Pseudonymity and Anonymity

There are so many different things going on right now that I don’t even know where to start. There’s tons going on with patents, software patents and copyright, there’s been many things going on with internet freedom and Anonymity/Pseudonymity that I’m not sure where to even start. However, you have to start somewhere. So I’ll start with this: Randi Zuckerberg said pseudonyms should go away. What’s the big deal with that?

Well, Google and Facebook both require real names on their website. There are a few links that have commented on why this is a big deal. Tom from Myspace thinks it’s a bad idea, he has a friend that is an expert in social media privacy policies, Danah Boyd, and she claims that forcing real names is an abuse of power, Tech Dirt agrees withBoyd’s assessment indicating that there’s a great amount of danger in moving away from pseudonyms. The Atlantic also notes how different with normal speech tying all actions to a single person online has become.

One of the common reasons for banning pseudonyms, which Zuckerberg argues, is that it changes online behavior. It basically forces users to comply with offline social norms. Norms that the person may actually be attempting to escape for whatever reason. Boyd also argues that Google + originally had a cultural norm without “Real names.” She pulls in Lessig’s Code book that I’ve mentioned on here a few times to support her claim. It’s a really important point she’s making. Cultural norms are established by early adopters. The early adopters of Google + didn’t go with real names. They liked their nicknames.

While Zuckerberg claims that it’s the users fault and their pseudonyms that cause the problem, others claim that the person who owns the website needs to control this. Basically by creating cultural norms that prohibit the ability to be an asshole/troll online. So when my friend bpost over at KBMOD talks about avoiding feeding the trolls, he’s either reinforcing or preventing trolling behavior. A set stance by the moderators of KBMOD should be established to control trolling behavior.

De Spiegel notes that the actions of governments and corporations amount to a war on anonymity on the web.
Which has lead to the arrest of many members of Anonymous and other hacking groups like that. This war has a few benefits like the recent ring of 72 child pornographers that were caught. Unfortunately for most users the days of freedom to untag your photos may be passed. Researchers at Carnegie Mellon have developed off the shelf products to analysis people freely from pictures pulled from facebook. To me, this is really scary, as we have no control over the privacy settings of our friends. If I’m drinking a tasty beer in a picture it could have employment ramifications. Two years ago a teacher was fired for having pictures of beer while in Europe. This is one example there are many others. While, third parties will likely create applications to determine who is whom in a given facebook picture, Germany is suing facebook over their ability to do say, and are saying it’s illegal.

So, what’s all of this mean? There’s been a lot of people talking about this and why should people care? Well, personally I have made a choice to use my real name. Well, it’s still a nickname, but I made a choice to do that. However, since I was aware of the choice when I set my handle as my last name I am conscience of what I should and should not say on the public record online. The first three Google searches for “Kapsar” are for me. Sadly, none of them is for my blog. Thus my online activity easily follows me.

That being said, I fully support the right and the ability of people to use any different name or no name online. It’s the right thing to do morally, and for freedom of speech.

In my next post I’ll discuss some of the speech issues a little bit more. Many of the people I’ve linked too have commented on these issues as well.

EFF’s Tor challenge and Internet Freedom

First of all, no I didn’t participate in the Tor challenge. I don’t feel I can use my computer in this way while I’m doing a lot of work on it for school. However, I think the idea is excellent. I didn’t explain what TOR is did I? Well here’s the EFF website about Tor. TL;DR: basically it provides a way for You, to hide your actual IP address. You have to install a piece of software to access the network. Once you access the network you’re data will bounce around and come out an exit point, which is your “final” IP address. This final address will take the brunt of any legal or illegal activity being conducted on the TOR network. The EFF suggest that you do not run an exit relay out of your home and the Tor project has some recommendations on running an exit point. However, it should be safe to run a middle relay to allow traffic to flow through your home address. The data that flows between middle nodes is encrypted. See the picture below.

EFF representation of the Tor network: from Tor Project

Why is this technology important? This helps with freedom of speech. The US constitution allows free speech and this is an important tool in allowing freedom of speech. Of course like any proxy website, or VPN it can be used for other purposes, as can the ideas of free speech. We may not like what it is being used for, what is being said or why, but it’s still legal. One thing that is noted repeatedly on both the EFF and Tor page is the risk of DCMA take downs and law enforcement attention. Both of these have a chilling affect on freedom of speech.

It seems to me that copyright control and protection may seriously damage a project like this. If all the exit nodes are shut down because of copyright take down notices we lose a valuable tool in preserving our freedom of speech as well as an assumed right to use the internet in the way we feel is best.

Another concern I have about this technology is the obvious potential use by hackers. This tool is going to be used by hackers. It would be foolish for them not to. This of course puts this technology at odds with the wishes of the government to control copyright infringement and prevent hacking of businesses and government agencies. I seriously hope that the US government, and the EU, gives protection to the exit nodes from legal repercussions from hackers using these networks. Used in the right way Tor could be a modern Underground Railroad for dissenters in countries like Libya, Yemen, and Saudi Arabia.

Aaron Swartz and Freedom of Knowledge

Aaron Swartz has been arrested and accused of a multitude of crimes, for a break down of them go here, for gaming a big journal retrieval site called JSTOR (it is a large one many journals are stored within this site). As some one that works with these retrieval services quiet often and has actually hit the limit for the amount of citation data you can pull from them, they can be frustrating. Some of the work I’m personally doing right now is related to citation analysis and co-authorship analysis. Which allows networks of knowledge flows to be seen. Another method is to do a word analysis within articles to create knowledge networks based on what articles are about, what knowledge is contained in each of the articles. Apparently, in the past, Swartz has done something like this. Some of my colleagues also use techniques to allow additional gathering of information. Most of this information, even with you have legal access, is difficult and very time consuming to procure. In this case, Swartz has access and may have been able to get a hold of this data through other means. JSTOR mentioned in one of their releases that they have a program that allows for high volume access to their publications. 

This case also has made me think of a few other issues with our current knowledge retrieval systems and repositories. Companies need to make money off these publications, so we can’t have them for free. However, through my research, I’ve used articles that are 20 years old. If this knowledge was patented, I would be able to access this and use it with no problem at this point. In many cases, it could happen sooner as many patents aren’t renewed after a certain time frame. Using a scientific article is typically more like using something published under a creative commons license, which means you can remix the information. Through citations you give credit where it is due. In most cases you can get access to the data and models, if you give the person credit, either through citations or co-authorship. Why does this work? Because the research is publicly funded.
Authors can also pay to allow full free access to their work depending on the journal. However, in most cases they don’t, or don’t get the article to be free continuously. However, there is some relief from the burden of paying for individual articles, Google Scholar, is able to find articles that scientists have on their personal websites, and allow access to “working paper” versions, which means they aren’t quite publishable yet, even after they have been published. 
I think for publicly funded research we need to have an exception to the copyright law, which changes it from 70 years to 10 years. Depending on the field even 10 years is to long. The work my wife is doing articles cited which are that old are typically cited because it’s giving credit to trail blazers. These papers are typically cited in the hundreds compared to the average of the tens. Once the copyright expired there would be much more competition for distribution of the articles and reduces the risk to the knowledge community if any given retrieval system or journal fails.
This Swartz case scares me in general, because it will make it even more difficult to access information and care a large risk if you create scripts to make it easier to get access to massive amounts of data.

Is the internet a truly democratizing technology?

Boring title I know. However, I believe this is an extremely important discussion to have. Are technologies political things? Many people claim that the internet has radically changed things. That through the internet now all sorts of political activities can happen. Things are freer and more open. Is this true? Is this a result of technology? Does this technology have to be democratizing? I’m going to argue that while there are political implications of many technologies, there are other factors to considered when talking like this.

Can a road have political implications? Most people would argue that, no it’s a road, you use it to get from point A to point B, or just for fun. Well, what if you have to use public transportation and some one designed a bridge so that the bus couldn’t go over it? Would it be political then, or would the person who designed it be instilling political capabilities into a technologies? I would say in this case, the technology was used to prevent the lower class from reaching a nicer area in New York. A designer named Robert Moses designed many bridges for NYC from 1920-1970 that prevented exactly this type of traffic from occurring (Winner, 1986).

Other cases include using assembly lines to control how workers work and the steam engine to force people to work at a steady pace, or a takt time. Other technologies such as an automated tomato picker forced a lot of other changes in California. For instance it laid off workers, forced small farms to combine into larger farms to use the technology, which drove down the cost of tomatoes which big farms were taking advantage of, and also changed the tomato itself. It actually forced the development of a harder tomato so it could survive the automated picking. Which really pissed people off.

Ok, but we’re in the age of the internet. Big deal, what’s your point with all these old technologies? Arab Spring. Protesters were able to rally using the internet. The US government created these things called suitcase internet This allows users to create a mesh network and connect to websites so users are able to get around the walls that governments put into place. Wikileaks is another source of political technology. Sure, it’s just a site where you can upload files, but you could say that anything is just a site. The point is that there are norms and expectations around Wikileaks that allows some one to feel secure if they leak something to.

Additionally, governments are starting to and continuing to control the internet and how it is used. Eric Schmidt, of Google, is worried that this sort of governmental control is only going to increase. Hacktivists such as Lulz Sec and Anonymous are only going to increase the likelihood of this. The US government itself has a conflicting approach to hackers. In the cases where these hackers are going after groups that are not within the US or not the US government, the State Department has been extremely supportive. However, as soon as these groups change focus to the US, they are declared terrorists groups, or something close, which much be destroyed. NATO recently declared much the same thing.

We are in the beginning of a struggle over the future of the internet. Hacking groups are standing up for regular users and attempting to change the direction of governments. There have been a few successes coming from unexpected locations. This op-ed has some of them. The TL;DR of the article is that the UN lambasted some of the UK’s laws, and that an Australian ISP backed out of a filtering agreement with the Government.

Clearly there are many different uses for the internet. These uses can be good and bad. However, these uses have political ramifications. The choice to hack, the choice to be social on the internet, and the choice to educate yourself all impact how the future of the internet goes. I don’t support hacking. However, it is forcing transparency and increasing awareness of people both in and out of cyber space, what is actually going on in the Interwebs.

Also, the UN declared the three-strike laws for copyright, where if you get caught three times you lose internet for life, to be a violation of human rights.

References:
Winner, L. (1980) “Do Artifacts have Politics?” Daedalus, Vol. 109, No. 1: https://wiki.brown.edu/confluence/download/attachments/75695134/Langdon+Winner+Artifacts+and+Politics.pdf

Soft War: http://www.cbsnews.com/8301-504943_162-20073030-10391715.html