"...we've taken the web and we've made Facebook out of it. We put a few profit-motivated men and women in the middle of everything.
That was a mistake. Now we're paying for it. We live our social lives, our private lines, in the web and we share everything with our friends,
and also with our super-friend, the one who reports to anybody who makes him, who pays him, who helps him or who gives him the 100 billion dollars he desires.
We are creating media that consume us, and media loves it."
Eben Moglen quoted in Journalism After Snowden.
if we learn only one lesson from the Summer of
Snowden, it should be how hostile the Internet has become. Media outlets
have repeatedly reported on the insatiable appetite the US
government has for the private information of citizens."
"Why has the invention most celebrated for putting
the means of expression
in the hands of the people produced a few billionaire
moguls and a mass of creative producers expected
to work for free ?" Jodi Dean: Democracy and Other Neoliberal Fantasies
"But while we were having fun, we happily and
willingly helped to create the greatest surveillance system ever
web whose strings give governments and businesses countless threads
to pull, which makes us…puppets. The free flow of information
over the Internet (except in places where that flow is blocked),
which serves us well, may serve others better. Whether this
distinction turns out to matter may be the one piece of information
the Internet cannot deliver."
"The potential for manipulation and abuse of the
digital networks and platforms that citizens have come to depend
upon is one of the more insidious threats to democracy in the
Internet age. If citizens of established democracies cannot prevent
such manipulation, the prospects for aspiring and fragile
democracies ... look much less bright." Consent of the Networked:
The Worldwide Struggle for Internet Freedom: Rebecca
The advance of information technology epitomized by
heralds the death of privacy for most people and shifts the world
toward authoritarianism. This is the principal thesis in my book,
Assange: editor in chief of WikiLeaks and author of “Cypherpunks:
Freedom and the Future of the Internet.”
"Web 2.0 is a formula to kill the middle class and
undo centuries of social progress." Jaron Lanier
"Adding censorship to the Internet means adding
surveillance to the Internet. Creating Great Firewalls means creating
secret, unaccountable lists of censored material that result in mass
abuse, even in the most liberal of democracies. It doesn't matter if
you're censoring for copyright infringement or for human-rights
reports. The result is the same: a surveillance state." Cory Doctorow: Information
Doesn't Want to be Free
"...without congressional action or a strong judicial
precedent, I would _strongly_ recommend against anyone trusting
their private data to a company with physical ties to the United
States. Sincerely, Ladar Levison Owner and Operator, Lavabit LLC" (message announcing the
closing of his email business.)
"If the U.S companies and non profits want to support
democracy in the Middle East the best they can do is continue to
develop a free neutral decentralized internet. Fight the troubling
trends emerging in your own backyards from threats to Net
neutrality, disregard for user’s privacy, draconian copyright
and DRM restrictions, to the troubling trends of censorship through
courts in Europe, restrictions on anonymous access and rampant
surveillance in the name of combating terrorism or protecting
children or fighting hate speech or whatever. You see these trends
give our own regimes great excuses for their own actions. You
don’t need special programs and projects to help free the
Internet in the Middle East. Just keep it free, accessible and
affordable on your side and we’ll figure out how to use it,
get around restrictions imposed by our governments and innovate and
contribute to the network’s growth."
Sami Ben Gharbia (2010)
In South Korea, more than half the households are
already connected to fiber
lines that allow for blazing fast uploads and downloads, and
Japan and Hong Knog are close behind. In America, only around 7 percent
of households have access to fiber, and the service costs six times
as much as it does in Hong Kong (and five times as much as it does
in Stockholm). Vertically integrated cable companies, whose Internet
product is not provided over fiber and crimps uploads, are well on the
to controlling America's Internet access destiny, having spent millions
of dollars over almost fifteen years lobbying against any rules that
have constrained them. (from Susan Crawford's book: Captive
In 2002 the FCC decided there would be almost no
oversight of the
broadband highways that deliver the internet to us, believing that the
invisible hand of the marketplace would get the job done. Stunningly,
the agency actually determined that broadband wasn’t even
“telecommunications.” It was instead an “information service,” which
meant that consumer protections (like ubiquitous service, reasonable
prices, privacy, public safety, and competitive choice) that applied to
previous generations’ telephone service would not be required as
communications went digital. If consumers wished to enjoy such
protections for broadband, they would have to start all over—in a
decidedly hostile political and regulatory climate. No other nation
allowed such a ludicrous debate over communications semantics to
shackle its broadband development. Michael
J. Copps 3/2014 CJR
The internet, molded by deregulated, increasingly concentrated
corporations and the
unaccountable national security
state, is turning into a
panopticon. It knows where you are, what you are doing at all
times. But it is not just an invasive snoop, It has been as
commercialized as other media.
Initially, the peer-to-peer nature of the internet made it
democratic, but there are strong forces working to dominate the center.
Search services require central infrastructure, and so does social
media like Facebook.
You are better off with free
software and a Tor
box, but there
probably is no longer any real escape. The Fourth Amendment is pretty
John Oliver on Net Neutrality
Before the FCC ruled for net neutrality John Oliver clariffied the
issue, but Republicans still oppose it.
They will most likely go to court to overturn the consumer friendly FCC
The US "war on the internet" information below is just the tip
a terrible iceberg, rarely even mentioned, much less examined
US mainstream media. It is chillingly self-explanatory. In the
for years, it is being incrementally implemented (for ex., at
most basic sender-receiver authentication level, as
'anti-ID theft' and other personal 'security' measures.) Total
surveillance and control of information and communications is
and essential to the phony 'war on terror' --- a state terror
for global domination as so much of the world on the deadly
end knows. Made clear 'in their own words', even blogging and
networking' are intolerable threats to those in the business of
spreading fear, lies and tyranny.
"The internet needs to be dealt with as if it were an enemy
Information Operation Roadmap Part 3: "We Must Fight the Net"
A NET OF CONTROL Unthinkable: How the Internet could become a
of corporate and government power, based on updates now in the
Newsweek International Issues 2004 By Steven Levy Picture, if
will, an information infrastructure that encourages censorship,
surveillance and suppression of the creative impulse. Where
is outlawed and every penny spent is accounted for. Where the
that be can smother subversive (or economically competitive)
in the cradle, and no one can publish even a laundry list
the imprimatur of Big Brother. Some prognosticators are saying
such a construct is nearly inevitable. And this infrastructure
none other than the former paradise of rebels and
the Internet. ... wasnt the Internet supposed to be the
example of empowering technology? Freedom was allegedly built
the very bones of the Internet, designed to withstand nuclear
and dictatorial attempts at control. ...
Certainly John Walker (ed: his important article below)
all that. The hackerish founder of the software firm
the past couple of years noticed a disturbing trend... Walker
his fears in a web document called The Dangers of Digital
A concurrent step would be the adoption of "trusted computing,"
system by which not only people but computer programs would be
stamped with identifying marks. Those would link with
that determine whether programs are uncorrupted and cleared to
on your computer. The best-known implementation of this scheme
the work in progress at Microsoft known as Next Generation
Computing Base (formerly called Palladium)...
Walker isnt the first to warn of this ominous power shift. The
Internets pre-eminent dean of darkness is Lawrence Lessig, the
Stanford University guru of cyberlaw. Beginning with his 1999
"Code and Other Laws of Cyberspace,"
Lessig has been predicting that corporate and regulatory
would usurp the open nature of the Net, and now says that he
little reason to retract his pessimism. Lessig understands that
restrictive copyright and Homeland Security laws give a legal
rationale to "total control," and also knows that it will be
to the people as a great way to stop thieves, pirates,
hackers, spammers and child pornographers. "To say we need
freedom isnt going to win," Lessig says.[...]
US Plans to 'Fight the Net' Revealed by Adam Brookes http://news.bbc.co.uk/2/hi/americas/4655196.stm
January 27, 2006
BBC Pentagon's 2003 "Information Operations Roadmap" newly
gives a glimpse into the US military's plans for "information
Secret Pentagon "Roadmap"
National Security Archive Electronic Briefing Book No. 177 A
Pentagon "roadmap" on war propaganda, approved by Secretary of
Defense Donald Rumsfeld in October 2003...calls on DoD to
its capabilities in five key Information Operations (IO) areas:
electronic warfare (EW), PSYOP, Operations Security (OPSEC),
deception and computer network operations (CNO)....
Information Operations: The Hard Reality of Soft Power, Joint
Staff College and the National Security Agency (2004) (ISBN
America prepares for 'cyber war' with China, Telegraph.uk.co
Pentagon Plans New Arm to Wage Cyberspace Wars http://www.nytimes.com/2009/05/29/us/politics/29cyber.html?_
r=1&th&emc=th WASHINGTON The Pentagon plans to create
a new military
command for cyberspace, administration officials said Thursday,
stepping up preparations by the armed forces to conduct both
and defensive computer warfare.The military command would
a civilian effort to be announced by President Obama on Friday
would overhaul the way the United States safeguards its
networks... Officials said that in addition to the unclassified
strategy paper to be released by Mr. Obama on Friday, a
set of presidential directives is expected to lay out the
new responsibilities and how it coordinates its mission with
of the N.S.A., where most of the expertise on digital warfare
(NB: Bill passed and Obama since has declared a "swine flu"
emergency) 8/28/9 Bill Would Give President Emergency Control
Declan McCullagh Internet companies and civil liberties groups
alarmed this spring when a U.S. Senate bill proposed handing
White House the power to disconnect private-sector computers
the Internet. They're not much happier about a revised version
aides to Sen. Jay Rockefeller, West Virginia Democrat, have
months drafting behind closed doors. CNET News has obtained a
of the 55-page draft of S.773 (excerpt
09.pdf%3E> )...The new version would allow the president to
a cybersecurity emergency" relating to "non-governmental"
networks and do what's necessary to respond to the threat.
is defined as anything having to do with the Internet,
computers, or computer networks.) ...
U.S. Institute of Peace Study by Israeli Professor: Terrorist
Active on the Internet http://www.dailytimes.com.pk/default.asp?page=story_14-4-200
There are hundreds of sites on the Internet serving terrorist
and their supporters, according to a study done by the * US
of Peace (USIP).
The study undertaken by Gabriel Weimann, a professor at the
University in Israel and currently a senior fellow at USIP,
that today all active terrorist groups have established their
presence on the Internet..
Israeli high-tech companies work for U.S.
U.S. law enforcement wiretaps authorized by the Communications
Assistance for Law Enforcement Act (CALEA) http://archive.newsmax.com/archives/articles/2001/12/18/2248
[Isreali] Amdocs provides billing and directory assistance for
American phone companies, Comverse Infosys handles telephone
equipment for US law enforcement, Odigo runs "Instant Message"
systems on computers. All three are closely tied to the Mossad
the Israeli Defense Force, which is massively funded by u.s.
firewalls on US corporate and government computer systems are
provided by Israeli Checkpoint Systems. Odigo's offices near
World Trade Towers allegedly received two hour advance warning
"From the depth of our heart -- thanks to The Israeli Defense
Microsoft logo under the text with the Israeli national flag in
Microsoft CEO: Our company almost as Israeli as American By
Cohen, TheMarker Correspondent, and Reuters http://www.haaretz.com/hasen/spages/985800.html
Executive Steve Ballmer, on a visit to Israel... at the
ceremony of the American software giant's new research and
center in Herzliya...said Microsoft is an Israeli company
as much as it is American...that the proportion of Microsoft
per capita in Israel is almost similar to that in the United
States...he knows very few places around the world that offer
a variety of startup opportunities, and that his company
to purchase more Israeli startup companies... the CEO said
is not looking to buy all of Yahoo! but is currently engaging
negotiations about other types of deals with the U.S.
No. 2 search engine.
Related:# Microsoft Israel creating new R&D center in Herzliya
President Susan Decker takes interest in Israel # Internet
Yahoo! to follow rivals Google, Microsoft to Israel
National Dragnet Is a Click Away: Authorities to Gain Fast and
Expansive Access to Records Several thousand law enforcement
are creating the foundation of a domestic intelligence system
computer networks that analyze vast amounts of police
to fight crime and root out terror plots.
US warrantless wiretapping since 1990s predates 9/11 12/19/07
Register"- Secret surveillance operations that enabled the
Security Agency (NSA) to access telecommunications traffic data
have been in place since the
The Open Source Center is a component of the Office of the
of National Intelligence administered by the CIA.
OPEN SOURCE INTELLIGENCE ADVANCES Naquin addressed the Central
Intelligence Retirees' Association October 3, 2007. The text of
remarks is at http://www.fas.org/irp/eprint/naquin.pdf
The DNI Open
Source Center, which gathers, translates, analyzes, and
unclassified open source intelligence from around the world, is
steadily growing in capability and impact, according to Doug
the Center's Director. The Open Source Center, which replaced
CIA's Foreign Broadcast Information Service, is doing more
and outreach than it predecessor and is also exploring new
said Mr. Naquin in a recent speech. "We're looking now at
which carries some unique and honest-to-goodness intelligence,"
said. "We have groups looking at what they call 'Citizens
people taking pictures with their cell phones and posting them
the Internet. Then there's Social Media, phenomena like MySpace
blogs.... A couple years back we identified Iranian blogs as a
phenomenon worthy of more attention, about six months ahead of
Does The Government Manipulate Social Media?
The U.S. government long ago announced its intention to "fight
net". As revealed by an official Pentagon report called
Operations Roadmap" (ed: see above) ... "Strategy should be
on the premise that the Department [of Defense] will 'fight the
net' as it would an enemy weapons system".
CENTCOM announced in 2008 a team of employees would be
bloggers who are posting inaccurate or untrue information, as
as bloggers who are posting incomplete information." The Air
is now also engaging bloggers....
Finally, under the post-9/11 "homeland security" laws, the
routinely demands full access to ISPs and websites... Do you
the military and homeland security apparatus would step in to
control of what it considered an "enemy" message...the
considers any message questioning anything the government does
an enemy message. See this, this, this and
digest note re: Soft power propaganda: US/NED/Soros NGO
partner to 'fight terrorism' U.S. government taps Facebook,
MTV to "Fight Terrorism Global Research, November 28, 2008 http://www.globalresearch.ca/index.php?context=va&aid=11198
State Department announced plans on Monday to promote online
groups as a new and powerful way to fight crime, political
Drawing inspiration from a movement against FARC rebels in
the State Department is joining forces with Facebook, Google,
Howcast and others in New York City next week to get the "ball
rolling." It said 17 groups from South Africa, Britain and the
Middle East which have an online presence like the "Million
Against the FARC" will attend a conference at Columbia
Law School from December 3-5. Observers from seven
that do not have an online presence -- such as groups from Iraq
Afghanistan -- will attend. There will also be remote
They will forge an "Alliance of Youth Movement," said James
under secretary of state for public diplomacy....
"Unless a way of intervening in the radicalization process can
found, we are condemned to stepping on cockroaches one at a
Social Repression and Internet Surveillance: H. Res. 1695, 1955
S.1959 By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave
(R-WA),authored the original bill... H.Res.1695....establishes
National Commission and Center of so-called "Excellence" to
and crush social concerns... perceived to be "threats" by
"violent radicalization" and "ideologically based
have been "violently radicalized" by "extremist belief
Internet has aided in facilitating violent radicalization,
based violence, and the homegrown terrorism process in the
States by providing access to broad and constant streams of
terrorist-related propaganda to United States citizens."...
spokesman, Brian Jenkins... said to Jane Harmans Committee:
a way of intervening in the radicalization process can be
we are condemned to stepping on cockroaches one at a time."
precise terminology used by Nazis to justify exterminating
I am writing to express my hope that you will support town,
city, and county efforts to create municipal high-speed wireless
and broadband networks.
An open Internet, universally accessible, is essential to this
state's educational, informational, economic and cultural future.
But high-speed, broadband Internet access isn't available or
affordable to everyone in our state. That's why many cities across
America are investigating and implementing municipal wireless and
broadband networks. Some are even reducing the cost of deployment
using wireless Internet, known as WiFi, to reach everyone in the
Big telephone and cable companies are trying to stop or slow down
this effort by communities to build municipal broadband and
wireless networks. If they get state legislatures to help them
block competition like they did in Pennsylvania, they could lose an
important incentive to build their networks to connect the
underserved. Municipal wireless and broadband networks could
provide competition to expand availability, lower prices and
improve service. Everyone should be able to connect to the
educational, economic and cultural benefits of the Internet.
Please support efforts to allow towns, cities, and counties to
deploy municipal broadband and wireless networks and resist any
efforts to block their deployment. And as communities explore how
to build universal, affordable, open networks, I also encourage you
to explore partnerships to build upon the skills and expertise of
an experienced telecommunications workforce.
national security state officialsroutinely
mislead and deceive the publicshould never have even been
in serious doubt in the first place – certainly not for journalists,
and especially now afterthe
experience of the Iraq War.
That fact — that official pronouncements merit great skepticism rather
than reverence — should be (but plainly is not) fundamental to how
journalists view the world.