith, “CIA Wants to Spy On You through Your
+Appliances,” 18 March 2012, [http://networkworld.com/article/2221934/\
+microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html](http://networkworld.com/article/2221934/%3Cbr%3Emicrosoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html).
+@end raggedright
+
+### [(25)](#DOCF25)
+
+@raggedright Jon Queally, “Latest Docs Show Financial Ties between NSA
+and Internet Companies,” 23 August 2013,
+<http://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies>.
+@end raggedright
+
+### [(26)](#DOCF26)
+
+@raggedright Scott Shane and Colin Moynihan, “Drug Agents Use Vast Phone
+Trove, Eclipsing N.S.A.’s,” 1 September 2013,
+[http://www.nytimes.com/2013/09/02/us/\
+drug-agents-use-vast-phone-trove-eclipsing-nsas.html?\_r=0](http://www.nytimes.com/2013/09/02/us/%3Cbr%3Edrug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0).
+@end raggedright
+
+### [(27)](#DOCF27)
+
+@raggedright Dan Kaminsky, “Let’s Cut through the Bitcoin Hype: A
+Hacker-Entrepreneur’s Take,” 3 May 2013,
+[http://wired.com/2013/05/lets-cut-through-the-\
+bitcoin-hype/](http://wired.com/2013/05/lets-cut-through-the-%3Cbr%3Ebitcoin-hype/).
+@end raggedright
+
+### [(28)](#DOCF28)
+
+@raggedright Steven Levy, “E-Money (That’s What I Want),” Wired, 2.12
+(December 1994),
+<http://archive.wired.com/wired/archive/2.12/emoney_pr.html>. @end
+raggedright
+
+### [(29)](#DOCF29)
+
+@raggedright Richard Bilton, “Camera Grid to Log Number Plates,” last
+updated on 22 May 2009,
+<http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm>.
+@end raggedright
+
+### [(30)](#DOCF30)
+
+@raggedright Nusrat Choudhury, “Victory! Federal Court Recognizes
+Constitutional Rights of Americans on the No-Fly List,” 29 August 2013,
+[https://www.aclu.org/blog/victory-federal-court-recognizes-constitutional-rights-americans-\
+no-fly-list](https://www.aclu.org/blog/victory-federal-court-recognizes-constitutional-rights-americans-%3Cbr%3Eno-fly-list).
+@end raggedright
+
+### [(31)](#DOCF31)
+
+@raggedright Kai Biermann, “Betrayed by Our Own Data,” 26 March 2011,
+<http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz>.
+@end raggedright
+
+### [(32)](#DOCF32)
+
+@raggedright Sara M. Watson, “The Latest Smartphones Could Turn Us All
+into Activity Trackers,” 10 October 2013,
+[http://wired.com/2013/10/the-trojan-horse-\
+of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-\
+activity-trackers/](http://wired.com/2013/10/the-trojan-horse-%3Cbr%3Eof-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-%3Cbr%3Eactivity-trackers/).
+@end raggedright
+
+### [(33)](#DOCF33)
+
+@raggedright Patrick Toomey, “It Sure Sounds Like the NSA Is Tracking
+Our Locations,” 30 September 2013, [https://aclu.org/blog/it-\
+sure-sounds-nsa-tracking-our-locations](https://aclu.org/blog/it-%3Cbr%3Esure-sounds-nsa-tracking-our-locations).
+@end raggedright
+
+### [(34)](#DOCF34)
+
+@raggedright Glenn Greenwald, “NSA Collecting Phone Records of Millions
+of Verizon Customers Daily,” 6 June 2013,
+<http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order>.
+@end raggedright
+
+### [(35)](#DOCF35)
+
+@raggedright See, for instance, the articles “Testilying: Cops Are Liars
+Who Get Away with Perjury” (Nick Malinowski, 3 February 2013,
+[http://vice.com/read/\
+testilying-cops-are-liars-who-get-away-with-perjury](http://vice.com/read/%3Cbr%3Etestilying-cops-are-liars-who-get-away-with-perjury))
+and “Detective Is Found Guilty of Planting Drugs” (Tim Stelloh,
+1 November 2011,
+[http://nytimes.com/2011/11/02/nyregion/brooklyn-detective-convicted-of-\
+planting-drugs-on-innocent-people.html?pagewanted=all&\_r=0](http://nytimes.com/2011/11/02/nyregion/brooklyn-detective-convicted-of-%3Cbr%3Eplanting-drugs-on-innocent-people.html?pagewanted=all&_r=0)),
+for examples of the extent to which this practice has been normalized.
+@end raggedright
+
+### [(36)](#DOCF36)
+
+@raggedright See the Photography Is Not a Crime web site, at\
+ <http://photographyisnotacrime.com/>, for more on this issue. @end
+raggedright
+
+### [(37)](#DOCF37)
+
+@raggedright Kevin Drum,“Ubiquitous Surveillance, Police Edition,”
+22 August 2013,\
+ [http://motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-\
+police-edition](http://motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-%3Cbr%3Epolice-edition).
+@end raggedright
+
+### [(38)](#DOCF38)
+
+@raggedright Public Citizen, “Call Your Representative: Tell Her or Him
+to Co-Sponsor a Constitutional Amendment to Overturn Citizens United and
+Restore Democracy to the People,” accessed August 2015,
+<http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266>.
+@end raggedright
+
+### [(39)](#DOCF39)
+
+@raggedright See the related section in “Words to Avoid (or User with
+Care)” (@pageref{DRM}) for more on this. @end raggedright
+
+### [(40)](#DOCF40)
+
+@raggedright James Allworth, “Your Smartphone Works for the Surveillance
+State,” 7 June 2013,
+<https://hbr.org/2013/06/your-iphone-works-for-the-secret-police>. @end
+raggedright
+
+### [(41)](#DOCF41)
+
+@raggedright Evan Selinger and Brett Frischmann, “Will the Internet of
+Things Result in Predictable People?” 10 August 2015,
+<http://theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people>.
+@end raggedright
+
+</div>
+
+------------------------------------------------------------------------
+
+This document was generated by *tonghuix* on *March 25, 2016* using
+[*texi2html 1.82*](http://www.nongnu.org/texi2html/).\