The List Serves: Population Control and Power

Total Page:16

File Type:pdf, Size:1020Kb

The List Serves: Population Control and Power THE LIST THE LIST SERVES THE LIST SERVES POPULATION CONTROL AND POWER KENNETH C. WERBIN A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 22 INSTITUTE OF NETWORK CULTURES NETWORK INSTITUTE OF THE LIST SERVES POPULATION CONTROL AND POWER KENNETH C. WERBIN 2 THEORY ON DEMAND Theory on Demand #22 The List Serves: Population Control and Power Kenneth C. Werbin With a foreword by Geert Lovink Edited by: Miriam Rasch Cover design: Katja van Stiphout Design: Leonieke van Dipten EPUB development: Leonieke van Dipten Publisher: Institute of Network Cultures, Amsterdam, 2017 ISBN: 978-94-92302-15-1 The research was supported by Le Fonds Québecois de la recherche sur la société et la culture and The Social Sciences and Humanities Research Council of Canada. Contact Institute of Network Cultures Phone: +3120 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services and freely downloadable from http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoD- erivatives 4.0 International (CC BY-NC-SA 4.0). THE LIST SERVES: POPULATION CONTROL AND POWER 3 CONTENTS Acknowledgments 9 Preface by Geert Lovink 11 Introduction. In Lists We Are... 16 The List Served: Ancient Times The List Served: The Classification of the Human Species The List Serves: Disciplinary and Juridical-legal Mechanisms The List Serves: The Apparatuses of Security The List Serves: Milieus of Circulation and Populations The List Serves: Risk Assessment The List Serves: Freedom of Circulation The List Serves: Governmentality Chapter 1. The List Served: Nazi Governmentality 38 Introduction The List, Early Information Technology, and Nazi Governmentality Statistics and the Volk: Constituting Aryan Natural History, or the Normal in Nazi Governmentality Risk Assessment in the Third Reich Statistics and the Control and Policing of Dangerous Elements Juridical-legal and Disciplinary Mechanisms in Nazi Governmentality The Biopolitical Milieu of Circulation: Managing the Volk’s Cultural Organs The List Served: ‘Seeing Everything’ Through Nazi Apparatuses of Security The List Serves: Governmentality or Bare Life? Conclusion Chapter 2. The List Serves: Entropy and Governmentality 77 Introduction Computers, Data, Statistics, and Lists Serve: Entropic Milieus of Circulation What is Entropy, and Why are We Sailing in a Sea of It? Von Neumann’s ‘Winners’ and ‘Losers Open-human Discourse: Islands in a Sea of Entropy Closed-world Discourse: Game Theory à la von Neumann Culled From the Vast Seas of Entropy: Enter the Cyborg Class The List Serves: Who, Says what, in Which Channel, to whom, with what Effect? The List Serves: An Example of Entropy and Contemporary Governmentality Conclusion 4 THEORY ON DEMAND Chapter 3. Fear and No-fly Listing in Canada (March 2006 - November 2007) 115 Introduction Legal, Technoscientific, and Popular Conceptions of No-fly Lists Intelligent Interventions into No-fly Listing The Case of Christopher Soghoian Reconstructing No-fly Lists Conclusion Chapter 4. No-blank List Culture, or How Technoscience ‘Truthfully’ Constructs the ‘Terrorist 141 Introduction No-blank List Culture Emerges No-blank Lists as Technoscientific Cultural Constructions Double Integration, or Good Guys 0, Bad Guys No-blank Lists Serve: The Naturalization of ‘Terrorist’ Knowledge No-blank Lists Serve: The Reemergence of Bare Life No-blank List Culture as a Critical Site of Struggle No-blank Lists Serve: New Formations of Security, Territory and Population Conclusion. In Lists We Trust? 171 References 177 7 This book is dedicated to my late mother, Eleanor Moss-Werbin, and late grandfather, Irwin Moss, both of whom epitomized the value of life-long learning and instilled a profound sense of social justice in me. THE LIST SERVES: POPULATION CONTROL AND POWER 9 ACKNOWLEDGMENTS A first draft of this manuscript was completed in fulfillment of the requirements for my Ph.D. at Concordia University in Montréal, Canada in 2008. Although that draft was completed some years ago, the analysis and theorizing of lists as instruments of population control and power continues to resonate and remains pertinent. If anything, since that draft was finished, there has been an intense proliferation of lists wielded as apparatuses of security in conjunctions of power. No-fly lists continue to expand and continue to erroneously and unjustly contain the names of innocent people whose sole crime is to have a name identical or similar to ‘known’ threats. Getting one’s name off such a list continues to be a Kafkaesque affair. Moreover, the conjunction of data, lists, and algorithmic logics has been taken up in an even wider array of efforts to control the movement of populations, including but not limited to lists of illegal immigrants, lists of risks to the hotel and hospitality industry, and lists of risks to the banking industry. There is no doubt that lists will continue to problematically serve the classification, delineation and policing of populations of ‘them’ as they have since the advent of the written record. It is my hope that the publication of this work will help others to problematize and theorize the use of lists as instruments of population control and power and further resistance to this form of governmentality. This work would not have been possible without the help, support, and encouragement of a wide group of people who I would like to take a moment to acknowledge. First and foremost, I would like to thank my Ph.D. supervisor, Dr. Kim Sawchuk (Concordia University) who thoughtfully and diligently saw the dissertation through to completion with me. Her sophis- ticated theoretical insights contributed invaluably to the work. I would also like to thank my committee members, beginning with Dr. Leslie Regan Shade (University of Toronto) who continues to be a close research collaborator and friend. I was also honoured to have the late Dr. Martin Allor (Concordia University) as a member of my dissertation committee, as well as Dr. Steven Shaw (Concordia University), and Dr. Greg Elmer (Ryerson University). I would also like to extend special thanks to Dr. Geert Lovink (University of Applied Sciences Amsterdam) of the Institute of Network Cultures for all of his support, encouragement and belief in these ideas throughout the development and publication of this work. Thanks also to the following people for their contributions to my thinking and providing me with a rich intellectual community in which to grow: Monika Kin-Gagnon, Gaëtan Tremblay, Charles Perraton, Rae Staseson, Charles Acland, Chantal Nadeau, Owen Chapman, Inderbir Riar, Eric Abitbol, Fenwick McKelvey, Zach Devereaux and Ganaele Langlois. I would also like to thank my current research collaborators who make being an academic a whole pile of fun: Mark Lipton, Leslie Regan Shade, Judith Nicholson and Ian Reilly. Special thanks to my current colleagues at Wilfrid Laurier University who inspire me on a daily basis: James Cairns, Sue Ferguson, Robert Feagan, Ken Paradis, Kate Rossiter, Charles Wells, Heidi Northwood, Rob Kristofferson, Tarah Brookfield, Kofi Campbell, Abby Goodrum, Nathan Rambukkana, Greg Bird and Penelope Ironstone. I would also like to thank my research assistant, Alison Leonard, who helped with the formatting of this book. 10 THEORY ON DEMAND Very special thanks are extended to my family who have stood beside me through thick and thin: my brother, Robert Werbin, his wife Heidi, and my three nephews, Ryan, Evan and Brendan Werbin. I also want to thank ma belle-mère Claire van Belle, my aunt and uncle Beverly and Ernie Shapiro, cousins David Moss, Louise Bloom, and Murray, Lorne and Debra Shapiro. Thanks also to my closest friends for all of their support through the years: Andrew Gelber, Matt Nuss, Ben Duffield, Sandy Fleischer, Robert Robert Landau, Brandee Diner, Sandy Mamane, Pamela Teitelbaum, Lienne Sawatsky, Dan Williams, Samantha Cogan and Doron Sommer. Finally, I want to thank the three people who make me the luckiest person in the world: the love of my life, my confidante and shelter from the storm, Alix-Jeanne Loewenguth, and my intensely loving and ever-inspiring daughters, Celeste-Eléonore and Annabelle Werbin – without you three, nothing else matters! This work was funded by the Fonds Québecois de la recherche sur la société et la culture and the Social Sciences and Humanities Research Council of Canada. Kenneth C. Werbin Brantford, Canada November 2016 THE LIST SERVES: POPULATION CONTROL AND POWER 11 PREFACE BY GEERT LOVINK ‘Hacktivism is not always about breaking into a system, sometimes it’s about breaking out of it.’ Anon ‘The vile pogroms of 1940’s were by-products of the industrial revolution. Today’s pogroms are by-products of the digital revolution.’ Max Keiser The Institute of Network Cultures is proud to present Kenneth Werbin’s study on lists in its Theory on Demand series. It was our wish to publish this important work that was finished as a PhD in 2008, and we are very happy that we remained patient and reminded Kenneth time and again of the utmost strategic-political importance of his research. It was around 1984 that I discovered lists as a separate sociological category. The fact that lists do not merely exist but are a distinguished concept, a mode of power along the lines of Michel Foucault’s philosophy, a specific way to organize subjects and matters, was a real insight for me. This happened during an era when lines of people, waiting in the street for a bakery or office, had all but disappeared and was associated with disfunctioning ‘real existing socialism’ and collapsing Third World economies elsewhere. Lists empower, lists repress, lists order. What could be better than publishing a comprehensive study about lists? When I grew up in the early 1970s the list was the Radio Veronica Top 40, a folded sheet of paper we picked up in the record shop for free.
Recommended publications
  • The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance
    THE SPIES WE TRUST: THIRD PARTY SERVICE PROVIDERS AND LAW ENFORCEMENT SURVEILLANCE Christopher Soghoian Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the School of Informatics, Department of Computer Science Indiana University August 2012 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Geoffrey Fox, Ph.D. Committee (Principal Advisor) Markus Jakobsson, Ph.D. Fred Cate, J.D. May 1, 2012 Marc Rotenberg, J.D. ii Copyright c 2012 Christopher Soghoian This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States License. iii “The creatures outside looked from pig to man, and from man to pig, and from pig to man again; but already it was impossible to say which was which.” —GEORGE ORWELL,ANIMAL FARM iv Acknowledgements First, I would like to thank L. Jean Camp, who selflessly put herself at risk in order to save me from two extremely unpleasant encounters with the FBI. I will be indebted to her forever. I would also like to thank Stephen Braga and Jennifer Granick, two stellar attorneys who came to my defense in 2006 after the FBI took an interest in my work, raiding my home at 2AM and seizing my personal documents and computers. Their expert assistance led to the return of my possessions in just three weeks and the closing of the FBI’s criminal and TSA’s civil investigations without any charges filed. Jennifer Granick came to my assistance a second time (and was joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated me for using my government badge to attend a closed-door surveillance industry conference.
    [Show full text]
  • Security Versus Security: Balancing Encryption, Privacy, and National Secuirty
    SECURITY VERSUS SECURITY: BALANCING ENCRYPTION, PRIVACY, AND NATIONAL SECUIRTY Jackson Stein (TC 660H or TC 359T) Plan II Honors Program The University of Texas at Austin 05/04/2017 __________________________________________ Robert Chesney Director of Robert Strauss Center Supervising Professor __________________________________________ Mark Sainsbury Department of Philosophy Second Reader ABSTRACT Author: Jackson Stein Title: Security vs. Security: Balancing Encryption, Data Privacy, and Security Supervising Professors: Robert Chesney, Mark Sainsbury This paper analyzes the current debate over encryption policy. Through careful evaluation of possible solutions to ‘going dark’ as well has weighting the costs and benefits of each solution, we found exceptional access to information more harmful than helpful. Today, there seems to be no singular leading answer to the going dark problem. Exceptional access to data and communications is a simple solution for a simple problem, however going dark is very complex, and requires a multifaceted and refined solutions. Widespread encryption forces those listening—whether it is the NSA, FBI, foreign governments, criminals or terrorist—to be much more targeted. As for the going dark metaphor, it seems as though we are not entirely “going dark”, and yet we are not completely bright either. There are dark and bright spots coming and going across the technological landscape battling in a perpetual technological arms race. The findings of this paper, ultimately determine there to be no policy that doesn’t come without some cost. That said, there are a number of ways in which law enforcement can track criminals and terrorist without weakening encryption, which we determine to be the best direction in any win lose situation.
    [Show full text]
  • A Lot More Than a Pen Register, and Less Than a Wiretap
    Pell and Soghoian: A Lot More than a Pen Register, and Less than a Wiretap 1 A LOT MORE THAN A PEN REGISTER, AND LESS THAN A WIRETAP: WHAT THE STINGRAY TEACHES US ABOUT HOW CONGRESS SHOULD APPROACH THE REFORM OF LAW ENFORCEMENT SURVEILLANCE 2 AUTHORITIES Stephanie K. Pell* & Christopher Soghoian** 16 YALE J.L. & TECH. 134 (2013) ABSTRACT In June 2013, through an unauthorized disclosure to the media by ex-NSA contractor Edward Snowden, the public learned that the NSA, since 2006, had been collecting nearly all domestic phone call detail records and other telephony metadata pursuant to a controversial, classified interpretation of Section 215 of the USA PATRIOT Act. Prior to the Snowden disclosure, the existence of this intelligence program had been kept secret from the general public, though some members of Congress knew both of its existence and of the statutory interpretation the government was using to justify the bulk collection. Unfortunately, the classified nature of the Section 215 metadata program prevented them from alerting the public directly, so they were left to convey their criticisms of the program directly to certain federal agencies as part of a non-public oversight process. The efficacy of an oversight regime burdened by such strict secrecy is now the subject of justifiably intense debate. In the context of that debate, this Article examines a very different surveillance technology—one that has been used by federal, state and local law enforcement agencies for more than two decades without invoking even the muted scrutiny Congress applied to the Section 215 metadata program.
    [Show full text]
  • US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer
    US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer To cite this version: Félix Tréguer. US Technology Companies and State Surveillance in the Post-Snowden Context: Be- tween Cooperation and Resistance. [Research Report] CERI. 2018. halshs-01865140 HAL Id: halshs-01865140 https://halshs.archives-ouvertes.fr/halshs-01865140 Submitted on 30 Aug 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License UTIC Deliverable 5 US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Author: Félix Tréguer (CERI-SciencesPo) 1 tech Executive Summary This deliverable looks at the growing hybridization between public and private actors in the field of communications surveillance for national security purposes. Focusing on US-based multinationals dominating the digital economy globally which became embroiled in the post-Snowden debates (companies like Google, Apple, Facebook, Microsoft, Yahoo), the report aims at understanding the impact of the Snowden scandal on the strategies of these companies in relation to state Internet surveillance. To that end, the report identifies seven factors that are likely to influence the stance of a given company and its evolution depending on the changing context and constraints that it faces across time and space.
    [Show full text]
  • A Deep Dive Into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues
    Journal of Intellectual Property Law Volume 28 Issue 2 Article 2 October 2020 A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues Anthony Volini DePaul University, [email protected] Follow this and additional works at: https://digitalcommons.law.uga.edu/jipl Part of the Internet Law Commons, and the Privacy Law Commons Recommended Citation Anthony Volini, A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, 28 J. INTELL. PROP. L. 291 (2020). Available at: https://digitalcommons.law.uga.edu/jipl/vol28/iss2/2 This Article is brought to you for free and open access by Digital Commons @ Georgia Law. It has been accepted for inclusion in Journal of Intellectual Property Law by an authorized editor of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues Cover Page Footnote Senior Professional Lecturer at DePaul University College of Law, Registered Patent Attorney, M.S. Cybersecurity (Networking & Infrastructure) (Anticipated 2021), Certified Information Privacy Professional/United States (CIPP/US), CIPP/Europe (CIPP/E), Cybersecurity Fundamentals Certificate (CSXF). Many thanks to Christopher Boyd (3L) and Ashley Weringa (3L), DePaul University College of Law for their assistance, as well as Professor Joshua Sarnoff, Mat Kresz, Karen Heart, David Habich, Colin Black, Thomas Combs, and Brian Barnes for offering their insights. This article is available in Journal of Intellectual Property Law: https://digitalcommons.law.uga.edu/jipl/vol28/iss2/2 Volini: A Deep Dive into Technical Encryption Concepts to Better Understa DEMO2 (DO NOT DELETE) 6/2/2021 11:58 PM A DEEP DIVE INTO TECHNICAL ENCRYPTION CONCEPTS TO BETTER UNDERSTAND CYBERSECURITY & DATA PRIVACY LEGAL & POLICY ISSUES Anthony G.
    [Show full text]
  • Protecting Fundamental Rights in a Digital Age Proceedings, Outcome and Background Documents
    Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013 – 2014 Inquiry on electronic mass surveillance of EU citizens Protecting fundamental rights in a digital age Proceedings, Outcome and Background Documents 2013-2014 1 2 Introduction by Claude Moraes MEP, Rapporteur of the Inquiry on electronic mass surveillance of EU citizens.................................................................................................................................................................5 European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs (2013/2188(INI))...................................................................................9 Explanatory statement (A7-0139/2014).............................................................................................................49 European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ privacy (2013/2682(RSP))........57 Working document on the US and EU Surveillance programmes and their impact on EU citizens fundamental rights by Claude Moraes...............................................................................................................65 Working document on the relation between the surveillance practices in the
    [Show full text]
  • National Security, Mass Surveillance, and Citizen Rights Under Conditions of Protracted Warfare
    Portland State University PDXScholar Dissertations and Theses Dissertations and Theses Summer 9-26-2016 National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare Krystal Lynn Conniry Portland State University Follow this and additional works at: https://pdxscholar.library.pdx.edu/open_access_etds Part of the Peace and Conflict Studies Commons, and the Science and Technology Policy Commons Let us know how access to this document benefits ou.y Recommended Citation Conniry, Krystal Lynn, "National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare" (2016). Dissertations and Theses. Paper 3204. https://doi.org/10.15760/etd.3195 This Thesis is brought to you for free and open access. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare by Krystal Lynn Conniry A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Conflict Resolution Thesis Committee: Rachel Cunliffe, Chair Tom Hastings Vandy Kanyako Portland State University 2016 © 2016 Krystal Lynn Conniry i Abstract This paper explores the complex relationship between securing the rights of citizens to privacy and national security priorities under conditions of government mass surveillance. The inquiry examines the conflict between those who support and those who stand in opposition of government surveillance, and is framed around the question of whether changes in technology and the concept of nationalism help inform our understanding of the increase in surveillance post-9/11.
    [Show full text]
  • Broken Boarding Passes and Ineffective Terrorist Watch Lists
    Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists Christopher Soghoian Indiana University Bloomington, School of Informatics Indiana, USA [email protected] Abstract. In this paper, we discuss a number of existing problems with the air- port transportation security system in the United States. We discuss two separate, yet equally important issues: The ease with which a passenger can fly without any identification documents at all and the ease with which print-at-home board- ing passes can be modified, tampered with, and faked. The significance of these vulnerabilities becomes clear when viewed in light of the US government’s insis- tence on maintaining passenger watch lists, whose contents are secret and effec- tiveness depend upon the government being able to verify the identity of each fly- ing passenger. We then introduce a method of determining if any particular name is on the no fly list, without ever having to step foot into an airport. We introduce a physical denial of service attack against the Transportation Security Adminis- tration (TSA) checkpoints at airports, distributed via an Internet virus. Finally, we propose technical solutions to the user modifiable boarding pass problem, which also neutralize the physical denial of service attack. The solutions have the added benefit of meshing with TSA’s publicly stated wish to assume responsibility for verifying passengers names against the watch lists, as well as enabling them to collect and store real time data on passengers as they pass through checkpoints, something they are currently not able to do. 1 Introduction Since September 11 2001, the US government has placed tens of thousands of American travelers on watch lists as part of a massive security initiative that affects all of the nearly seven hundred million passengers who fly within the United States annually [17].
    [Show full text]
  • Conference Packet
    The future of online consumer protections A Consumer Watchdog policy conference Wednesday, Dec. 1 8 am – 3 pm Washington, DC The Future of Online Consumer Protections: A Consumer Watchdog Policy Conference 8:00 AM – Registration, Continental Breakfast 8:30 AM – Welcome from Consumer Watchdog’s Jamie Court and John M. Simpson 8:45 AM – Keynote speaker David Vladeck, Director, Bureau of Consumer Protection, Federal Trade Commission 9:30 AM – Protecting consumers while they surf the Web: How “Do Not Track Me” would work and other ideas Chris Soghoian, Privacy and security researcher Susan Grant, Director of Consumer Protection, Consumer Federation of America Ginger McCall, Staff Counsel, EPIC 10:30 AM – Protecting electronic health records and ensuring patient safeguards in the online medical marketing era Dr. Deborah Peel, Founder, Patient Privacy Rights Jeff Chester, Executive Director, Center for Digital Democracy 11:30 AM – Competition and antitrust issues on the Internet Gary Reback, Of Counsel, Carr & Ferrell LLP Scott Cleland, President, Precursor LLC Melanie Sabo, Assistant Director for Anticompetitive Practices, Bureau of Competition, Federal Trade Commission 12:30 PM – Lunch 1:00 PM – Luncheon Keynote Daniel J. Weitzner, Associate Administrator, National Telecommunications and Information Administration, Department of Commerce 2:00 PM – The Internet’s impact on creative arts Stuart Bernstein, literary agent Michael Capobianco, Science Fiction and Fantasy Writers of America (SFWA) Salley Shannon, American Society of Journalists and Authors (ASJA) 2:50 PM – Wrap-up and adjourn Table of Contents Speaker Biographies I. Protecting consumers while they surf the Web: How “Do Not Track Me” would work and other ideas Consumer Watchdog poll on online privacy.
    [Show full text]
  • Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era*
    CAUGHT IN THE CLOUD: PRIVACY, ENCRYPTION, AND GOVERNMENT BACK DOORS IN THE WEB 2.0 ERA* CHRISTOPHER SOGHOIAN** INTRODUCTION ................................................................................... 360 I. CLOUD COMPUTING ................................................................ 362 A. Benefits of Cloud Computing for Service Providers ................. 364 B. Benefits of Cloud Computing for End-Users ........................... 365 C. Cloud Creep and the Rise of Cloud Services as the Pre- installed Default ................................................................... 367 D. Single Site Browsers .............................................................. 368 E. Offline Content ..................................................................... 370 F. Confusion ............................................................................. 372 II. MANY CLOUD COMPUTING SERVICES ARE NEEDLESSLY VULNERABLE TO HACKERS ..................................................... 372 A. The Benefits of Network Encryption ...................................... 375 B. Why do Cloud Providers Opt to Leave Users Exposed? ........... 376 C. Cloud Providers Have Little Incentive to Protect Users .......... 378 D. The Cloud Computing Industry Suffers From Market Failure ................................................................................. 379 D. Providing Incentives for Network Encryption ........................ 382 III. PERSONAL PRIVACY, CLOUD COMPUTING AND THE GOVERNMENT .........................................................................
    [Show full text]
  • You Can't Always Get What You Want: How Will Law Enforcement Get What It Needs in a Post- CALEA, Cybersecurity-Centric Encryption Era? Stephanie K
    NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY Volume 17 | Issue 4 Article 3 5-1-2016 You Can't Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post- CALEA, Cybersecurity-Centric Encryption Era? Stephanie K. Pell Follow this and additional works at: http://scholarship.law.unc.edu/ncjolt Part of the Law Commons Recommended Citation Stephanie K. Pell, You Can't Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity- Centric Encryption Era?, 17 N.C. J.L. & Tech. 599 (2016). Available at: http://scholarship.law.unc.edu/ncjolt/vol17/iss4/3 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of Law & Technology by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY VOLUME 17, ISSUE 4: MAY 2016 YOU CAN’T ALWAYS GET WHAT YOU WANT: HOW WILL LAW ENFORCEMENT GET WHAT IT NEEDS IN A POST-CALEA, CYBERSECURITY-CENTRIC ENCRYPTION ERA? Stephanie K. Pell* In recent years, many technology companies have enabled encryption by default in their products, thereby burdening law enforcement efforts to intercept communications content or access data stored on smartphones by traditional means. Even before such encryption technologies were widely used, however, the Federal Bureau of Investigation (“FBI”) claimed its surveillance capabilities were “Going Dark” due to the adoption by consumers of new IP-based communication technologies, many of which are not subject to any surveillance-enabling obligations under the Communications Assistance for Law Enforcement Act (“CALEA”).
    [Show full text]
  • CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES March 2017 CHALLENGING GOVERNMENT HACKING in CRIMINAL CASES
    CHALLENGING GOVERNMENT HACKING IN CRIMINAL CASES March 2017 CHALLENGING GOVERNMENT HACKING IN CRIMINAL CASES American Civil Liberties Union Electronic Frontier Foundation National Association of 125 Broad Street, 815 Eddy Street, Criminal Defense Lawyers New York, NY 10004 San Francisco, CA 94109 1660 L St. NW, 12th Floor, Washington, D.C. 20036 © 2017 ACLU Foundation © 2017 Electronic Frontier Foundation © 2017 National Association of Criminal Defense Lawyers Cover Image: Hugh D’Andrade ABOUT THE AUTHORS* AMERICAN CIVIL LIBERTIES UNION (ACLU) For nearly 100 years, the ACLU has been our nation’s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country. The ACLU takes up the toughest civil liberties cases and issues to defend all people from government abuse and overreach, and works to establish new privacy protections for our digital age of widespread government surveillance. With more than 2 million members, activists, and supporters, the ACLU is a nationwide organization that fights tirelessly in all 50 states, Puerto Rico, and Washington, D.C., for the principle that every individual’s rights must be protected equally under the law, regardless of race, religion, gender, sexual orientation, disability, or national origin. ELECTRONIC FRONTIER FOUNDATION (EFF) The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.
    [Show full text]