Here’s a few thoughts and reads on the status of the ongoing debate and what’s at stake (before you head to the comment section of the Federal Communications Commission).
The “internet of things”, the creator market, the gig economy, and free speech are threatened by the reversal of net neutrality.
I came across a thought-provoking post the other day, elaborating on the difference between IRL and “in-person”. Much of the internet, for better or worse, is real life. So this is a time to acknowledge that the internet is a substantial resource, and that lacking access or reliability from the internet seriously impacts people’s access to educational, physical, health-related, and employment resources for many. Sure, it’s all complicated. But it has enabled entrepreneurship and organizing in solidarity amongst marginalized groups, made long-distance, quality healthcare available through telemedicine – and much of that mobilization and innovation is threatened if net neutrality ceases. So, this debate, and its outcome, will deeply impact our daily lives – we’ve got to act accordingly.
The focus in the United States right now is another installment in the back and forth between the FCC and FTC, representing telecommunications and trade of information services.
Essentially, if you care about accessibility and quality of the Internet – broadband, download and upload speeds, streaming services, privacy – you should consider yourself vested in the “battle for the net” and make it clear that you are pro net-neutrality. FCC Chairman Ajit Pai promises that there is little evidence of telecommunications giants and corporate service providers intervening or manipulating the control they have over the openness of the Internet – we disagree. Read up.
The American Civil Liberties Union gets to the point in “What is Net Neutrality?” and this timeline from TechCrunch provides a meatier history. We’ve been at this since the sixties! It’s a reminder that technology develops and evolves exponentially, and we must stay involved.
Legislation like this is affecting the privacy and freedom of consumers across the world, and there are steps you can take a more proactive and protected user.
So this bill is called “Restoring Internet Freedom”… and though some may be resigned to Uncle Sam’s eye all up in their Drive, that Orwellian title should beg several questions. We took our questions to Hammy Havoc last year.
It’s time to get personal – the most effective comments come from your experience.
As well-put and informative as the drafted comments are, take some time to relate what open internet and consumer protections mean to you – that is, why access to quality Internet should be the norm, in your opinion.
You can send multiple comments, and with personal statements there’s some variety on record and we can guard against disregard on the grounds of automation. Here’s a helpful piece on how to draft a meaningful and effective message to the FCC.
It’s easy to spread the word.
And vital. Start with the social media- (and aesthetic-) friendly graphics below, crafted by the folks at battleforthenet.com, where you can post a comment, get more information and guidance in efforts to preserve net neutrality individually and collectively.
You are not alone, there have been open letters, youtube videos, and even some of the largest web companies and platforms (Facebook, Google, Amazon, and Netflix) are on the people’s side, helping to make voices heard. Join in, the site is open for rebuttal comments until August 17th!
Amidst statements that this is only a spike in reporting, Derrica Wilson finds the community’s fears to be valid. Wilson is co-founder of and a spokesperson for Black & Missing Foundation (BAM FI), an organization working to spread awareness of and locate missing people of color. Viewing the chart above, keep in mind that the rate of those missing must be viewed relative to the size of the population. The US is 73% white, so it’s clear, about a quarter of the population – Black, Asian, Native, Latinx – is disappearing at an alarming rate.
As people who care and for those who see ourselves in this – how can we provide for and protect missing cis and trans women and girls of color in the US?
This is happening currently, every day.
Some will be runaways seeking refuge, or fleeing abuse. The girls missing from DC have drawn our attention to missing youth in particular, and rightly so. Cis and trans young women ages 11 to 17 make up approximately 75 percent of the runaway population. The National Runaway Safeline also reports that a range of 1.7 to 2.8 million runaway and homeless youth live on the street each year.
At the same time, social media postings of missing kids can help bring them home faster. That’s especially true for teenagers. Their peers are more likely to see the alert and can notify police and those searching of any information they have. Derrica Wilson of BAM FI encourages us all to pay attention to missing persons reports and outreach efforts on social media.
Maybe we could more intentionally build with the young people around us. If you’re interested in volunteering try mentorship, get out in the community. They need to be listened to – as they all do. Life lacks stability sometimes, and it can be extra difficult as a young person. We don’t need to have it all together to share an ear and some experiences.
Seeking safe spaces
Some are afraid to disclose their personal beliefs and preferences, for fear that family would take issue. It’s the pregnant teenager, or someone struggling with expressing their sexual and/or gender identity. Teens are new to finding their place in the world and though they are resilient, sexism, racism, and transphobia are turning their insides too. So they run away when they can find no one to turn to without fear of judgment, or worse. And to whom? Where? The reality is, asKimberly of the Sylvia Rivera Law Project (SRLP) says, “outside of community, there are no safe spaces”.
While we’re on connections – language can go a long way. In every day you can instill the use of Latinx in place of Latino or Latina, to support awareness, visibility, and acknowledgement for the gender nonconforming. It’s an extension of using “they/them/their” instead of assuming “his/her” identification amongst LGBTQ+ and allies. You can invite a safe space with your presence and help others do the same. It’ll continue to spread through conversation, verbal and written communication, and social media. (No excuses – the APA just recognized “they” as a singular pronoun.) I may have digressed there, but it’s about willingly shifting to a more inclusive society, starting with the narrative.
The public has to be more aware, inclusive, and active than ever in this time of heightened violence against people of color and the lgbtq+ community, redundant mainstream media, and building institutional oppression. Part of the response to the recent burst of black and latinx girls disappearing in DC is termed as a “perceived increase”. It feels a bit dismissive, like there’s an assumption these lives will pass from mattering in the public eye.
We must stay raising awareness about our missing cis and trans young women of color and issues facing them. Since there’s always been a significant disparity in how much they are reported and efforts to find them, we’ve got ground to cover, wouldn’t you say?
So let’s say their names, keep an eye out for others, and integrate living, thriving safe spaces wherever we can. Maybe then we could find them before they ever go missing.
Hammy Havoc is a multi-faceted cypherpunk writer based in Liverpool, United Kingdom. We had to have him tell us more about how he – and others – can practice what he preaches; cypherpunks are advocates for social and political change via strong cryptography and privacy-enhancing technologies. Cypherpunk principles tie in directly to his workflows as CEO of Split An Atom and Previous Magazine, Co-Founder of Voidance Records, and producer as The Orion Correlation (he makes all of the stems for his music available to download for free so that anybody can remix it as they see fit – soon, he’ll be open sourcing the project files themselves).
No doubt, he has cultivated a self-made, open-source approach, which extends to his conceptions of the social contract and citizens’ rights to privacy. With the recent passage of the Investigatory Powers Bill in the UK and consideration of Rule 41 in the US, these ideas hold particular import. In the US, January marks a shift from the current, subtly enforced police surveillance state, to an administration driven by archaic allegiance to “law and order” and fascist groupthink actively working to normalize suspecting and violating the rights and security of the “other” for sake of said order. At the end of the day, Hammy shares, the implications we have to consider as our lives and livelihoods are increasingly integrated to the use of technology and access the Internet are always personal, public, and political.
When did these issues of privacy and security become personal for you?
When I first started being censored in countries I had never even visited– then countries I had, followed by the UK, where I currently live. Writing and talking about concepts that scare governments like real freedom of press and speech, with permanence of information through decentralization, are things that individuals and organizations with a specific agenda would like to kill.
Share with us how your understanding of these concepts manifest politically. Did the politics of security and privacy pique your interest initially?
I’m fortunate enough to have been using computers since I was two years old when my parents put me in a computer class in New Brighton; I’ve been online since I was four years old. I’ve seen a lot of things change with the internet over the years, some for better, some for worse. I was abused as a child at my first school, since then I’ve had a very keen sense of whether or not something made me feel uncomfortable, and some of the changes with technology have made me feel very uncomfortable.
In Germany, there are already banks who will not give you a mortgage if you aren’t on Facebook; they want to research the financial background of people you know as well as yourself, and this is used in their decision. That’s an abuse of information and privacy right there. This is just the start of a scary spiral.
On censorship and control:
Facebook began censoring me a few months ago when I started showing people the ways in which they were under surveillance; they actually suspended my account until I went to the press after Fortune Magazine, The Sun and The Huffington Post picked up on one of my opinions. Very recently, Twitter has started to censor me as well, just for recommending software and hardware that respect privacy and freedom.
There are more security cameras in Britain than anywhere else in the world, yet the places that actually need them, like schools and university campuses, either don’t have them or don’t have enough of them to catch thieves, rapists and other unpleasant individuals. Ironically, rights being taken from us and privacy being invaded is supposed to protect us from these problems, but the data being gathered isn’t being used effectively by the people who gather it. Recently, an activist called Deric Lostutter hacked his university website to gather incriminating evidence on two rapists, and has been getting some media attention—he is facing sixteen years in prison for hacking, whereas the two rapists are walking away with no punishment. Lostutter shouldn’t have been forced to hack their website, the university should have had been able to provide the evidence themselves as it was their own system. This is the society we are living in; where hackers are treated as being more dangerous than murderers, rapists, and pedophiles because they have the capacity to change society, as well as the world.
Would you be okay with a country where your son or daughter could be facing a decade in prison for something as simple as copyright infringement, probably even inadvertently through YouTube, or sending their friend a song or film? That could be the reality you’re about to be living in with the Digital Economy Bill.
What does a more digitally free/open-source society look like? Any artistic or literary references come to mind?
Decentralizing all infrastructure.
Hammy Havoc recommends The Minority Report if you’re trying to envision the nightmare of a society that searches for patterns in your data to draw a conclusion of your intent. The short story was originally published here in Fantastic Universe in 1956. Source: Wikipedia.
In terms of likening it to literature, you can have a mixture of George Orwell’s 1984 and The Minority Report with pre-crime, or you can choose to attempt to make the future more akin to Libertatia at a minimum. If people want to understand what’s happening right now, then look to the documentary We Live in Public, about a project taking on surveillance through art in 1999. Liken the commune to Facebook, and you’re most of the way there with the analogy.
These tools protect whistleblowers. You may have nothing that you ever need to hide from the government, the police, your employer, or even your spouse, but certain algorithmic correlations can be made with this data. If there’s a murder with garden shears and you unfortunately bought a pair just before it was committed, then you’re on the suspect list, and you could quite likely be falsely accused and fitted up with the crime by correlating other data gathered on you because statistics now matter more than truth and justice.
“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say,” is a currently infamous quote by Edward Snowden that perfectly summarizes society’s general attitude towards privacy. In my opinion, Snowden deserves a presidential pardon, without a shadow of a doubt—as do several others.
Ironically, rights being taken from us and privacy being invaded is supposed to protect us from these problems, but the data being gathered isn’t being used effectively by the people who gather it.
In another direction, I’ve been hearing and reading more about open source coding projects that have an element of civic engagement – crowdsourcing (usually locally) the capacity to make government information / public data more accessible via a mobile application. What are your thoughts on the viability of those efforts and the connection between participation, transparency, and access to information?
Wikipedia works phenomenally well as a crowdsourced encyclopedia. Imagine if that became decentralized; the necessary donations to operate would be far less, and Wikipedia could have guaranteed permanence within society.
Open-source works, there’s no denying it now. The Recount Magazine website runs on an open-source content management system; as do the majority of sites I have anything to do with.
If a government is truly for the people, and by the people, then transparency is an absolute necessity, but the British and American government give with one hand, and take with another. The Investigatory Powers Bill (“Snoopers’ Charter”) and GCHQ’s DNS firewall are to supposedly protect the public, yet I feel that if these things are allowed to happen then more harm will happen because of it. The government can attempt to stop would-be terrorists from communicating online, but the reality is that any radical with a few brain cells to rub together probably discusses plans in-person to avoid the surveillance that has already been happening for years on end through PRISM, and even old-school wiretapping.
I believe that if the UK didn’t interfere in countries and with cultures they don’t understand then we wouldn’t have this apparent terrorism threat. There’s always money for bombs and bullets for the British government to meddle elsewhere, but there’s never enough money to get people off the streets in Britain, provide an education system that competes with Africa, China, and other previous third world countries, or to make sure that our disabled populace isn’t forced into suicide from having their benefits taken from them.
As always, it is the majority who pays the price for the actions of the few. The actions of my country’s government do not reflect my wishes, or the wishes of a lot of people here.
To other artists interested in utilizing copyleft to distribute their music out there…
Do you, as a creator who spends a significant amount of time and money, wish to be compensated? Can you pay your bills without guaranteed compensation? These are questions that everybody considering copyleft needs to chew over.
Merchandise and partnerships with brands are ultimately the way to make a music career viable in this day and age, and the same applies to any creators considering copyleft.
Streaming platforms like Spotify and Apple Music are highly toxic, in my opinion, especially when exclusivity creeps into the equation. I feel it is better to give away your music and starve the parasites and middlemen of the industry than to accept $50 per million plays, because realistically speaking, the average artist is going to struggle to even reach $50 let alone break even on a record or pay their bills with streaming alone.
Sometimes it is worth trading convenience and off-the-shelf readiness for the sake of actually having control of your computer. Prevention is better than cure.
The cypherpunk movement has been in existence since the 1980s, for nearly 40 years – who and what from the movement has inspired your advocacy along the way?
Observing the many ingenious ways that individuals and groups have managed to subvert control over the years is something that has, and will always fascinate me. Whether it’s a simple tool, a new method of encryption, or long-range radio, there’s no stopping the movement now.
Richard Stallman is a great inspiration to my advocacy, sacrificing convenience for freedom without compromise. If my career didn’t depend on certain aspects of the internet and computers, then I would be able to commit as strongly as he has. I always choose libre software whenever possible, and if I can’t find a libre tool then I’ll use an open-source one, develop one myself, or ask a commercial company if I can audit their source.
Almost everybody that I encounter ends up changing their workflows after I point out the problems and potential issues. Some even become privacy advocates themselves, such as my girlfriend, Mary Ann Mahoney; she uses an entirely open-source writing workflow that respects her privacy. The fellow co-founder of Voidance Records, Lost & Found, has even begun to replace his workflow with both libre and open-source solutions to match my own. Sometimes it is worth trading convenience and off-the-shelf readiness for the sake of actually having control of your computer. Prevention is better than cure.
What would facilitate people being able to take their privacy and security into consideration in their daily lives? What is the standard for that or some first steps to making it personal, actionable, integrated at home?
If the general public does not utilize these technologies for protecting their privacy, then the technologies, the ability to opt-out, and their privacy and rights will be taken from them. As criminals and terrorist factions begin to gravitate towards these tools, the negative connotations surrounding a particular protocol or piece of software begins. You only need look at the stigma of BitTorrent and any P2P application to this day to understand this. Even now, we are seeing this with the criminalization of Tor.
The media is associating Bitcoin with Silk Road and other drug marketplaces that have replaced it, but the reality is that Bitcoin is more than just capitalism with a digital currency; it doesn’t matter what you’re buying as long as you’re using it and recommending it. Decentralizing currency is a big deal because it disrupts the status quo of financial centralization with banks, mints et cetera.
What does that look like?
Ditch the modem your Internet service provider (ISP) gave you when you signed up, as it is probably backdoored, and easily hacked by script kiddies— get a high-end one that you can change the firmware on; if you don’t have root then you don’t have control. Build yourself a pfSense or OPNsense firewall/router or buy one that’s already made. Aside from security, you’ll also have a far faster internet connection as a result.
Stop centralizing your information on third party servers like Dropbox and Google Drive. Buy an off-the-shelf solution or a Raspberry Pi to install Nextcloud. That is the absolute bare minimum of convenience and security that the majority of technophobes can manage. This way, if you are ever compromised or hacked, then stopping a transfer of data is as simple as pulling the plug, and physically destroying the data is possible. If you are a whistleblower, then use an air gapped computer alongside Tails. Off-the-shelf solutions like SilentKeys are a great option for this. Make sure that the journalists you leak to are using a system such as SecureDrop, which we’re now adopting at Previous Magazine, meaning that our sources can remain anonymous.
Don’t use fingerprint, eye, or facial recognition to unlock your devices as you can be physically forced into unlocking them by police. Use passwords, and encrypt your devices.
If a business you buy from accepts Bitcoin, try to use it whenever possible. Encourage businesses to accept Bitcoin, or if you run a business, start accepting Bitcoin. Bitcoin may not end up being the answer to financial anonymity and money as a concept, but it needs to be used to gain further acceptance. If small mom-and-pop businesses and giants like Microsoft can accept Bitcoin, then you have no excuse for not offering it as a payment method. My record label, Voidance Records, accepts Bitcoin as a payment method. We even accept it as a payment method at Split An Atom, my integrated marketing agency.
So, as a business person – an entrepreneur and CEO – and anti-surveillance capitalism. Make the business case for companies utilizing PETs.
As a CEO I’ve been recommended to track users in specific ways using specific tools and sell the data to specific organizations to build a larger profile on people, but I have always chosen to respect our customers, and I encourage clients of ours to do the same when we are building solutions for them. If you wouldn’t be okay with it being done to you, then don’t do it to others.
Likewise, security is ever-important; if people are entrusting their privacy to you, then you need to take that responsibility very seriously. When a business doesn’t take the steps required to protect the information of their customers, then they usually lose their trust forever. I’ve had countless emails from companies telling me they’ve been compromised and that I need to change my password on any site that I’ve used the same password on.
Dropbox was hacked in 2012 and they’re still feeling the hurt from that. In September of this year, they reset the password of everybody who hadn’t changed it since then as they discovered their passwords were compromised after the hack all those years ago. I’m currently helping clients to transition away from Dropbox and centralized storage solutions like that. I’m CTO (Chief Technology Officer) as well at Integrated Movements Arts, a London-based personal training and online fitness company. We treat user data with utmost respect as we are dealing with health data, and very sensitive information regarding their bodies. Everything is encrypted to a military grade; we have state of the art security for the confidential information of our users, and this gives us a big edge on any of our competition.
There is a lot of money to be made selling information, but users would rather pay for privacy and an ad-free experience, as is being proven time and time again. Look at Hulu: no free, ad-supported plan anymore.
Remember, if something costs nothing then you are usually the product and your information being mined. If you want to keep secrets then make no digital record of them, and try to keep them in your head.