Bbg), 2011-2015

Total Page:16

File Type:pdf, Size:1020Kb

Bbg), 2011-2015 Description of document: FOIA Logs for the Broadcasting Board of Governors (BBG), 2011-2015 Requested date: 02-March-2016 Released date: 06-May-2016 Posted date: 08-August-2016 Source of document: BBG FOIA Office Room 3349 330 Independence Ave. SW Washington, D.C. 20237 Fax: (202) 203-4585 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Broadcasting 330 Independence Ave.SW T 202.203.4550 Board of Cohen Building, Room 3349 F 202.203.4585 Governors Washington, DC 20237 Office ofthe General Counsel Freedom ofInformation and Privacy Act Office May6, 2016 RE: Request Pursuant to the Freedom of Information Act-FOIA #16-035 This letter is in response to your Freedom of Information Act (FOIA) request dated March 2, 2016 to the Broadcasting Board of Governors (BBG), which the Agency received on March 14, 2016. In your request, you asked for a copy of the BBG FOIA Case Log covering Calendar Years 2011 through 2015. The agency has completed its search for and review of the documents responsive to your scoped request and they are enclosed with this letter. Personally identifiable information (PH) relating to individuals was redacted pursuant to FOIA Exemption 6 to protect personal privacy interests, and those redactions are marked with the code "(b)(6)" on the enclosed documents. No other responsive information was redacted from the documents provided, and all responsive documents located by the Agency are being provided to you. There are no chargeable fees associated with your request, and the enclosed materials are provided to you at no cost. Th.is completes the Agency's response to your request and it is now closed. However, because information was redacted from the documents provided you have the right to appeal this disposition. If you wish to do so, you must send your appeal within thirty (30) calendar days from the date of this letter to the Chairperson, Access Appeal Committee, BBG, Suite 3349, 330 Independence Avenue, SW, Washington, DC 20237. Sincerely, Andrew T. Krog FOIA and Privacy Act Officer Enclosure: Releasable Documents BBG FOIAs and Privacy Acts Fiscal Year: 2011 = All FOIAs and Privacy Acts NO# STATUS REQUESTOR OFFICE/AFFILIATION RCVD ON DUE ON Add' I Info? - = 2011-0018 Open Requester 11/29/2010 01/12/2010 N Agency Response Date: Subject Matter: 2011-0017 Open Peter Heimlich Requester 11/29/2010 01/12/2010 N Agency Response Date: Subject Matter: All HR records for Rob Sivak 2011-0016 Open Michael Ravnitzky Requester 11/09/2010 12/23/2010 N Agency Response Date: Subject Matter: Anti-web Censorship Test 2011-0015 Open Michael Ravnitzky Requester 11/09/2010 12/23/2010 N Agency Response Date: Subject Matter: 1) A copy of the BBG plan for migration of content from legacy analog tape systems to digital media; 2) A copy of the timeline for migrating this data; 3) A copy of the most recent inventory of BBG's legacy data assets 2011-0014 Open Michael Ravnitzky Requester 11/01/2010 12/15/2010 N Agency Response Date: Subject Matter: A copy of any primarily internal "Talking Points" or "Q&A" documents at BBG 2011-0013 Open David Barr DNC 10/29/2010 12/14/2010 N Agency Response Date: Subject Matter: Communication between the BBG and Newton Leroy "Newt" Gingrich and Haley Reeves Barbour 2011-0012 Open Kimyia Varzi Requester 10/28/2010 12/13/2010 N Agency Response Date: Subject Matter: Candidate information for IB Special English Position (DEU-10-158) 2011-0011 Pending Russell Carollo Requester 10/22/2010 12/07/2010 N Agency Response Date: 11/12/2010 Subject Matter: All records related in any way to collecting and/or maintaining BBG travel records by outside entities 2011-0010 Open Steven Koczela Requester 10/26/2010 12/09/2010 N Agency Response Date: Subject Matter: 1. Datasets that are based on public opinion or media usage surveys in Iraq 2. Datasets that are based on surveys were conducted by lntermedia and fielded by KA Research Limited 3. Datasets that are based on Iraq surveys sponsored by the BBG 4. Datasets that are based on BBG Iraq surveys conducted between 1/1/2005-12/31/2009 2011-0009 Open Benjamin Becker Liberation 10/26/2010 12/09/2010 N Agency Response Date: Subject Matter: Any and all contracts of the BBG and OCB regarding all grants, payments, purchase orders and/or obligations of funds to be transferred to the journalists listed 2011-0008 Open Verla Wiley Local 1812 10/27/2010 11/26/2010 N 12/03/2010 Page 1 / 2 Agency Response Date: Subject Matter: A copy of visitor's logs (6/1/05-09/30/06) 2011-0007 Open Michael Ravnitzky Requester 10/12/2010 11/24/2010 N Agency Response Date: Subject Matter: A copy of BBG/IBBNOA intranet site 2011-0006 Open Michael Ravnitzky Requester 10/12/2010 11/24/2010 N Agency Response Date: Subject Matter: Pre-written obituaries of notable individuals prepared by the BBG 2011-0005 Open Michael Ravnitzky Requester 10/08/2010 11/08/201 0 N Agency Response Date: Subject Matter: FOIA log 2011-0004 Pending Michael Ravnitzky Requester 10/08/2010 11/23/2010 N Agency Response Date: Subject Matter: A copy of any opinions, memos, guidelines, correspondence, letters, emails re: Smith-Mundt Act 2011-0003 Closed Michael Ravnitzky Requester 10/08/2010 11/23/2010 N Agency Response Date: 11/05/2010 Subject Matter: An electronic copy of the BBG employee manual 2011-0002 Closed Michael Ravnitzky Requester 10/08/2010 11/23/2010 N Agency Response Date: 11/05/2010 Subject Matter: An electronic copy of the BBG member briefing manual 2011-0001 Closed Nate Jones The National Security Archive 10/01/2010 11/16/2010 N Agency Response Date: 10/29/2010 Subject Matter: All documents re: 3/16/10 White House memo .~~~~~~~~.,..-~~~~~~~~ 12/03/2010 Page 2 / 2 BBG FOIAs and Privacy Acts Fiscal Year: 2012 All FOIAs and Privacy L Acts NO# STATUS REQUESTOR OFFICE/ AFFILIATION RCVD ON DUE ON Add'I Info? 2012-0045 Open Requester 09/20/2012 11/02/2012 N Agency Response Date: Subject Matter: 2012-0044 Closed John Sanders The Benefit Coordinators 09/10/2012 10/23/2012 N Agency Response Date: 12/19/2012 Subject Matter: Names and information of BBG employees 2012-0043 Closed Requester 09/07/2012 10/22/2012 N Agency Response Date: 10/01/2012 Subject Matter: 2012-0042 Closed Jennifer Peebles The Washington Examiner 08/27/2012 10/10/2012 N newspaper Agency Response Date: 09/28/2012 Subject Matter: Travel information paid by any private source, entity, person or organization since 1/1/2011 2012-0041 Closed Jack Gillum AP 08/13/2012 09/25/2012 N Agency Response Date: 08/22/2012 Subject Matter: Correspondence to or from Wisconsin Rep Paul Ryan or his staff from 01/03/1999 to the present 2012-0040 Pending Matthew Lee Inner City Press 08/13/2012 09/25/2012 N Agency Response Date: 09/24/2012 Subject Matter: Any and all records related to the 6/20/12 communication by Steve Redisch to UN Stephane Dujarric c::: 2012-0039 Closed Kimberly Worldwide Staffing Exchange 07/27/2012 09/10/2012 N Abderrahmane Agency Response Date: 09/17/2012 Subject Matter: RFQ695407JGW 2012-0038 Closed Requester 07/16/2012 08/27/2012 N Agency Response Date: 07/30/2012 Subject Matter: 2012-0037 Closed Matthew Lee Inner City Press 07/16/2012 10/05/2012 N Agency Response Date: 09/24/2012 Subject Matter: All records since 7/3, including those related to Mr. Lobo's inquiry and BBG/VOA responses to Congress and others. 2012-0036 Closed Joe Carson Requester 07/09/2012 08/18/2012 N Agency Response Date: 09/27/2012 Subject Matter: Information on whistleblower disclosures e 2012-0035 Closed Jennifer Allgaier Centurion Research Solutions 07/06/2012 08/17/2012 N Agency Response Date: 09/27/2012 Subject Matter: BBG-50-S-11-4564-RJ 2012-0034 Closed Jennifer Allgaier Centurion Research Solutions 07/06/2012 08/17/2012 N Agency Response Date: 09/27/2012 Subject Matter: BBG50-R-11-0022-RJ (contract & proposal) 2012-0033 Closed Requester 06/25/2012 08/07/2012 N Agency Response Date: 08/13/2012 Subject Matter: 2012-0032 Closed Inner City Press 06/25/2012 08/07/2012 N Agency Response Date: 08/07/2012 07/10/2015 Page 1 I 4 Subject Matter: 2012-0031 Closed Robert Menendez United States Senate 06/25/2012 07/30/2012 N Agency Response Date: 12/10/2012 Subject Matter: A copy of all correspondence, including all letters, records, documents and electronic records, between the Office of U.S.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Motion for Temporary Restraining Order
    Case 1:20-cv-01710-BAH Document 4 Filed 06/25/20 Page 1 of 41 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA OPEN TECHNOLOGY FUND, AMBASSADOR RYAN CROCKER, AMBASSADOR KAREN KORNBLUH, BEN SCOTT, MICHAEL W. KEMPNER, Plaintiffs, Case No. 1:20-cv-1710 v. The Honorable Beryl A. Howell, Chief Judge MICHAEL PACK, in his official capacity as Chief Executive Officer and Director of the U.S. Agency for Global Media, Defendant. PLAINTIFFS’ MOTION FOR A TEMPORARY RESTRAINING ORDER AND PRELIMINARY INJUNCTION DEEPAK GUPTA GUPTA WESSLER PLLC 1900 L Street, NW, Suite 312 Washington, DC 20036 (202) 888-1741 [email protected] June 25, 2020 Counsel for Plaintiffs Case 1:20-cv-01710-BAH Document 4 Filed 06/25/20 Page 2 of 41 TABLE OF CONTENTS Introduction ..................................................................................................................................... 1 Statutory and factual background .................................................................................................... 5 Argument ........................................................................................................................................ 16 I. Open Technology Fund is likely to succeed on its claim that Pack lacks any legal authority whatsoever to remove its officers or directors. ......................... 16 II. The plaintiffs are likely to prevail on their claim that Pack’s attempted “governmental takeover” of all four private organizations is unlawful. .................. 21 III. The plaintiffs are likely
    [Show full text]
  • TECH TOOLS for ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE of CONT ENT S
    TECH TOOLS FOR ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE OF CONT ENT S Tech Tools For Activism 1 An introduction to this booklet 2 2 Securing your email 4 3 Anonymous Blogs and Websites 7 4 Microblogging Beyond Twitter 9 5 Browsing the Internet 11 6 Organising and Networking Online 14 7 Mobile Phone Security and Android Apps 18 8 Publishing and Networking News 21 9 Producing and Publishing Media to the Internet 23 10 Green Computing 25 11 Hiding & Deleting Things on your PC 27 TECH TOOLS FOR ACTIVISM 1. AN INTRODUCTION TO THIS BOOKLET 2. SECURING YOUR EMAIL 3. ANONYMOUS BLOGS AND WEBSITES 4. MICROBLOGGING BEYOND TWITTER 5. BROWSING THE INTERNET 6. ORGANISING AND NETWORKING ONLINE 7. MOBILE PHONE SECURITY AND ANDROID APPS 8. PUBLISHING AND NETWORKING NEWS 9. PRODUCING AND PUBLISHING MEDIA TO THE INTERNET 10. GREEN COMPUTING 11. HIDING & DELETING THINGS ON YOUR PC 1 1. AN INT RODUCT ION T O T HIS BOOKLET T his booklet will help you to: use email securely publish news and upload media anonymously make your web browsing more anonymous and secure use Facebook and Twitter more securely get organised online without relying on corporate social networking sites use encrypted messaging on mobile phones hide stuff on your computer so it can't be found find a more secure and decentralised replacement for Twitter support free software, open licences and decentralised/ federated communication. Why this booklet is important: This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information.
    [Show full text]
  • Digital Authoritarianism and the Global Threat to Free Speech Hearing
    DIGITAL AUTHORITARIANISM AND THE GLOBAL THREAT TO FREE SPEECH HEARING BEFORE THE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 26, 2018 Printed for the use of the Congressional-Executive Commission on China ( Available at www.cecc.gov or www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 30–233 PDF WASHINGTON : 2018 VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS Senate House MARCO RUBIO, Florida, Chairman CHRIS SMITH, New Jersey, Cochairman TOM COTTON, Arkansas ROBERT PITTENGER, North Carolina STEVE DAINES, Montana RANDY HULTGREN, Illinois JAMES LANKFORD, Oklahoma MARCY KAPTUR, Ohio TODD YOUNG, Indiana TIM WALZ, Minnesota DIANNE FEINSTEIN, California TED LIEU, California JEFF MERKLEY, Oregon GARY PETERS, Michigan ANGUS KING, Maine EXECUTIVE BRANCH COMMISSIONERS Not yet appointed ELYSE B. ANDERSON, Staff Director PAUL B. PROTIC, Deputy Staff Director (ii) VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID C O N T E N T S STATEMENTS Page Opening Statement of Hon. Marco Rubio, a U.S. Senator from Florida; Chair- man, Congressional-Executive Commission on China ...................................... 1 Statement of Hon. Christopher Smith, a U.S. Representative from New Jer- sey; Cochairman, Congressional-Executive Commission on China .................. 4 Cook, Sarah, Senior Research Analyst for East Asia and Editor, China Media Bulletin, Freedom House ..................................................................................... 6 Hamilton, Clive, Professor of Public Ethics, Charles Sturt University (Aus- tralia) and author, ‘‘Silent Invasion: China’s Influence in Australia’’ ............
    [Show full text]
  • Is Bob Sending Mixed Signals?
    Is Bob Sending Mixed Signals? Michael Schliep Ian Kariniemi Nicholas Hopper University of Minnesota University of Minnesota University of Minnesota [email protected] [email protected] [email protected] ABSTRACT Demand for end-to-end secure messaging has been growing rapidly and companies have responded by releasing applications that imple- ment end-to-end secure messaging protocols. Signal and protocols based on Signal dominate the secure messaging applications. In this work we analyze conversational security properties provided by the Signal Android application against a variety of real world ad- versaries. We identify vulnerabilities that allow the Signal server to learn the contents of attachments, undetectably re-order and drop messages, and add and drop participants from group conversations. We then perform proof-of-concept attacks against the application to demonstrate the practicality of these vulnerabilities, and suggest mitigations that can detect our attacks. The main conclusion of our work is that we need to consider more than confidentiality and integrity of messages when designing future protocols. We also stress that protocols must protect against compromised servers and at a minimum implement a trust but verify model. 1 INTRODUCTION (a) Alice’s view of the conversa-(b) Bob’s view of the conversa- Recently many software developers and companies have been inte- tion. tion. grating end-to-end encrypted messaging protocols into their chat applications. Some applications implement a proprietary protocol, Figure 1: Speaker inconsistency in a conversation. such as Apple iMessage [1]; others, such as Cryptocat [7], imple- ment XMPP OMEMO [17]; but most implement the Signal protocol or a protocol based on Signal, including Open Whisper Systems’ caching.
    [Show full text]
  • Audit of Radio Free Asia Expenditures
    UNCLASSIFIED UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-FM-IB-15-24 Office of Audits Jw1e2015 Audit of Radio Free Asia Expenditures IMPORTANT NOTICE: This report is intended solely for the official use of the Department of State or the Broadcasti ng Board of Governors, or any agency or organization receiving a copy d irectly from the Office of Inspector General. No secondary d istribution may be made, in whole or in part, outside the Department of State or the Broadcasting Board of Governors, by them or by other agencies or organizations, without prior authorization by the Inspector General. Public avail ability of the document wi ll be determined by the Inspector General under the U.S. Code, 5 U.S.C. 552. Im proper disclosure of this report may result in crim inal, civil, or administrative penalt ies. UNCLASSIFIED UNCLASSIFIED Acronyms BBG Broadcasting Board of Governors CFO Chief Financial Officer CFR Code of Federal Regulations IBB International Broadcasting Bureau OIG Office of Inspector General OMB Office of Management and Budget OTF Open Technology Fund RFA Radio Free Asia U.S.C. United States Code UNCLASSIFIED UNCLASSIFIED Table of Contents Section Page Executive Summary .........................................................................................................................1 Background…. .................................................................................................................................3 Objectives……. ...............................................................................................................................8
    [Show full text]
  • 1. 210830 E2EE Report Paper
    TERRORIST USE OF E2EE: STATE OF PLAY, MISCONCEPTIONS, AND MITIGATION STRATEGIES REPORT 1. Background And Scope 04 2. Methodology 04 Part 1 – Use and Perception of E2EE: Landscape Review 3. Use and Perception of E2EE: Key Findings 05 4. Public Perception of E2EE: User Concerns for Privacy And Security 06 5. Landscape Review: Use of E2EE Across The Internet 13 6. E2EE: Challenges for Content Moderation 23 7. Challenges for Law Enforcement Access 26 8. Policymakers Calls for Access to and Traceability of E2EE 29 9. Key Arguments Against the Creation of Backdoors 39 Part 2 – Assessing Terrorist and Violent Extremist Use of E2EE 10. Terrorist and Violent Extremist Use of E2EE: Key Findings 42 11. Terrorist and Violent Extremist Use of E2EE: Assessment 42 12. Suspected Use of E2EE In Terrorist Attacks And Its Impact on The Encryption Debate 54 13. Monitoring of Encrypted Platforms By Law Enforcement Agencies 56 Part 3 – Strategies for Risk Mitigation 14. Strategies for Risk Mitigation: Key Findings 62 15. Countering Criminal Use of E2EE 63 16. Preventing Criminal Use – EMS Feature Attributes 63 17. Identifying Patterns of Criminal Use – Metadata Analysis 66 18. Disrupting Criminal Use – Technical Tools to Detect Illegal Content 78 19. Going Beyond The Encryption Debate 85 Part 4 – Tech Against Terrorism’s Recommendations for Tech Platforms 20. Recommendation: Mitigating Risks of Terrorist and Violent Extremist Use of EMS 93 21. Recommendation: Taking A Stand For Encryption 99 Annex Annex 1. Encryption Technology 103 Annex 2. Encryption: A Backbone Of Today’s Digital World 108 Annex 3. The Encryption Debate 110 Annex 4.
    [Show full text]
  • Humanitarian Futures for Messaging Apps
    HUMANITARIAN FUTURES FOR MESSAGING APPS UNDERSTANDING THE OPPORTUNITIES AND RISKS FOR HUMANITARIAN ACTION Syrian refugees, landed on Lesbos in Greece, looking for a mobile signal to check their location and notify relatives that they arrived safely. International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org January 2017 Front cover: I. Prickett/UNHCR HUMANITARIAN FUTURES FOR MESSAGING APPS UNDERSTANDING THE OPPORTUNITIES AND RISKS FOR HUMANITARIAN ACTION This report, commissioned by the International Committee of the Red Cross (ICRC), is the product of a collaboration between the ICRC, The Engine Room and Block Party. The content of this report does not reflect the official opinion of the ICRC. Responsibility for the information and views expressed in the report lies entirely with The Engine Room and Block Party. Commissioning Editors: Jacobo Quintanilla and Philippe Stoll (ICRC). Lead Researcher: Tom Walker (The Engine Room). Content: Eytan Oren (Block Party), Zara Rahman (The Engine Room), Nisha Thompson, and Carly Nyst. Editors: Michael Wells and John Borland. Project Manager: Waiyee Leong (ICRC). The ICRC, The Engine Room and Block Party request due acknowledgement and quotes from this publication to be referenced as: ICRC, The Engine Room and Block Party, Humanitarian Futures for Messaging Apps, January 2017. This report is available at www.icrc.org, https://theengineroom.org and http://weareblockparty.com. This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit: http://creativecommons.org/licenses/by-sa/4.0/.
    [Show full text]
  • ENSURING a FUTURE for DETECTING INTERNET DISRUPTIONS a Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns
    ENSURING A FUTURE FOR DETECTING INTERNET DISRUPTIONS A Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns JUNE 2017 Acknowledgements About New America Thank you to the following for their contributions to this New America is committed to renewing American politics, work: Collin Anderson, Seamus Tuohy, Liz Woolery, Georgia prosperity, and purpose in the Digital Age. We generate big Bullen, and Enrique Piracés. ideas, bridge the gap between technology and policy, and curate broad public conversation. We combine the best of a policy research institute, technology laboratory, public Thank you also to the members of the internet forum, media platform, and a venture capital fund for measurement community who took the time to participate ideas. We are a distinctive community of thinkers, writers, in this research. researchers, technologists, and community activists who believe deeply in the possibility of American renewal. Find out more at newamerica.org/our-story. About OTI The Open Technology Institute (OTI) works at the intersection of technology and policy to ensure that every community has equitable access to digital technology and its benefits. We promote universal access to communications technologies that are both open and secure, using a multidisciplinary approach that brings together advocates, researchers, organizers, and innovators. Find out more at www.newamerica.org/oti. OPEN TECHNOLOGY INSTITUTE Contents Executive Summary 2 Introduction 4 Overview of the State of Shutdown Measurement 10 Introduction to Recommendations 15 Recommendations 18 Conclusion 31 Appendices 32 Notes 43 OPEN TECHNOLOGY INSTITUTE EXECUTIVE SUMMARY When it comes to the internet, we live in a world of of researchers that study internet censorship, contradictions.
    [Show full text]
  • Hiding in Plain Sight Narratives of Contemporary Online Anonymity
    Hiding in Plain Sight Narratives of Contemporary Online Anonymity Abstract This research combines social studies and software studies to analyse how anonymity manifests itself within the internet today. To this end, the concept of anonymity and its successor online anonymity are historically analysed by means of literature which is subsequently deployed as a framework for the analysis of Tor Browser, Signal, and Retroshare. (Online) anonymity has identity empowering qualities, adds to personal freedoms and has been a protective measurement for centuries. Overall it adds to the agency of individuals. This research examines how the encrypted browser, encrypted messenger, and encrypted social networking platform narrate online anonymity through their support- and about-pages, and interfaces. Alexander Galloway’s definition of the interface plays a central role for the latter. An examination of the architectures and interfaces of Tor Browser, Signal, and Retroshare demonstrates that the medium specific characters of anonymity enhancing tools add new layers to the concept of online anonymity. The way these tools structure information is influenced by cryptographic ideals, trust and functionality. While being effected by the latter, Tor Browser, Signal and Retroshare show that a different online culture can be established in which the individual’s anonymity plays a central role. Keywords online anonymity, encryption, interface, Tor, Signal, Retroshare Lieke Kersten 22 June 2016 Lonneke van der Velden Stefania Milan MA: New Media and Digital
    [Show full text]
  • Design Justice: Community-Led Practices to Build the Worlds We
    Design Justice Information Policy Series Edited by Sandra Braman The Information Policy Series publishes research on and analysis of significant problems in the field of information policy, including decisions and practices that enable or constrain information, communication, and culture irrespective of the legal siloes in which they have traditionally been located, as well as state- law- society interactions. Defining information policy as all laws, regulations, and decision- making principles that affect any form of information creation, processing, flows, and use, the series includes attention to the formal decisions, decision- making processes, and entities of government; the formal and informal decisions, decision- making processes, and entities of private and public sector agents capable of constitutive effects on the nature of society; and the cultural habits and predispositions of governmentality that support and sustain government and governance. The parametric functions of information policy at the boundaries of social, informational, and technological systems are of global importance because they provide the context for all communications, interactions, and social processes. Virtual Economies: Design and Analysis, Vili Lehdonvirta and Edward Castronova Traversing Digital Babel: Information, e- Government, and Exchange, Alon Peled Chasing the Tape: Information Law and Policy in Capital Markets, Onnig H. Dombalagian Regulating the Cloud: Policy for Computing Infrastructure, edited by Christopher S. Yoo and Jean- François Blanchette Privacy on the Ground: Driving Corporate Behavior in the United States and Europe, Kenneth A. Bamberger and Deirdre K. Mulligan How Not to Network a Nation: The Uneasy History of the Soviet Internet, Benjamin Peters Hate Spin: The Manufacture of Religious Offense and Its Threat to Democracy, Cherian George Big Data Is Not a Monolith, edited by Cassidy R.
    [Show full text]
  • Open Whisper Systems Protocol
    Open Whisper Systems Protocol Azotic or picayune, Walther never intermarries any butlerages! Logy Brewster predestinate luridly. Farcical and corneous Merv never break-ups spherically when Rajeev understocks his Java. If not, then it is famous with the encryption. In quick release, Open Whisper Systems released Signal and then versions for Android and the Chrome browser. On the lead hand, chatting apps started deploying encryption in as name of security. Group threads in open whisper systems protocol manager takes the table in two sessions are not? Sms needs of open whisper systems. Initial shared key of people, great track secret world, and propagated with some additional feature was that? This may result in bad UX. How much does the world, if you need for using the signal browser is latest blogs and implementation. Its code received a duplicate of passenger for the basic structure as cost as code quality which the Messenger service. It uses your mobile phone number can create an account fee can bypass be used to baby with other users having a Signal. Please try at later. His sense, he says, is determined make those protections possible for the average amount without much tech savvy. No spam, we promise. No access to open whisper systems protocol in hundreds of infrastructure and system of data that secure is a message transfer security analyses in person on. It is thought possible to delete an entire marital history. Signal protocol developed by open whisper systems project zero code strong as always focused on telegram account. Signal protocol implementation of open whisper systems was exchanged between them in my phone number to another piece of health, or decrypt a great if turned on.
    [Show full text]