EFF’s Tor challenge and Internet Freedom

First of all, no I didn’t participate in the Tor challenge. I don’t feel I can use my computer in this way while I’m doing a lot of work on it for school. However, I think the idea is excellent. I didn’t explain what TOR is did I? Well here’s the EFF website about Tor. TL;DR: basically it provides a way for You, to hide your actual IP address. You have to install a piece of software to access the network. Once you access the network you’re data will bounce around and come out an exit point, which is your “final” IP address. This final address will take the brunt of any legal or illegal activity being conducted on the TOR network. The EFF suggest that you do not run an exit relay out of your home and the Tor project has some recommendations on running an exit point. However, it should be safe to run a middle relay to allow traffic to flow through your home address. The data that flows between middle nodes is encrypted. See the picture below.

EFF representation of the Tor network: from Tor Project

Why is this technology important? This helps with freedom of speech. The US constitution allows free speech and this is an important tool in allowing freedom of speech. Of course like any proxy website, or VPN it can be used for other purposes, as can the ideas of free speech. We may not like what it is being used for, what is being said or why, but it’s still legal. One thing that is noted repeatedly on both the EFF and Tor page is the risk of DCMA take downs and law enforcement attention. Both of these have a chilling affect on freedom of speech.

It seems to me that copyright control and protection may seriously damage a project like this. If all the exit nodes are shut down because of copyright take down notices we lose a valuable tool in preserving our freedom of speech as well as an assumed right to use the internet in the way we feel is best.

Another concern I have about this technology is the obvious potential use by hackers. This tool is going to be used by hackers. It would be foolish for them not to. This of course puts this technology at odds with the wishes of the government to control copyright infringement and prevent hacking of businesses and government agencies. I seriously hope that the US government, and the EU, gives protection to the exit nodes from legal repercussions from hackers using these networks. Used in the right way Tor could be a modern Underground Railroad for dissenters in countries like Libya, Yemen, and Saudi Arabia.

Aaron Swartz and Freedom of Knowledge

Aaron Swartz has been arrested and accused of a multitude of crimes, for a break down of them go here, for gaming a big journal retrieval site called JSTOR (it is a large one many journals are stored within this site). As some one that works with these retrieval services quiet often and has actually hit the limit for the amount of citation data you can pull from them, they can be frustrating. Some of the work I’m personally doing right now is related to citation analysis and co-authorship analysis. Which allows networks of knowledge flows to be seen. Another method is to do a word analysis within articles to create knowledge networks based on what articles are about, what knowledge is contained in each of the articles. Apparently, in the past, Swartz has done something like this. Some of my colleagues also use techniques to allow additional gathering of information. Most of this information, even with you have legal access, is difficult and very time consuming to procure. In this case, Swartz has access and may have been able to get a hold of this data through other means. JSTOR mentioned in one of their releases that they have a program that allows for high volume access to their publications. 

This case also has made me think of a few other issues with our current knowledge retrieval systems and repositories. Companies need to make money off these publications, so we can’t have them for free. However, through my research, I’ve used articles that are 20 years old. If this knowledge was patented, I would be able to access this and use it with no problem at this point. In many cases, it could happen sooner as many patents aren’t renewed after a certain time frame. Using a scientific article is typically more like using something published under a creative commons license, which means you can remix the information. Through citations you give credit where it is due. In most cases you can get access to the data and models, if you give the person credit, either through citations or co-authorship. Why does this work? Because the research is publicly funded.
Authors can also pay to allow full free access to their work depending on the journal. However, in most cases they don’t, or don’t get the article to be free continuously. However, there is some relief from the burden of paying for individual articles, Google Scholar, is able to find articles that scientists have on their personal websites, and allow access to “working paper” versions, which means they aren’t quite publishable yet, even after they have been published. 
I think for publicly funded research we need to have an exception to the copyright law, which changes it from 70 years to 10 years. Depending on the field even 10 years is to long. The work my wife is doing articles cited which are that old are typically cited because it’s giving credit to trail blazers. These papers are typically cited in the hundreds compared to the average of the tens. Once the copyright expired there would be much more competition for distribution of the articles and reduces the risk to the knowledge community if any given retrieval system or journal fails.
This Swartz case scares me in general, because it will make it even more difficult to access information and care a large risk if you create scripts to make it easier to get access to massive amounts of data.

Is the internet a truly democratizing technology?

Boring title I know. However, I believe this is an extremely important discussion to have. Are technologies political things? Many people claim that the internet has radically changed things. That through the internet now all sorts of political activities can happen. Things are freer and more open. Is this true? Is this a result of technology? Does this technology have to be democratizing? I’m going to argue that while there are political implications of many technologies, there are other factors to considered when talking like this.

Can a road have political implications? Most people would argue that, no it’s a road, you use it to get from point A to point B, or just for fun. Well, what if you have to use public transportation and some one designed a bridge so that the bus couldn’t go over it? Would it be political then, or would the person who designed it be instilling political capabilities into a technologies? I would say in this case, the technology was used to prevent the lower class from reaching a nicer area in New York. A designer named Robert Moses designed many bridges for NYC from 1920-1970 that prevented exactly this type of traffic from occurring (Winner, 1986).

Other cases include using assembly lines to control how workers work and the steam engine to force people to work at a steady pace, or a takt time. Other technologies such as an automated tomato picker forced a lot of other changes in California. For instance it laid off workers, forced small farms to combine into larger farms to use the technology, which drove down the cost of tomatoes which big farms were taking advantage of, and also changed the tomato itself. It actually forced the development of a harder tomato so it could survive the automated picking. Which really pissed people off.

Ok, but we’re in the age of the internet. Big deal, what’s your point with all these old technologies? Arab Spring. Protesters were able to rally using the internet. The US government created these things called suitcase internet This allows users to create a mesh network and connect to websites so users are able to get around the walls that governments put into place. Wikileaks is another source of political technology. Sure, it’s just a site where you can upload files, but you could say that anything is just a site. The point is that there are norms and expectations around Wikileaks that allows some one to feel secure if they leak something to.

Additionally, governments are starting to and continuing to control the internet and how it is used. Eric Schmidt, of Google, is worried that this sort of governmental control is only going to increase. Hacktivists such as Lulz Sec and Anonymous are only going to increase the likelihood of this. The US government itself has a conflicting approach to hackers. In the cases where these hackers are going after groups that are not within the US or not the US government, the State Department has been extremely supportive. However, as soon as these groups change focus to the US, they are declared terrorists groups, or something close, which much be destroyed. NATO recently declared much the same thing.

We are in the beginning of a struggle over the future of the internet. Hacking groups are standing up for regular users and attempting to change the direction of governments. There have been a few successes coming from unexpected locations. This op-ed has some of them. The TL;DR of the article is that the UN lambasted some of the UK’s laws, and that an Australian ISP backed out of a filtering agreement with the Government.

Clearly there are many different uses for the internet. These uses can be good and bad. However, these uses have political ramifications. The choice to hack, the choice to be social on the internet, and the choice to educate yourself all impact how the future of the internet goes. I don’t support hacking. However, it is forcing transparency and increasing awareness of people both in and out of cyber space, what is actually going on in the Interwebs.

Also, the UN declared the three-strike laws for copyright, where if you get caught three times you lose internet for life, to be a violation of human rights.

References:
Winner, L. (1980) “Do Artifacts have Politics?” Daedalus, Vol. 109, No. 1: https://wiki.brown.edu/confluence/download/attachments/75695134/Langdon+Winner+Artifacts+and+Politics.pdf

Soft War: http://www.cbsnews.com/8301-504943_162-20073030-10391715.html

California VS. Video Games (Video games won!)

In 2005 California enacted a law which would have made it illegal to sell extremely violent video games to minors. Much in the same way that it’s illegal to sell Hustler to a minor. The video games version of the RIAA, the Entertainment Software Association (ESA), objected to this, with the support of many different organizations like the RIAA, MPAA, ACLU and many big players in software, like Microsoft and Activision. However, there’s more history to this case than first meets the eye. You have to go back to the initial ruling on pornography to really understand what’s at stake here and how this ruling could impact the gaming industry.

In 1964 a movie called “the Lovers” a French movie was banned in Ohio, because Ohio deemed it obscene. Ohio also fined the owner of the theater where the movie was shown. The owner took Ohio to court over this ruling. In this case the court decided this movie was not obscene, and that Ohio was violating the First Amendment of free speech. This case is where the phrase, I can’t tell you what it (pornography) is, “but I know it when I see it” comes from. One of the Supreme Court Justices, Justice Peters,  had decided against a hard and fast definition, but declared that this movie was ok.

Fast forward nine years and you run into another case against California. In this one a guy name Miller was selling sexually explicit material through a magazine. In this case an actual test was created to determine if the material was obscene or not. This test is the basis for the California law signed into effect in 2005.

If this law had gone into effect, it was halted with an injunction, it would have had a chilling effect on the video game industry. So, we know that it’s steadily gotten more difficult to buy violent video games since the 90’s because of the ESRB (Entertainment Software Rating Board) placing ratings on video games. This is similar to what happens with movies. The major difference is that it is up to the reseller to determine if they want to carry a product with the M rating or not. Effectively what this law would have done is to turn the M from the equivalent of an R rated movie into an NC-17 or X rated movie. This would devastate the First Person Shooting (FPS) industry as well as many other games, such as fighting games, some real time strategy and most likely role playing games as well.

We got lucky. The court ruled that Video games are protected by the First Amendment. The results from the Justices were interesting. While the ruling was 7-2, it could have easily been 5-4 if the law had been written differently. The majority, 5 of the Justices, argued that California had been unable to prove that video games were different enough from books, movies, television and other media to justify this law. Thus they ruled it was violating the First Amendment. The two other Justices, Roberts and Alito, argued that the law was too vague and thus, if narrower the Justices would have sided with California.

The dissenting Justices argued that minors have different kinds of free speech, and they claimed there is not much difference between binding and murdering a women and binding and murdering a topless woman. Using this argument is basically saying that it’s obscene to create this kind of art.

There were also discussions on the science used in this case. Which claimed that the more interactive nature of video games make them more dangerous to children developing minds than any other sort of entertainment.

Now that you have some understanding of this case what does it all mean? Well, first, in a way, this legitimizes video games as a type of art. We all have felt that they’ve been art, but now officially the Supreme Court of the US (SCOTUS) has agreed and given video games the protection they deserve. Second, this prevents any other state from attempting to pass a law similar to the California law. It’s also clear from the way that the Justices ruled on this decision that even a narrower ruling would have gone in favor of the video game industry. This is a really good thing, as it means that it’s unlikely another state will try to challenge this ruling with the current Supreme Court.

What other implications does this have? Well, it clearly says that as a culture we feel that violence is inherently different than sex. We have made it clear with this ruling that the US is willing to accept graphic violence as non-obscene while sex is. This is interesting itself. The initial ruling on obscenity, and the 2005 California law, state that what is culturally acceptable defines obscenity. With this ruling we are saying that violence is acceptable in media.

Other observations, while the SCOTUS ruled that there isn’t a difference between video games and books and movies, I can’t help but still see that there is. Some in books, such as A Song of Ice and Fire (ASOIF), would never be allowed in movies are video games because of the sexual content. However, a young impressionable mind can more easily pick up one of these books than they could pick up a movie or video game with the same content. I started to read ASOIF when I was 13, it would have been extremely difficult for me to actually be able to see a movie that had the same amount of sex and violence. Now, I’m not saying that it should have been easier, but that’s because of my parenting more than anything else. As a matter of free speech, I personally don’t see any difference between the word and the picture. The picture just requires less effort to understand or see the scene. This is not a reason to segregate a section of material. Additionally, in Lawrence Lessig’s Code 2.0 he describes an author that writes stories that are violent and sexually violent towards women. This author was arrested and charges were pressed against him. He was acquitted as he was protected under the first amendment. We need to be aware that no matter how much we don’t like these images or words that we can’t make them illegal. Our founding fathers fought for our freedom to allow us these rights.

So, video gamers rejoice! We have won a great victory, one that will hopefully set a precedent which will protect video game writers, artists, coders and everyone else involved long into the future.

Happy Gaming!

Further Reading:
http://kotaku.com/5795472/video-games-defeat-california-in-supreme-court-battle-over-violent-video-games
http://kotaku.com/5678354/all-you-need-to-know-about-this-weeks-violent-video-game-case-in-the-us-supreme-court
http://arstechnica.com/gaming/news/2011/06/us-supreme-court-strikes-down-video-game-law-on-first-amendment-grounds.ars?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+Featured+Content%29
Actual Ruling: http://www.supremecourt.gov/opinions/10pdf/08-1448.pdf

LulzSec, Anonymous, ICE, FBI and users Part IV

Get caught up on this series Part I, Part II and Part III.

Well, it goes to show how quickly the internet works. LulzSec calls it quit, see NY Times article. However, in my opinion this doesn’t change a whole lot about what I said in my previous posts. There will be another group that decides to do the same sort of thing. I’m sure the individual members of LulzSec will be active with groups like Anonymous and perhaps join up with some other hacking group out there.

At any rate, it’s important to discuss the overall structure of the internet. While many users believe the internet should be free and anonymous and all those things. It’s starting to become apparent that this is not going to be the case. With major US ISPs deciding to go after pirating directly, it seems that deep packet analysis is going to be the way of the future. Wait, what is deep packet analysis? Well, when you send information across the internet it’s broken up into smaller pieces and sent to the end point through many different routes. This ensures that the data all makes it to the other side in the fastest manner possible. Initially, it was difficult to determine what this information was. Now there are many different suppliers that allow ISPs to figure out what these packets of data are. This gets to the root of the Net Neutrality debate. I haven’t talked about that yet, which I’ll do later this week I believe.

Anyway, since the ISPs know what you’re sending, you’re already less anonymous there. They know where you live, who you are and how you are paying your bills. They know a lot of other information about you too. Next, the EFF has shown that based on your browser and plugins that it is likely your browser configuration makes it unique like a finger print (article). On top of that you have a lot of  “Cookies” based on the websites you’ve visited. These are useful to you and to commercial websites. It stores personal information and allows you to get your recommended books list from Amazon. This means that over time, you’ve accumulated a great deal of identifying information on your computer that is accessible through your browser. Using your browser it is easy to identify you and your online habits. However, the EU just implemented a law about requiring consent for websites to use cookies (BBC article).

Sadly, these are not the only structures that we need to be aware of. Many companies like Google are required by the US government to have a backdoor for them to execute warrants and do general snooping of the email systems. I’m sure Facebook is also required to do this, but I haven’t directly heard this yet. This has caused at least one acknowledged case of hacking by a Chinese group on Google (article). With these backdoors there is only so much an individual user can do to protect themselves. In cases like this, the strongest password in the world wouldn’t have protected your emails.

Groups like Anonymous, LulzSec and Ninja Hackers are trying to increase the amount of freedom and anonymity users have on the internet. The Government and businesses are trying to decrease it. The US government does want to initiate a national level internet ID, which basically would tie all your information together. While easy for users, it could be very high risk for them as well. The difference in how these groups feel that the internet should be operating is the root cause of the “Softwar.”  This will not stop, and we, the users, will be stuck between these two sides, unless we force our government to decide one way or the other.

Additional Reading:
Lawrence Lessig Code 2.0. Many of the ideas I got for this post are discussed in this book, which I’m currently reading, you can download it for free legally here.