The World Tomorrow, Episode 8 Cyberpunks #1

Total Page:16

File Type:pdf, Size:1020Kb

The World Tomorrow, Episode 8 Cyberpunks #1 Air date 5 Jun 2012 Episode 8 – Cyberpunks #1 Jacob Applebaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship. Jacob believes that everybody has the right to read, without restriction, and the right to speak freely, with no exception. In 2010, when Julian Assange couldn’t deliver a talk in New York, Jacob gave the talk instead. Since then, he has been harrassed by the U.S. government: interrogated at airports, subjected to invasive pat-downs while being threatened with prison rape by law enforcement officials, had his equipment confiscated and his online services subject to secret subpoena. Jacob is uncowed by these measures, and remains an outspoken advocate of freedom of expression, and a vocal supporter of WikiLeaks. Andy Mueller-Maguhn is a long time member of the Chaos Computer Club in Germany, and a former spokesman. He is a specialist on surveillance, working in a journalistic capacity on the surveillance industry with his project wiki, buggedplanet.info. Andy works in cryptographic communications, and runs a company called Cryptophone, which markets secure voice communication devices to commercial clients. From worldtomorrow.wikileaks.org/episode-8.html 1 30 October 2013 Jeremie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms. Jeremie works to build tools for the public to use to take part in public debate and to try to change things. He is mostly involved with the copyright wars, the debate around net neutrality and other regulatory issues that are crucial for the future of a free internet. Shortly after sitting for his interview on The World Tomorrow he was stopped by two FBI officers while leaving the United States, and was interrogated about Assange and WikiLeaks. Links to Networks Hosting the Show RT – English – live [assange.rt.com/] RT – Arabic – live [assange.rt.com/ar] RT – Russian [assange.rt.com/ru] RT – Spanish – live [assange.rt.com/es] L’Espresso – Italian [speciali.espresso.repubblica.it/interattivi/assange-il-mondo-di- domani/assange-chi-vincera-la-guerra-della-rete.html] Full Original Transcript JA Interview with Cypher Punks - April 2012 - [off-camera chat/set up] JULIAN: And how was your trip, Jake? JAKE: Uneventful. [inaudible] as long as they’re uneventful… JULIAN: And since I saw you last time, the Spy Files release? Have you had any problem…? JAKE: No, everything’s been fine. JULIAN: Yes, I think they have enough bugs now, so they don’t [laughter] JEREMIE: The other theory is that once they go home in a suit, even when it is you on the side, they start ‘Oh shit, he’s now with the serious boys. We can’t mess it up with him, like that we did before.’ From worldtomorrow.wikileaks.org/episode-8.html 2 30 October 2013 JULIAN: Maybe. JAKE: Yeah. I mean, they just change tactics. [crew sets up] JEREMIE: This guy should study the spy catalogue. There was decent high-quality cameras to be built in everything – so, small ones to hide in glasses, in coffee cups, in lamps, in parts of the ceiling or whatever… JULIAN: My favourite from that is this back-mountable microphone array, and you go into a party and you just face your back to the broad… JEREMIE: With 16 microphones, or was it 18 or something? JULIAN: Yeah, 32 microphones like this, and then you can pick out individual conversations with the mics… JAKE: Wow… JEREMIE: And after… a key 3D printer kind of machine. ANDY: Yeah, that was very nice because it also shows that [?] is a machine that can make you a key from video footage from a key, so it actually shows that [?] is opposing security because if you have a CCTV situation and you can make a copy of the key just by seeing it, just by having a photo of it, you know. JULIAN: Are you selling those? ANDY: No. But [inaudible] had that in their catalogue. JULIAN: Ready? We have a light situation. It’ll be quite interesting actually because it’s gradually going to get dark, and then we’ll be in the dark a bit. JEREMIE: Well, can be whisky time. From worldtomorrow.wikileaks.org/episode-8.html 3 30 October 2013 JULIAN: Yeah, and that will be cigars and whisky time… and we have the smoke coming out up through the conspiracy…. JEREMIE: Ah, good. [17:22:44.23] JULIAN: Ok, so first of all I want to think about how we are going to present it, so the big problem I’ve had is being someone who is steeped in state surveillance and understanding how this transnational security industry has developed over the past twenty years, that I’m too familiar with it, and so I don’t understand how to see this from an outside perspective, from a common man’s perspective. But this area that used to be something that concerned me – and looking at how spy agencies deal with each other – now that everyone has gone onto the internet, this is everyone’s issue, because their whole personal lives are thrown onto the internet. So, perhaps we can speak about, before we start formally, what do you think is a good way of conveying the issue? [17:23:42.03] ANDY: I would… I would have an suggestion – to not look at it from a citizen’s point of view but from a point of view of people in power. The other day when I was at this strange conference in Washington and I met these guys with the badge German embassy, and I approached them and I said ‘Oh, you’re from Germany’, and they said “Ah, not exactly from the embassy, we are new from Munich, blah blah blah’, so it turned out they were from the foreign intelligence and I asked them at the evening buffet, like ‘So what’s the focus to secrecy about?’, and they told me ‘Well, it’s about slowing down processes in order to better control them’, so that’s the core of kind of intelligence work, why the secrecy, which is opposing obviously to our ideas of more transparency and so on, and so if you look at what… [17:24:28.13] JULIAN: [inaudible] , you know, on internal processes? [17:24:32.09] ANDY: Well, to… to slow down a process by taking the ability of people to understand it, so to do declare things secret means you limit the amount of people who have the needs and are able to affect the process. Um, you know, anyway. So, if you look at the internet from a perspective of people in power, then the last 20 years have been frightening to this… all this… they see the internet like an illness, ok, an illness that affects their ability to define reality, to define what’s going on, then used to define what the people know what is going on and their ability to interact with it. So if you look at, let’s say Saudi Arabia, a country like that, where by some historical accident religious leaders and people owning majority of the country are the same, so their interest of change is like in the zeros. Like zero to minus five, maybe. And when they look at this, they look at it like an illness and they ask their consultants ‘Do you have some medicine against this thing out there, you know, we need to be immune if this affects our country, you know, if this internet thingy comes’, and so the answer is surveillance, is mass surveillance, is ‘Hey, we need to control it totally, we need to filter, we need to know everything what they do’ so From worldtomorrow.wikileaks.org/episode-8.html 4 30 October 2013 they get… and that is what has happened in the last 20 years. There was massive investment in surveillance because people in power feared that it would affect their way of governance, so as a base theory… JULIAN: Yeah, yep. [17:26:19.03] JEREMIE: It’s difficult to disassociate surveillance from control. I think we need to address both. And actually that’s more my part, the control of the internet whether it’s from government or corporations, so I don’t know how you consider articulating all that together. [17:26:35.09] JAKE: Yeah, I think it’s pretty clear that censorship is a by-product of surveillance generally speaking, whether it’s self-censorship or actually technical censorship, and I think that important way to convey this to regular people is to do it non-technically. You know, if we, for example, built roads the way that we built, you know, the internet, in modern days with regard to telecommunications every road would have to have surveillance cameras and microphones as basically that no one except the police could access or someone who has pretended to be the police successfully. [17:27:11.21] JULIAN: I’m getting there, Jake, in this country… [17:27:12.03] JAKE: Yeah, and so I mean… that though I think is interesting because when you build a road it is not a requirement that every inch can be monitored with perfect surveillance that is only available to a secret group of people, and I think explaining to everyday people that that is the way that we are building roads on the internet and then requiring people to use those roads – that is something that I think regular people can connect with when they realise that they won’t always have… the builders of the road will not always be the ones in control.
Recommended publications
  • La Quadrature Du Net Campaigning on Telecoms Package Pan-European Activism for Patching a “Pirated” Law
    25th Chaos Communication Congress Nothing to hide Berlin, 2008-12-30 La Quadrature du Net Campaigning on Telecoms Package Pan-european activism for patching a \pirated" law by J´er´emieZimmermann <[email protected]> \Whatever you do will be insignificant, but it is very important that you do it." Mohandas Karamchand Gandhi Contents Prelude 3 Who are we ? 4 Who is La Quadrature du Net ...................................4 Why this name?..........................................4 They support La Quadrature du Net ...............................5 Campaign on Telecoms Package6 Squaring the net..........................................6 The debate is open.........................................7 European Parliament rejects graduated response........................8 Will France Introduce the Digital Guillotine in Europe?....................8 Privacy: Film industry pirates European law..........................9 MEPs want to torpedo the Free Internet on July 7th...................... 10 The \Telecoms Package": out of the shadows, into the light.................. 10 Telecoms Package: vote postponed................................ 11 Telecoms Package: the spectre of the graduated response hangs over Europe......... 12 Telecoms Package: protect the free and just society!...................... 12 Telecoms Package: European democracy's victory already threatened............. 13 Letter sent to all MEPs on september 23rd........................... 14 Graduated Response: The Lesson................................. 15 \Graduated response": Will France
    [Show full text]
  • It Is Christmas Eve at a Waffle House Just Off Interstate 24 in Murfreesboro, TN, Just 20 Miles Outside of Nashville
    A SCATTERED, SMOTHERED & COVERED CHRISTMAS A Waffle House Christmas Musical written by Kaine Riggan (It is Christmas Eve at a Waffle House just off Interstate 24 in Murfreesboro, TN, just 20 miles outside of Nashville. As the lights come up, wee see one gentleman sitting in a booth drinking coffee and having a bowl of chili. A quirky little waitress names Rita enters, obviously in a good mood. She is somewhere between plain and attractive and somewhere between thirty-five and fifty-five, although it is somewhat difficult to judge where in either category she clocks in. She pours out the old coffee (regular) and starts a new pot. She picks up a second pot (decaf) and smells it and decides to keep it. Suddenly, she notices the audience for the first time.) RITA Well shoot fire! If I’d known all ya’ll were gonna be here tonight, I’d a spent more time on this hair. (She quickly adjusts her hairdo) What do you think Harold? Is that better or should I just wear my bad hair day bonnet? (referring to her Waffle House paper hat) (HAROLD mumbles a grouchy, unintelligible response) Oh, chip up, Harold. It’s Christmas Eve! Don’t you just love Christmas Eve? (HAROLD starts to mumble again but she talks right over his response) Awe, there’s just something about this place on Christmas Eve. It’s magical… like there’s something special in the air. HAROLD (acknowledging himself) Sorry! RITA That is not exactly what I had in mind (shouting towards the kitchen) Bert, get in here and change this chili out.
    [Show full text]
  • Protecting Net Neutrality in the Telecoms Package
    September 24th, 2009 Protecting Net Neutrality In the Telecoms Package Network Neutrality is a constitutional principle of the Internet's architecture. It was conceived as an efficient decentralized network and was designed according to an axiom that technological neutrality is the foundation of freedom in communications infrastructure. Built into the network was also an idea about equality, that society as a whole benefits when we defend against discrimination and unfair advantage. Moreover, Net neutrality stimulates the virtuous circle of a development model based on the growth of a common communication network that enables new uses and tools, as opposed to one relying on investments in filtering and controlling, that would lead to a fragmentation of the Internet. Network Neutrality is the safeguard of civil and human rights, and of fair competition for innovation. It is now that the principle of network neutrality is being challenged in the current version of the Telecom Package that it has become a matter of public policy debate in Europe. The shape of our future networks and the rights and freedoms of citizens on the Internet is what is being voted on in this major reform of the European framework for telecommunications regulation. This memorandum lays out the public interest issues at stake in the Telecoms Package. It explains what Network Neutrality is and why openness is important to telecommunications infrastructure. It outlines the social and economic benefits of a regulatory regime that preserves network neutrality. It identifies the specific language in the key provisions that risk fundamental rights and freedoms. It concludes with a guide to making Network Neutrality a fundamental regulatory principle in the European telecommunications market.
    [Show full text]
  • Billboard Magazine
    DANCE CLUB SONGSTM WorldMags.netEURO JAPAN 0 DIGITAL SONGS COMPIL ED BY NIELSEN SOUNDS[ AN INTERNATIONAL JAPAN HOT 100 COMPILED BY HANSHIN/SOUNDSCAN JAPAN/PLANTECH LAST THIS TITLE Artist vas ON WEEK WEEK IMPRINT/PROMOTION LABEL (HART THIS TITLE Artist LAST THIS TITLE Artist #1 EL IMPRINTILABEL WEE WEEK IMPRINT/LABEL 1 WK HIGHER Deborah Cox Feat. Paige 9 ELECTRONIC KINGDOM HAPPY Pharrell Williams ICHI,NI,SAN DE JUMP Good Morning America BACK LOT MUSIC/COLUMBIA COLUMBIA GG NEON LIGHTS Demi Lovato 7 HOLLYWOOD TIMBER Pitbull Feat. Ke$ha KOI SURU FORTUNE COOKIE AKB48 MR. 305/POLO GROUNDS/RCA KING TAKE IT LIKE A MAN Cher 6 WARNER BROS. HEY BROTHER Avicii ASHITA MO MUSH & Co. POSITIVA/PRMD/ISLAND VICTOR TIMBER Pitbull Feat. Ke$ha 8 MR. 305/POLO GROUNDS/RCA THE MONSTER Eminem Feat. Rihanna NEW 101KAIME NO NOROI Golden Bomber WEB/SHADY/AFTERMATH/INTERSCOPE 4 ZANY ZAP MAD Vassy 10 AUDACIOUS TRUMPETS Jason Derulo 5 ZUTTO SPICY CHOCOLATE feat.HAN-KUN & TEE BELUGA HEIGHTS/WARNER BROS. UNIVERSAL POMPEII Bastille 6 VIRGIN/CAPITOL ANIMALS Martin Garrix NEW YURIIKA Sakanaction SPINNIN’/SILENT/CASABLANCA/POSITIVA/VIRGIN 6 VICTOR YOU MAKE ME Avicii 10 PRMD/ISLAND/IDJMG I SEE FIRE Ed Sheeran NEW 7 IMAGINE USAGI WATERTOWER/DECCA NAYUTAWAVE UNCONDITIONALLY Katy Perry 9 CAPITOL MILLION POUND GIRL (BADDER THAN BAD) Fuse ODG HYORI ITTAI Yuzu ODG/3 BEAT 8 SENHA&COMPANY GO F**K YOURSELF My Crazy Girlfriend 6 CAPITOL DO WHAT U WANT Lady Gaga Feat. R. Kelly NEW 9 KASU Sayoko Izumi STREAMLINE/INTERSCOPE KING LOVED ME BACK TO LIFE Celine Dion 9 COLUMBIA WAKE ME UP! Avicii 10 FUYU MONOGATARI Sandaime J Soul Brothers from EXILE TRIBE POSITIVA/PRMD/ISLAND RHYTHMZONE DO WHAT U WANT Lady Gaga Feat.
    [Show full text]
  • IPG Spring 2020 Rock Pop and Jazz Titles
    Rock, Pop, and Jazz Titles Spring 2020 {IPG} That Thin, Wild Mercury Sound Dylan, Nashville, and the Making of Blonde on Blonde Daryl Sanders Summary That Thin, Wild Mercury Sound is the definitive treatment of Bob Dylan’s magnum opus, Blonde on Blonde , not only providing the most extensive account of the sessions that produced the trailblazing album, but also setting the record straight on much of the misinformation that has surrounded the story of how the masterpiece came to be made. Including many new details and eyewitness accounts never before published, as well as keen insight into the Nashville cats who helped Dylan reach rare artistic heights, it explores the lasting impact of rock’s first double album. Based on exhaustive research and in-depth interviews with the producer, the session musicians, studio personnel, management personnel, and others, Daryl Sanders Chicago Review Press chronicles the road that took Dylan from New York to Nashville in search of “that thin, wild mercury sound.” 9781641602730 As Dylan told Playboy in 1978, the closest he ever came to capturing that sound was during the Blonde on Pub Date: 5/5/20 On Sale Date: 5/5/20 Blonde sessions, where the voice of a generation was backed by musicians of the highest order. $18.99 USD Discount Code: LON Contributor Bio Trade Paperback Daryl Sanders is a music journalist who has worked for music publications covering Nashville since 1976, 256 Pages including Hank , the Metro, Bone and the Nashville Musician . He has written about music for the Tennessean , 15 B&W Photos Insert Nashville Scene , City Paper (Nashville), and the East Nashvillian .
    [Show full text]
  • Privacy International, Human and Digital Rights Organizations, and International Legal Scholars As Amici Curiae in Support of Respondent
    No. 17-2 IN THE Supreme Court of the United States IN THE MdATTER OF A WARRANT TO SEARCH A CERTAIN EMAIL ACCOUNT CONTROLLED AND MAINTAINED BY MICROSOFT CORPORATION UNITED STATES OF AMERICA, Petitioner, —v.— MICROSOFT CORPORATION, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT BRIEF OF PRIVACY INTERNATIONAL, HUMAN AND DIGITAL RIGHTS ORGANIZATIONS, AND INTERNATIONAL LEGAL SCHOLARS AS AMICI CURIAE IN SUPPORT OF RESPONDENT LAUREN GALLO WHITE BRIAN M. WILLEN RYAN T. O’HOLLAREN Counsel of Record WILSON, SONSINI, GOODRICH BASTIAAN G. SUURMOND & ROSATI, P.C. WILSON, SONSINI, GOODRICH One Market Plaza Spear Tower, & ROSATI, P.C. Suite 3300 1301 Avenue of the Americas, San Francisco, California 94105 40th Floor (415) 947-2000 New York, New York 10019 [email protected] (212) 999-5800 [email protected] [email protected] [email protected] Attorneys for Amici Curiae (Counsel continued on inside cover) CAROLINE WILSON PALOW SCARLET KIM PRIVACY INTERNATIONAL 62 Britton Street London, EC1M 5UY United Kingdom [email protected] [email protected] i QUESTION PRESENTED Whether construing the Stored Communications Act (“SCA”) to authorize the seizure of data stored outside the United States would conflict with foreign data-protection laws, including those of Ireland and the European Union, and whether these conflicts should be avoided by applying established canons of construction, including presumptions against extra- territoriality and in favor of international comity, which direct U.S. courts to construe statutes as applying only domestically and consistently with foreign laws, absent clear Congressional intent. ii TABLE OF CONTENTS PAGE QUESTION PRESENTED ..........................
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • De Filippi & Tréguer
    May 2014 Expanding the Internet Commons : The Subversive Potential of Wireless Community Networks by Primavera De Filippi1 and Félix Tréguer2 “Freedom is fostered when the means of communication are dispersed, decentralized, and easily available, as are printing presses and microcomputers. Central control is more likely when the means of communication are concentrated, monopolized, and scarce, as are great networks,” wrote professor Ithiel de Sola Pool (1984), an American political scientist and legal analyst of communications technologies. Beyond highlighting historical and technical trends in technology, Sola Pool also understood that there was nothing deterministic about how technologies evolve. While control over printing presses and microcomputers can, as it turns out, be highly centralized, the deployment and management of telecommunication networks can, eventually, undergo a process of decentralization. The outcome ultimately depends on political, technical, economic, institutional and legal arrangements shaping both the development of communications tools and their use. Often, when it comes to politics – and Internet policy is obviously no exception – the antagonism between freedom and control essentially comes down to the trade-off between centralization or decentralization. In the past year, the ongoing controversy regarding the massive surveillance undertaken by the US National Security Agency (NSA) and its allied organizations has encouraged a growing number of technology activists to deploy decentralized and free software3 alternatives to the centralized online services known to collaborate with the NSA. This trend can be likened to what happened repeatedly in the history of the Internet. The rise of the personal computer and the widespread adoption of the Internet network came out of a need to democratize computing technologies by taking them out of the hands of technocracy – decentralizing both the use of computers and the control of communication technologies.
    [Show full text]
  • Karaoke Mietsystem Songlist
    Karaoke Mietsystem Songlist Ein Karaokesystem der Firma Showtronic Solutions AG in Zusammenarbeit mit Karafun. Karaoke-Katalog Update vom: 13/10/2020 Singen Sie online auf www.karafun.de Gesamter Katalog TOP 50 Shallow - A Star is Born Take Me Home, Country Roads - John Denver Skandal im Sperrbezirk - Spider Murphy Gang Griechischer Wein - Udo Jürgens Verdammt, Ich Lieb' Dich - Matthias Reim Dancing Queen - ABBA Dance Monkey - Tones and I Breaking Free - High School Musical In The Ghetto - Elvis Presley Angels - Robbie Williams Hulapalu - Andreas Gabalier Someone Like You - Adele 99 Luftballons - Nena Tage wie diese - Die Toten Hosen Ring of Fire - Johnny Cash Lemon Tree - Fool's Garden Ohne Dich (schlaf' ich heut' nacht nicht ein) - You Are the Reason - Calum Scott Perfect - Ed Sheeran Münchener Freiheit Stand by Me - Ben E. King Im Wagen Vor Mir - Henry Valentino And Uschi Let It Go - Idina Menzel Can You Feel The Love Tonight - The Lion King Atemlos durch die Nacht - Helene Fischer Roller - Apache 207 Someone You Loved - Lewis Capaldi I Want It That Way - Backstreet Boys Über Sieben Brücken Musst Du Gehn - Peter Maffay Summer Of '69 - Bryan Adams Cordula grün - Die Draufgänger Tequila - The Champs ...Baby One More Time - Britney Spears All of Me - John Legend Barbie Girl - Aqua Chasing Cars - Snow Patrol My Way - Frank Sinatra Hallelujah - Alexandra Burke Aber Bitte Mit Sahne - Udo Jürgens Bohemian Rhapsody - Queen Wannabe - Spice Girls Schrei nach Liebe - Die Ärzte Can't Help Falling In Love - Elvis Presley Country Roads - Hermes House Band Westerland - Die Ärzte Warum hast du nicht nein gesagt - Roland Kaiser Ich war noch niemals in New York - Ich War Noch Marmor, Stein Und Eisen Bricht - Drafi Deutscher Zombie - The Cranberries Niemals In New York Ich wollte nie erwachsen sein (Nessajas Lied) - Don't Stop Believing - Journey EXPLICIT Kann Texte enthalten, die nicht für Kinder und Jugendliche geeignet sind.
    [Show full text]
  • Download Joint Letter from Civil Society
    Joint Letter from Civil Society Organizations to Foreign Ministers of Freedom Online Coalition Member States April 18, 2014 Dear Minister, On April 8, 2014, former US National Security Agency (NSA) contractor Edward Snowden testified before the Parliamentary Assembly of the Council of Europe (PACE) via video- conference that the NSA and the United Kingdom Government Communications Headquarters (GCHQ) have used their surveillance capabilities to spy on the communications of human rights organizations and civil society groups, both domestically and internationally. Snowden did not reveal which groups the NSA or GCHQ have spied upon, but indicated that the types of organizations whose communications had been compromised included major global organizations similar to Amnesty International and Human Rights Watch, and other NGOs. Snowden explicitly told PACE members that the NSA had “specifically targeted the communications of either leaders or staff members in a number of purely civil or human rights organizations … including domestically, within the borders of the United States.” If Snowden’s assertion is accurate, such facts would not only point to fresh dimensions of the overreach of NSA surveillance, but also would constitute an outrageous breach of the US government’s stated commitment to human rights and freedom online. It also raises the very real possibility that these organizations’ communications with confidential sources have been intercepted. Sharing this information with other governments could put victims and human rights defenders the world over in imminent danger. The US frequently criticizes repressive states for unjustified government spying on human rights organizations, media organizations, and civil society because such surveillance has a chilling effect on freedom of expression and association and constitutes a clear form of harassment and intimidation.
    [Show full text]
  • Civil Society Statement to the E-G8 and G8 the Signatories of This
    Civil Society Statement to the e-G8 and G8 The signatories of this statement are representatives of civil society from around the world working towards the promotion of Internet freedom, digital rights, and open communication. We understand that the French Presidency of the G8 is holding a G8 internet meeting -- the "e- G8 Forum" -- immediately before the G8 Summit in Deauville, with a view to shaping the agenda of the G8 Summit regarding key global internet policy issues. This meeting is significant in that this is the first year that the internet’s role in society and the economy is explicitly on the G8 agenda. As key world leaders, your policies have a major influence on internet policy globally. Regrettably, certain policies being implemented in the most developed economies are undermining the open and neutral internet -- the very qualities that represent the essence of its democratic and economic potential. We believe that G8 Member States should use the e-G8 meeting as an opportunity to publicly commit to expanding internet access for all, combating digital censorship and surveillance, limiting online intermediary liability, and upholding principles of net neutrality. Internet Access for All We are particularly concerned about the increasing trend of nations cutting off citizens’ access to the Internet and mobile networks in times of crisis, as Egypt, Libya, Iran, China, Nepal, and Burma have all done. In many if not all of these countries, we see how important access to the Internet is as a gateway to a plethora of others civil, political, and fundamental human rights. Many G8 countries are actively pursuing policies that would similarly seek to restrict and control access; these policies legitimize actions of repressive regimes and threaten the core of the internet economy.
    [Show full text]
  • Authenticity, Politics and Post-Punk in Thatcherite Britain
    ‘Better Decide Which Side You’re On’: Authenticity, Politics and Post-Punk in Thatcherite Britain Doctor of Philosophy (Music) 2014 Joseph O’Connell Joseph O’Connell Acknowledgements Acknowledgements I could not have completed this work without the support and encouragement of my supervisor: Dr Sarah Hill. Alongside your valuable insights and academic expertise, you were also supportive and understanding of a range of personal milestones which took place during the project. I would also like to extend my thanks to other members of the School of Music faculty who offered valuable insight during my research: Dr Kenneth Gloag; Dr Amanda Villepastour; and Prof. David Wyn Jones. My completion of this project would have been impossible without the support of my parents: Denise Arkell and John O’Connell. Without your understanding and backing it would have taken another five years to finish (and nobody wanted that). I would also like to thank my daughter Cecilia for her input during the final twelve months of the project. I look forward to making up for the periods of time we were apart while you allowed me to complete this work. Finally, I would like to thank my wife: Anne-Marie. You were with me every step of the way and remained understanding, supportive and caring throughout. We have been through a lot together during the time it took to complete this thesis, and I am looking forward to many years of looking back and laughing about it all. i Joseph O’Connell Contents Table of Contents Introduction 4 I. Theorizing Politics and Popular Music 1.
    [Show full text]