Archive for the ‘Free Speech’ Category

Freedom of Speech/Press – Great For “Us” – Not So Much For You (Wikileaks)

Saturday, November 5th, 2016

The New York Times, sensing a possible defeat of its neo-liberal agenda on November 8, 2016, has loosed the dogs of war on social media in general and Wikileaks in particular.

Consider the sleight of hand in Farhad Manjoo’s How the Internet Is Loosening Our Grip on the Truth, which argues on one hand,


You’re Not Rational

The root of the problem with online news is something that initially sounds great: We have a lot more media to choose from.

In the last 20 years, the internet has overrun your morning paper and evening newscast with a smorgasbord of information sources, from well-funded online magazines to muckraking fact-checkers to the three guys in your country club whose Facebook group claims proof that Hillary Clinton and Donald J. Trump are really the same person.

A wider variety of news sources was supposed to be the bulwark of a rational age — “the marketplace of ideas,” the boosters called it.

But that’s not how any of this works. Psychologists and other social scientists have repeatedly shown that when confronted with diverse information choices, people rarely act like rational, civic-minded automatons. Instead, we are roiled by preconceptions and biases, and we usually do what feels easiest — we gorge on information that confirms our ideas, and we shun what does not.

This dynamic becomes especially problematic in a news landscape of near-infinite choice. Whether navigating Facebook, Google or The New York Times’s smartphone app, you are given ultimate control — if you see something you don’t like, you can easily tap away to something more pleasing. Then we all share what we found with our like-minded social networks, creating closed-off, shoulder-patting circles online.

This gets to the deeper problem: We all tend to filter documentary evidence through our own biases. Researchers have shown that two people with differing points of view can look at the same picture, video or document and come away with strikingly different ideas about what it shows.

You caught the invocation of authority by Manjoo, “researchers have shown,” etc.

But did you notice he never shows his other hand?

If the public is so bat-shit crazy that it takes all social media content as equally trustworthy, what are we to do?

Well, that is the question isn’t it?

Manjoo invokes “dozens of news outlets” who are tirelessly but hopelessly fact checking on our behalf in his conclusion.

The strong implication is that without the help of “media outlets,” you are a bundle of preconceptions and biases doing what feels easiest.

“News outlets,” on the other hand, are free from those limitations.

You bet.

If you thought Majoo was bad, enjoy seething through Zeynep Tufekci’s claims that Wikileaks is an opponent of privacy, sponsor of censorship and opponent of democracy, all in a little over 1,000 words (1069 exact count). Wikileaks Isn’t Whistleblowing.

It’s a breath taking piece of half-truths.

For example, playing for your sympathy, Tufekci invokes the need of dissidents for privacy. Even to the point of invoking the ghost of the former Soviet Union.

Tufekci overlooks and hopes you do as well, that these emails weren’t from dissidents, but from people who traded in and on the whims and caprices at the pinnacles of American power.

Perhaps realizing that is too transparent a ploy, she recounts other data dumps by Wikileaks to which she objects. As lawyers say, if the facts are against you, pound on the table.

In an echo of Manjoo, did you know you are too dumb to distinguish critical information from trivial?

Tufekci writes:


These hacks also function as a form of censorship. Once, censorship worked by blocking crucial pieces of information. In this era of information overload, censorship works by drowning us in too much undifferentiated information, crippling our ability to focus. These dumps, combined with the news media’s obsession with campaign trivia and gossip, have resulted in whistle-drowning, rather than whistle-blowing: In a sea of so many whistles blowing so loud, we cannot hear a single one.

I don’t think you are that dumb.

Do you?

But who will save us? You can guess Tufekci’s answer, but here it is in full:


Journalism ethics have to transition from the time of information scarcity to the current realities of information glut and privacy invasion. For example, obsessively reporting on internal campaign discussions about strategy from the (long ago) primary, in the last month of a general election against a different opponent, is not responsible journalism. Out-of-context emails from WikiLeaks have fueled viral misinformation on social media. Journalists should focus on the few important revelations, but also help debunk false misinformation that is proliferating on social media.

If you weren’t frightened into agreement by the end of her parade of horrors:


We can’t shrug off these dangers just because these hackers have, so far, largely made relatively powerful people and groups their targets. Their true target is the health of our democracy.

So now Wikileaks is gunning for democracy?

You bet. 😉

Journalists of my youth, think Vietnam, Watergate, were aggressive critics of government and the powerful. The Panama Papers project is evidence that level of journalism still exists.

Instead of whining about releases by Wikileaks and others, journalists* need to step up and provide context they see as lacking.

It would sure beat the hell out of repeating news releases from military commanders, “justice” department mouthpieces, and official but “unofficial” leaks from the American intelligence community.

* Like any generalization this is grossly unfair to the many journalists who work on behalf of the public everyday but lack the megaphone of the government lapdog New York Times. To those journalists and only them, do I apologize in advance for any offense given. The rest of you, take such offense as is appropriate.

Bias in Data Collection: A UK Example

Monday, October 10th, 2016

Kelly Fiveash‘s story, UK’s chief troll hunter targets doxxing, virtual mobbing, and nasty images starts off:

Trolls who hurl abuse at others online using techniques such as doxxing, baiting, and virtual mobbing could face jail, the UK’s top prosecutor has warned.

New guidelines have been released by the Crown Prosecution Service to help cops in England and Wales determine whether charges—under part 2, section 44 of the 2007 Serious Crime Act—should be brought against people who use social media to encourage others to harass folk online.

It even includes “encouraging” statistics:


According to the most recent publicly available figures—which cite data between May 2013 and December 2014—1,850 people were found guilty in England and Wales of offences under section 127 of the Communications Act 2003. But the numbers reveal a steady climb in charges against trolls. In 2007, there were a total of 498 defendants found guilty under section 127 in England and Wales, compared with 693 in 2008, 873 in 2009, 1,186 in 2010 and 1,286 in 2011.

But the “most recent publicly available figures,” doesn’t ring true does it?

Imagine that, 1850 trolls out of a total population of England and Wales of 57 million. (England 53.9 million, Wales 3.1 million, mid-2013)

Really?

Let’s look at the referenced government data, 25015 Table.xls.

For the months of May 2013 to December 2014, there are only monthly totals of convictions.

What data is not being collected?

Among other things:

  1. Offenses reported to law enforcement
  2. Offenses investigated by law enforcement (not the same as #1)
  3. Conduct in question
  4. Relationship, if any, between the alleged offender/victim
  5. Race, economic status, location, social connections of alleged offender/victim
  6. Law enforcement and/or prosecutors involved
  7. Disposition of cases without charges being brought
  8. Disposition of cases after charges brought but before trial
  9. Charges dismissed by courts and acquittals
  10. Judges who try and/or dismiss charges
  11. Penalties imposed upon guilty plea and/or conviction
  12. Appeals and results on appeal, judges, etc.

All that information exists for every reported case of “trolls,” and is recorded at some point in the criminal justice process or could be discerned from those records.

Can you guess who isn’t collecting that information?

The TheyWorkForYou site reports at: Communications Act 2003, Jeremy Wright, The Parliamentary Under-Secretary of State for Justice, saying:


The Ministry of Justice Court Proceedings Database holds information on defendants proceeded against, found guilty and sentenced for criminal offences in England and Wales. This database holds information on offences provided by the statutes under which proceedings are brought but not the specific circumstances of each case. It is not possible to separately identify, in all cases brought under section 127 of the Communications Act 2003, whether a defendant sent or caused to send information to an individual or a small group of individuals or made the information widely available to the public. This detailed information may be held by the courts on individual case files which due to their size and complexity are not reported to Justice Analytical Services. As such this information can be obtained only at disproportionate cost.
… (emphasis added)

I was unaware that courts in England and Wales were still recording their proceedings on vellum. That would be expensive to manually gather that data together. (NOT!)

How difficult is it from any policy organization, whether seeking greater protection from trolls and/or opposing classes of prosecution based on discrimination and free speech to gather the same data?

Here is a map of the Crown Prosecution Service districts:

cps-460

Counting the sub-offices in each area, I get forty-three separate offices.

But that’s only cases that are considered for prosecution and that’s unlikely to be the same number as reported to the police.

Checking for police districts in England, I get thirty-nine.

england-police-460

Plus, another four areas for Wales:

wales-police-230

The Wikipedia article List of law enforcement agencies in the United Kingdom, Crown dependencies and British Overseas Territories has links for all these police areas, which in the interest of space, I did not repeat here.

I wasn’t able to quickly find a map of English criminal courts, although you can locate them by postcode at: Find the right court or tribunal. My suspicion is that Crown Prosecution Service areas correspond to criminal courts. But verify that for yourself.

In order to collect the information already in the possession of the government, you would have to search records in 43 police districts, 43 Crown Prosecution Service offices, plus as many as 43 criminal courts in which defendants may be prosecuted. All over England and Wales. With unhelpful clerks all along the way.

All while the government offers the classic excuse:

As such this information can be obtained only at disproportionate cost.

Disproportionate because:

Abuse of discretion, lax enforcement, favoritism, discrimination by police officers, Crown prosecutors, judges could be demonstrated as statistical facts?

Governments are old hands at not collecting evidence they prefer to not see thrown back in their faces.

For example: FBI director calls lack of data on police shootings ‘ridiculous,’ ‘embarrassing’.

Non-collection of data is a source of bias.

What bias is behind the failure to collect troll data in the UK?

What are we allowed to say? [Criticism]

Saturday, September 24th, 2016

What are we allowed to say? by David Bromwich.

From the post:

Free speech is an aberration – it is best to begin by admitting that. In most societies throughout history and in all societies some of the time, censorship has been the means by which a ruling group or a visible majority cleanses the channels of communication to ensure that certain conventional practices will go on operating undisturbed. It is not only traditional cultures that see the point of taboos on speech and expressive action. Even in societies where faith in progress is part of a common creed, censorship is often taken to be a necessary means to effect improvements that will convey a better life to all. Violent threats like the fatwa on Salman Rushdie and violent acts like the assassinations at Charlie Hebdo remind us that a militant religion is a dangerous carrier of the demand for the purification of words and images. Meanwhile, since the fall of Soviet communism, liberal bureaucrats in the North Atlantic democracies have kept busy constructing speech codes and guidelines on civility to soften the impact of unpleasant ideas. Is there a connection between the two?

Probably an inbred trait of human nature renders the attraction of censorship perennial. Most people (the highly literate are among the worst) believe that what is good for them will be good for others. Besides, a regime of censorship must claim to derive its authority from settled knowledge and not opinion. Once enforcement and exclusion have done their work, this assumption becomes almost irresistible; and it is relied on to produce a fortunate and economical result: self-censorship. We stay out of trouble by gagging ourselves. Among the few motives that may strengthen the power of resistance is the consciousness of having been deeply wrong oneself, either regarding some abstract question or in personal or public life. Another motive of resistance occasionally pitches in: a radical, quasi-physical horror of seeing people coerce other people without having to supply reasons. For better or worse, this second motive is likely to be mixed with misanthropy.

As far back as one can trace the vicissitudes of public speech and its suppression, the case for censorship seems to have begun in the need for strictures against blasphemy. The introductory chapter of Blasphemy, by the great American legal scholar Leonard Levy, covers ‘the Jewish trial of Jesus’; it is followed in close succession, in Levy’s account, by the Christian invention of the concept of heresy and the persecution of the Socinian and Arminian heretics and later of the Ranters, Antinomians and early Quakers. After an uncertain interval of state prosecutions and compromises in the 19th century, Levy’s history closes at the threshold of a second Enlightenment in the mid-20th: the endorsement by the North Atlantic democracies of a regime of almost unrestricted freedom of speech and expression.
… (emphasis in original)

Bromwich’s essay runs some twenty pages in print so refresh your coffee before starting!

It is a “must” read but not without problems.

The focus on Charlie Hebdo and The Satanic Verses, gives readers a “safe context” in which to consider the issue of “free speech.”

The widespread censorship of “jihadist” speech, which for the most part passes unnoticed and without even a cursory node towards “free speech” is a more current and confrontational example.

Does Bromwich use safe examples to “stay out of trouble by gagging [himself]?”

Hundreds of thousands have been silenced by Western tech companies. Yet in an essay on freedom of speech, they don’t merit a single mention.

The failure to mention the largest current example of anti-freedom of speech in a freedom of speech essay, should disturb every attentive reader.

Disturb them to ask: What of freedom of speech today? Not as a dry and desiccated abstraction but freedom of speech in the streets.

Where is the freedom of speech to incite others to action? Freedom of speech to oppose corrupt governments? Freedom of speech to advocate harsh measures against criminal oppressors?

The invocation of Milton and Mill provides a groundwork for confrontation of government urged if not required censorship but the opportunity is wasted on the vagaries of academic politics.

Freedom of speech is important on college campuses but people are dying where freedom of speech is being denied. To showcase the former over the latter is a form of censorship itself.

If the question is censorship, as Milton and Mill would agree, the answer is no. (full stop)

PS: For those who raise the bugaboo of child pornography, there are laws against the sexual abuse of children, laws that raise no freedom of speech issues.

Possession of child pornography is attacked because it gives the appearance of meaningful action, while allowing the cash flow from its production and distribution to continue unimpeded.

Are You A Closet Book Burner? Google Crowdsources Censorship!

Friday, September 23rd, 2016

YouTube is cleaning up and it wants your help! by Lisa Vaas.

From the post:

Google is well aware that the hair-raising comments of YouTube users have turned the service into a fright fest.

It’s tried to drain the swamp. In February 2015, for example, it created a kid-safe app that would keep things like, oh, say, racist/anti-Semitic/homophobic comments or zombies from scaring the bejeezus out of young YouTubers.

Now, Google’s trying something new: it’s soliciting “YouTube Heroes” to don their mental hazmat suits and dive in to do some cleanup.

You work hard to make YouTube better for everyone… and like all heroes, you deserve a place to call home.

Google has renamed the firemen of Fahrenheit 451 to YouTube Heroes.

Positive names cannot change the fact that censors by any name, are in fact just that, censors.

Google has taken censorship to a new level in soliciting the participation of the close-minded, the intolerant, the bigoted, the fearful, etc., from across the reach of the Internet, to censor YouTube.

Google does own YouTube and if it wants to turn it into a pasty gray pot of safe gruel, it certainly can do so.

As censors flood into YouTube, free thinkers, explorers, users who prefer new ideas over pablum, need to flood out of YouTube.

Ad revenue needs to fall as this ill-advised campaign, “come be a YouTube censor” succeeds.

Only falling ad revenue will stop this foray into the folly of censorship by Google.

First steps:

  1. Don’t post videos to Google.
  2. Avoid watching videos on Google as much as possible.
  3. Urge other to not post/use YouTube.
  4. Post videos to other venues.
  5. Speak out against YouTube censorship.
  6. Urge YouTube authors to post/repost elsewhere

“Safe place” means a place safe from content control at the whim and caprice of governments, corporations and even other individuals.

What’s so hard to “get” about that?

Let’s Offend Mark Zuckerberg! Napalm-Girl – Please Repost Image

Friday, September 9th, 2016

Facebook deletes Norwegian PM’s post as ‘napalm girl’ row escalates by Alice Ross and Julia Carrie Wong.

napalm-girl-460

From the post:

Facebook has deleted a post by the Norwegian prime minister in an escalating row over the website’s decision to remove content featuring the Pulitzer-prize winning “napalm girl” photograph from the Vietnam war.

Erna Solberg, the Conservative prime minister, called on Facebook to “review its editing policy” after it deleted her post voicing support for a Norwegian newspaper that had fallen foul of the social media giant’s guidelines.

Solberg was one of a string of Norwegian politicians who shared the iconic image after Facebook deleted a post from Tom Egeland, a writer who had included the Nick Ut picture as one of seven photographs he said had “changed the history of warfare”.

I remember when I first saw that image during the Vietnam War. As if the suffering of the young girl wasn’t enough, the photo captures the seeming indifference of the soldiers in the background.

This photo certainly changes approach of the U.S. military to press coverage of wars. From TV cameras recording live footage of battles and the wounded in Vietnam, present day coverage is highly sanitized and “safe” for any viewing audience.

There are the obligatory shots of the aftermath of “terrorist” bombings but where is the live reporting on allied bombing of hospitals, weddings, schools and the like? Where are the shrieking wounded and death rattles?

Too much of that and American voters might get the idea that war has real consequences, for real people. Well, war always does but it the profit consequences that concern military leadership and their future employers. Can’t have military spending without a war and a supposed enemy.

Zuckerberg should not shield us and especially not children from the nasty side of war.

Sanitized and “safe” reporting of wars is a recipe for the continuation of the same.

Read more about the photo and the photographer who took it: Nick Ut’s Napalm Girl Helped End the Vietnam War. Today in L.A., He’s Still Shooting

You can’t really tell from the photo but the girl’s skin (Kim Phuc) was melting off in strips. That’s the reality of war that needs to be brought home to everyone who supports war to achieve abstract policy goals and objectives.

From Preaching to Meddling – Censors, I-94s, Usage of Social Media

Thursday, August 25th, 2016

Tony Romm has a highly amusing account of how internet censors, Google, Facebook and Twitter, despite their own censorship efforts, object to social media screening on I-94 (think international arrival and departure) forms.

Tony writes Tech slams Homeland Security on social media screening:

Internet giants including Google, Facebook and Twitter slammed the Obama administration on Monday for a proposal that would seek to weed out security threats by asking foreign visitors about their social media accounts.

The Department of Homeland Security for months has weighed whether to prompt foreign travelers arriving on visa waivers to disclose the social media websites they use — and their usernames for those accounts — as it seeks new ways to spot potential terrorist sympathizers. The government unveiled its draft plan this summer amid widespread criticism that authorities aren’t doing enough to monitor suspicious individuals for signs of radicalization, including the married couple who killed 14 people in December’s mass shooting in San Bernardino, Calif.

But leading tech companies said Monday that the proposal could “have a chilling effect on use of social media networks, online sharing and, ultimately, free speech online.”
….

Google, Facebook and Twitter casually censor hundreds of thousands of users every year so their sudden concern for free speech is puzzling.

Until you catch the line:

have a chilling effect on use of social media networks, online sharing

Translation: chilling effect on market share of social media, diminished advertising revenues and online sales.

The reaction of Google, Facebook and Twitter reminds me of the elderly woman in church who would shout “Amen!” when the preacher talked about the dangers of alcohol, “Amen!” when he spoke against smoking, “Amen! when he spoke of the shame of gambling, but was curiously silent when the preacher said that dipping snuff was also sinful.

After the service, as the parishioners left the church, the preacher stopped the woman to ask about her change in demeanor. The woman said, “Well, but you went from preaching to meddling.”

😉

Speaking against terrorism, silencing users by the hundred thousand, is no threat to the revenue streams of Google, Facebook and Twitter. Easy enough and they benefit from whatever credibility that buys with governments.

Disclosure of social media use, which could have some adverse impact on revenue, the government has gone from preaching to meddling.

The revenue stream impacts imagined by Google, Facebook and Twitter are just that, imagined. Its impact in fact is unknown. But fear of an adverse impact is so great that all three have swung into frantic action.

That’s a good measure of their commitment to free speech versus their revenue streams.

Having said all that, the Agency Information Collection Activities: Arrival and Departure Record (Forms I-94 and I-94W) and Electronic System for Travel Authorization is about as lame and ineffectual of an anti-terrorist proposal as I have seen since 9/11.

You can see the comments on the I-94 farce, which I started to collect but then didn’t.

I shouldn’t say this for free but here’s one insight into “radicalization:”

Use of social media to exchange “radical” messages is a symptom of “radicalization,” not its cause.

You can convince yourself of that fact.

Despite expensive efforts to stamp out child pornography (radical messages), sexual abuse of children (radicalization) continues. The consumption of child pornography doesn’t cause sexual abuse of children, rather it is consumed by sexual abusers of children. The market is driving the production of the pornography. No market, no pornography.

So why the focus on child pornography?

It’s visible (like social media), it’s easy to find (like tweets), it’s abhorrent (ditto for beheadings), and cheap (unlike uncovering real sexual abuse of children and/or actual terrorist activity).

The same factors explain the mis-guided and wholly ineffectual focus on terrorism and social media.

First Amendment Secondary? [Full Text – Response to Stay]

Monday, August 22nd, 2016

Backpage.com defies sex trafficking subpoena despite Senate contempt vote by David Kravets.

From the post:

The First Amendment has been good, really good to the online classified ads portal Backpage.com. In 2015, the US Constitution helped Backpage dodge a lawsuit from victims of sex trafficking. What’s more, a federal judge invoked the First Amendment and crucified an Illinois sheriff—who labeled Backpage a “sex trafficking industry profiteer”—because the sheriff coerced Visa and Mastercard to refrain from processing payments to the site. The judge said Cook County Sheriff Thomas Dart’s anti-Backpage lobbying amounted to “an informal extralegal prior restraint of speech” because Dart’s actions were threatening the site’s financial survival.

But the legal troubles didn’t end there for Backpage, which The New York Times had labeled “the leading site for trafficking of women and girls in the United States.”

Kravets does a great job of linking to the primary documents in this case and while quoting from the government’s response to the request for a stay, does not include a link for the government’s response.

For your research and reading convenience, RESPONSE IN OPPOSITION [1631269] filed by Senate Permanent Subcommittee on Investigations to motion to stay case. A total of 128 pages.

In that consolidated document, Schedule A of the subpoena runs from page 40 to page 50, although the government contends in its opposition that it tried to be more reasonable that it appears.

Even more disturbing than the Senate’s fishing expedition into the records of Backpage is the justification for disregarding the First Amendment:

The Subcommittee is investigating the serious problem of human trafficking on the Internet—much of which takes place on Backpage’s website—and has subpoenaed Mr. Ferrer for documents relating to Backpage’s screening for illegal trafficking. It is important for the Subcommittee’s investigation of Internet sex trafficking to understand what methods the leading online marketplace for sex advertisements employs to screen out illegal sex trafficking on its website. Mr. Ferrer has no First Amendment right to ignore a subpoena for documents about Backpage’s business practices related to that topic. He has refused to identify his First Amendment interests except in sweeping generalities and failed even to attempt to show that any such interests outweigh important governmental interests served by the Subcommittee’s investigation. Indeed, Mr. Ferrer cannot make any balancing argument because he refused to search for responsive documents or produce a privilege log describing them, claiming that the First Amendment gave him blanket immunity from having to carry out these basic duties of all subpoena respondents.

As serious a problem as human trafficking surely is, there are no exceptions to the First Amendment because a crime is a serious one. Just as there are no exceptions to the Fourth or Fifth Amendments because a crime is a serious one.

If you are interested in the “evidence” cited against Backpage, S. Hrg. 114–179 Human Trafficking Investigation (November 2015), runs some 260 pages, details the commission of illegal human trafficking by others, not Backpage.

Illegal sex traffic undoubtedly occurs in the personal ads of the New York Times (NYT) but the Senate hasn’t favored the NYT with such a subpoena.

Kravets reports Backpage is due to respond to the government by 4:00 p.m. Wednesday of this week. I will post a copy of that response as soon as it is available.

235,000 Voices Cried Out And Were Suddenly Silenced

Saturday, August 20th, 2016

Yahoo! News carried this report of censorship: Twitter axes 235,000 more accounts in terror crackdown.

From the post:

Twitter on Thursday announced that it has cut off 235,000 more accounts for violating its policies regarding promotion of terrorism at the global one-to-many messaging service.

The latest account suspensions raised to 360,000 the total number of accounts sidelined since the middle of 2015 and was helping “drive meaningful results” in curbing the activity, according to the San Francisco-based company.

Twitter has been under pressure to balance protecting free speech at the service with not providing a stage for terrorist groups to spread violent messages and enlist people to their causes.

The latest account suspensions came since February, when Twitter announced that it had neutralized 125,000 accounts for violating rules against violent threats and promotion of terrorism.

“Since that announcement, the world has witnessed a further wave of deadly, abhorrent terror attacks across the globe,” Twitter said in a blog post.

When you read Twitter’s blog post, An update on our efforts to combat violent extremism, out of 235,000 accounts, how many are directly tied to a terrorist attack?

Would you guess:


235,000?

150,000?

100,000?

50,000?

25,000?

10,000?

5,000?

Twitter reports 0 accounts as being tied to terrorist attacks.

Odd considering that Twitter says:

Since that announcement, the world has witnessed a further wave of deadly, abhorrent terror attacks across the globe

“…wave of deadly, abhorrent terror attacks…” What wave?

From March of 2016 until July 31, the List of terrorist incidents, 2016 lists some 864 attacks.

A far cry from the almost 1/4 million silenced accounts.

Of course, “terrorism” depends on your definition, the Global Terrorism Database lists over 6,000 terrorist attacks for the time period March 2015 until July 31, 2015.

Even using 2015’s 6,000 attack figure, that’s a long way from 235,000 Twitter accounts.

If you think “…wave of deadly, abhorrent terror attacks…” is just marketing talk on the part of Twitter, the evidence is on your side.

Anyone who thinks they may be in danger of being silenced by Twitter should obtain regular archives of their tweets. Don’t allow your history to be stolen by Twitter.

I do have a question for anyone working on this issue:

Are there efforts to create a non-Twitter servers that make fair use of the Twitter API, so that archives of tweets and/or even new accounts, could continue silenced accounts? Say a Dark Web Not-Twitter Server?

I ask because Twitter continues to demonstrate that “free speech” is subject to its whim and caprice.

A robust and compatible alternative to Twitter, especially if archives can be loaded, would enable free speech for many diverse groups.

Another Data Point On Twitter Censorship Practices

Sunday, August 14th, 2016

twitter-censor-olympics-460

Alert! Non-Lobbyists Have Personal Contact For Members Of Congress!

Sunday, August 14th, 2016

Hacker posts contact information for almost 200 congressional Democrats

Summary: Guccifer 2.0 posted a spreadsheet with the personal contact details of almost 200 Democratic members of Congress.

Sorry, I don’t see why non-lobbyists having personal contact information of members of Congress is a bad thing?

The very thought of non-lobbyists contacting members of Congress provoked frantic activity at WordPress, which promptly disabled Guccifer 2.0 page because of:

receipt of a valid complaint regarding the publication of private information, (WordPress blocks latest Guccifer 2.0 docs

The WordPress model of democracy looks something like this:

wordpress-democracy

I’m not vouching for the donation amounts and/or the amount of access you get for those amounts. It varies from congressional district to district.

Check with your local representative for current prices and access.

If and when you meet with your representative, be sure to ask for their new cellphone number.

Twitter Too Busy With Censorship To Care About Abuse

Saturday, August 13th, 2016

Complaints about Twitter ignoring cases of abuse are quite common, “A Honeypot For Assholes” [How To Monetize Assholes/Abuse]. I may have stumbled on why Twitter “ignores” abuse cases.

Twitter staff aren’t “ignoring” abuse cases, they are too damned busy being ad hoc government censors to handle abuse cases.

Consider: How Israel is trying to enforce gag orders beyond its borders by Michael Schaeffer Omer-Man.

From the post:

Israeli authorities are taking steps to block their own citizens from reading materials published online in other countries, including the United States.

The Israeli State Attorney’s Office Cyber Division has sent numerous take-down requests to Twitter and other media platforms in recent months, demanding that they remove certain content, or block Israeli users from viewing it.

In an email viewed by +972, dated August 2, 2016, Twitter’s legal department notified American blogger Richard Silverstein that the Israeli State Attorney claimed a tweet of his violates Israeli law. The tweet in question had been published 76 days earlier, on May 18. Silverstein has in the past broken stories that Israeli journalists have been unable to report due to gag orders, including the Anat Kamm case.

Without demanding that he take any specific action, Twitter asked Silverstein to let its lawyers know, “if you decide to voluntarily remove the content.” The American blogger, who says he has not stepped foot in any Israeli jurisdiction for two decades, refused, noting that he is not bound by Israeli law. Twitter is based in California.

Two days later, Twitter sent Silverstein a follow-up email, informing him that it was now blocking Israeli users from viewing the tweet in question. Or in Twitter-talk, “In accordance with applicable law and our policies, Twitter is now withholding the following Tweet(s) in Israel.”

It’s no wonder Twitter lacks the time and resources to think of robust solutions that enable free speech and at the same time, protects users who aren’t interested in listening to the free speech of certain others.

Both rights are equally important but Twitter has its hands full responding in an ad hoc fashion to unreasonable demands.

Adopt a policy of delivering any content, anywhere, from any author and empower users to choose what they see.

The seething ball of lawyers, which add no value for Twitter or its users, will suddenly melt away.

No issues to debate.

Governments block content on their own or they don’t.

Users block content on their own or they don’t.

BTW, 972mag.com needs your financial support to keep up this type of reporting. If you are having a good month, keep them in mind.

Twitter Censor Strikes Again (and again, and again)

Saturday, August 13th, 2016

Twitter censors accounts for reasons known only to itself, but in the case, truth telling is one obvious trigger for Twitter censorship:

twitter-censors-again-460

Twitter censors accounts every day that don’t make the news and those are just as serious violations of free speech as this instance.

Twitter could trivially empower users to have free speech and the equally important right to not listen but also for reasons known only to Twitter, has chosen not to do so.

Free speech and the right to not listen are equally important.

What’s so difficult to understand about that?

Twitter Censorship On Behalf Of Turkish Government

Wednesday, August 10th, 2016

twitter-turkey-censor-460

The link Post Coup Censorship takes you to a list of twenty-three (23) journalist/publicist accounts verified as withheld by Twitter in Turkey.

I have tweeted to Efe Kerem Sözeri about this issue and was advised the censorship is based on IP addresses. Sözeri points out that use of a VPN is one easy means of avoiding the censorship.

Hopefully that was productive than a rant about Twitter’s toadyism and self-anointed role to prevent abuse (as opposed to empowering Twitter users to avoid abuse on their own).

Twitter Nanny Says No! No!

Thursday, July 21st, 2016

twitter-nanny-460

For the other side of this story, enjoy Milo Yiannopoulos’s Twitter ban, explained by Aja Romano, where Aja is supportive of Twitter and its self-anointed role as arbiter of social values.

From my point of view, the facts are fairly simple:

Milo Yiannopoulos (formerly @Nero) has been banned from Twitter on the basis of his speech and the speech of others who agree with him.

What more needs to be said?

I have not followed, read, reposted or retweeted any tweets by Milo Yiannopoulos (formerly @Nero). And would not even if someone sent them to me.

I choose to not read that sort of material and so can anyone else. Including the people who complain in Aja’s post.

The Twitter Nanny becomes censor in insisting that no one be able to read tweets from Milo Yiannopoulos (formerly @Nero).

I’ve heard the argument that the First Amendment doesn’t apply to Twitter, which is true, but irrelevant. Only one country in the world has the First Amendment as stated in the US Constitution but that doesn’t stop critics from decrying censorship by other governments.

Or is it only censorship if you agree with the speech being suppressed?

Censorship of speech that I find disturbing, sexist, racist, misogynistic, dehumanizing, transphobic, homophobic, supporting terrorism, is still censorship.

And it is still wrong.

We only have ourselves to blame for empowering Twitter to act as a social media censor. Central point of failure and all that jazz.

Suggestions on a free speech alternative to Twitter?

Buffoons A Threat To Cartoonists?

Wednesday, June 29th, 2016

How social media has changed the landscape for editorial cartooning by Ann Telnaes.

At the center of the social media outrage that Ann describes was her cartoon:

ted-cruz-cartoon-460

I did not see the original Washington Post political attack ad featuring Cruz and his daughters, but the use of family as props is traditional American politics. I took Ann’s cartoon as criticism of that practice in general and Cruz’s use of it in particular.

Even more of a tradition in American politics, is the intellectually and morally dishonest failure to engage the issue at hand. Rather than responding to the criticism of his exploitation of his own children, Cruz attacked Ann as though she was the one at fault.

That should not have been unexpected, given Cruz’s party is responsible for the “Checkers” speech and other notable acts of national deception. (If you don’t know the “Checkers” speech, check it out. TV was just becoming a player in national politics, much like social media now.)

As you can tell, I think the response by Cruz and others was a deliberate distortion of the original cartoon and certainly the abuse heaped upon Ann was unjustified, but what I am missing is the threat posed by “social media lynch mobs?”

What if every buffoon on Fox, social media, etc., all took to social media to criticize Ann’s cartoon?

Certainly a waste of electricity and data packets, but so what? They are theirs to waste.

Ann’s fellow cartoonists recognized the absurdity of the criticism, as would any rational person familiar with American politics.

Ann suggests:


How should the journalism community protect cartoonists so they can do their jobs? We need to educate and be ready the next time a cartoonist aims his or her satire against a thin-skinned politician or interest group looking for an opportunity to manipulate fair criticism. Be aware when a false narrative is being presented to deflect the actual intent of a cartoon; talk to your editors and come up with a plan to counter the misinformation.

Sorry, what other than “false narratives” were you expecting? Shouldn’t we make that assumption at the outset and prepare to press forward with the “true narrative?”

Ann almost captures my approach when she says:

It has been said cartoonists are on the front lines of the war to defend free speech.

The war to defend free speech is quite real. If you doubt that, browse the pages of Index on Censorship.

Where I differ from Ann is that I don’t see the braying of every buffoon social media has to offer as a threat to free speech.

Better filters are the answer to buffoons on social media.

Mapping Media Freedom

Tuesday, June 14th, 2016

Mapping Media Freedom

From the webpage:

Journalists and media workers are confronting relentless pressure simply for doing their job. Mapping Media Freedom identifies threats, violations and limitations faced by members of the press throughout European Union member states, candidates for entry and neighbouring countries.

My American readers should not be mis-led by the current map image:

media-map-2-cropped-460

If it is true the United States is free from press suppression, something I seriously doubt, it won’t be long before it starts to rack up incidents on this site.

Just today, Newt Gingrich, a truly unpleasant waste of human skin, proposed re-igniting the witch hunt committees of the 1950’s. Newt Gingrich Suggests Reforming House Un-American Committee In Wake Of Orlando Shooting.

The so-called “presumptive” candidates for President, Clinton and Trump, have called for tech companies to aid in the suppression of jihadist content and even the closing off of parts of the internet.

At least once a week, visit the Mapping Media Freedom and do what you can to support the media everywhere.

More Censorship Is Coming – To The USA

Tuesday, June 14th, 2016

Hillary Clinton says tech companies need to ‘step up’ fight against ISIS propaganda by Amar Toor.

From the post:

Hillary Clinton said this week that if elected president, she would work with major technology companies to “step up” counter-terrorism efforts, including surveillance of social media and campaigns to combat jihadist propaganda online. As Reuters reports, the presumptive Democratic presidential nominee made the comments in a speech in Cleveland Monday, one day after a gunman killed 49 people and left 53 wounded at a gay nightclub in Orlando.

Clinton did not provide details on how she would work with tech companies, though her comments add to the ongoing debate over privacy and national security, which has intensified following recent terrorist attacks in both the US and Europe. In her speech, the former secretary of state called for an “intelligence surge,” saying that security agencies “need better intelligence to discover and disrupt terrorist plots before they can be carried out.” She also called on the government and tech companies to “use all our capabilities to counter jihadist propaganda online.”

“As president, I will work with our great tech companies from Silicon Valley to Boston to step up our game,” Clinton said. “We have to [do] a better job intercepting ISIS’ communications, tracking and analyzing social media posts and mapping jihadist networks, as well as promoting credible voices who can provide alternatives to radicalization.”

What does it mean to “counter jihadist propaganda online?”

Does it include factual reports about the aims of jihadists and the abuses they seek to correct?

For example, the Declaration of Independence was once considered “propaganda.”

Does it include factual reports of terrorist bombings by coalition forces on jihadists positions?

Question: Who do you root for in the Star Wars movies, the tiny band of rebels or the empire?

Does it include calling on young people to actively resist corrupt and oppressive governments?

Let’s see…

Even anarchy itself, that bugbear held up by the tools of power (though truly to be deprecated) is infinitely less dangerous to mankind than arbitrary government. Anarchy can be but of short duration; for when men are at liberty to pursue that course which is most conducive to their own happiness, they will soon come into it, and for the rudest state of nature, order and good government must soon arise. But tyranny, when once established, entails its curse on a nation to the latest period of time; unless some daring genius, inspired by Heaven, shall unappalled by danger, bravely form and execute the arduous design of restoring liberty and life to his enslaved, murdered country.” [AN ORATION DELIVERED MARCH 6, 1775, AT THE… Joseph Warren (1741-1775) Boston: Printed by Messieurs Edes and Gill, and by J. Greenleaf, 1775 E297 W54, Fighting Words, a collection at Utah State University.]

Updated to use modern language, would that qualify?

As I remember the First Amendment, all of those qualify as protected free speech.

Clinton and her separated-at-birth twin, Donald Trump, can try to impose censorship on the legitimate speech of jihadists.

Let’s all lend the jihadists a hand and repeat their legitimate speech on a regular basis.

I for one would like to hear what the jihadists have to say for themselves.

Wouldn’t you?

How Do I Become A Censor?

Monday, June 13th, 2016

You read about censorship or efforts at censorship on a daily basis.

But none of those reports answers the burning question of the social media age: How Do I Become A Censor?

I mean, what’s the use of reading about other people censoring your speech if you aren’t free to censor theirs? Where the fun in that?

Andrew Golis has an answer for you in: Comments are usually garbage. We’re adding comments to This.!.

Three steps to becoming a censor:

  1. Build a social media site that accepts comments
  2. Declare a highly subjective ass-hat rules
  3. Censor user comments

There being no third-party arbiters, you are now a censor! Feel the power surging through your fingers. Crush dangerous thoughts, memes or content with a single return. The safety and sanity of your users is now your responsibility.

Heady stuff. Yes?

If you think this is parody, check out the This. Community Guidelines for yourself:


With that in mind, This. is absolutely not a place for:

Violations of law. While this is expanded upon below, it should be clear that we will not tolerate any violations of law when using our site.

Hate speech, malicious speech, or material that’s harmful to marginalized groups. Overtly discriminating against an individual belonging to a minority group on the basis of race, ethnicity, national origin, religion, sex, gender, sexual orientation, age, disability status, or medical condition won’t be tolerated on the site. This holds true whether it’s in the form of a link you post, a comment you make in a conversation, a username or display name you create (no epithets or slurs), or an account you run.

Harassment; incitements to violence; or threats of mental, emotional, cyber, or physical harm to other members. There’s a line between civil disagreement and harassment. You cross that line by bullying, attacking, or posing a credible threat to members of the site. This happens when you go beyond criticism of their words or ideas and instead attack who they are. If you’ve got a vendetta against a certain member, do not police and criticize that member’s every move, post, or comment on a conversation. Absolutely don’t take this a step further and organize or encourage violence against this person, whether through doxxing, obtaining dirt, or spreading that person’s private information.

Violations of privacy. Respect the sanctity of our members’ personal information. Don’t con them – or the infrastructure of our site – to obtain, post, or disseminate any information that could threaten or harm our members. This includes, but isn’t limited to, credit card or debit card numbers; social or national security numbers; home addresses; personal, non-public email addresses or phone numbers; sexts; or any other identifying information that isn’t already publicly displayed with that person’s knowledge.

Sexually-explicit, NSFW, obscene, vulgar, or pornographic content. We’d like for This. to be a site that someone can comfortably scroll through in a public space – say a cafe, or library. We’re not a place for sexually-explicit or pornographic posts, comments, accounts, usernames, or display names. The internet is rife with spaces for you to find people who might share your passion for a certain Pornhub video, but This. isn’t the place to do that. When it comes to nudity, what we do allow on our site is informative or newsworthy – so, for example, if you’re sharing this article on Cameroon’s breast ironing tradition, that’s fair game. Or a good news or feature article about Debbie Does Dallas. But, artful as it may be, we won’t allow actual footage of Debbie Does Dallas on the site. (We understand that some spaces on the internet are shitty at judging what is and isn’t obscene when it comes to nudity, so if you think we’ve pulled your post off the site because we’re a bunch of unreasonable prudes, we’ll be happy to engage.)

Excessively violent content. Gore, mutilation, bestiality, necrophilia? No thanks! There’s a distinction between a potentially upsetting image that’s worth consuming (think of some of the best war photography) and something you’d find in a snuff film. It’s not always an easy distinction to make – real life is pretty brutal, and some of the images we probably need to see are the hardest to stomach – but we also don’t want to create an overwhelmingly negative experience for anyone who visits the site and happens to stumble upon a painful image.

Promotion of self-harm, eating disorders, alcohol or drug abuse, or similar forms of destructive behavior. The internet is, sadly, also rife with spaces where people get off on encouraging others to hurt themselves. If you’d like to do that, get off our site and certainly seek help.

Username squatting. Dovetailing with that, we reserve the right to take back a username that is not being actively used and give it to someone else who’d like it it – especially if it’s, say, an esteemed publication, organization, or person. We’re also firmly against attempts to buy or sell stuff in exchange for usernames.

Use of the This. brand, trademark, or logo without consent. You also cannot use the This. name or anything associated with the brand without our consent – unless, of course, it’s a news item. That means no creating accounts, usernames, or display names that use our brand.

Spam. Populating the site with spammy accounts is antithetical to our mission – being the place to find the absolute best in media. If you’ve created accounts that are transparently selling, say, “installation help for Macbooks” or some other suspicious form tech support, or advertising your “viral video” about Justin Bieber that’s got a suspiciously low number of views, you don’t belong on our site. That contradicts why we exist as a platform – to give members a noise-free experience they can’t find elsewhere on the web.

Impersonation of others. Dovetailing with that – though we’d all like to be The New York Times or Diana Ross, don’t pretend to be them. Don’t create an identity on the site in the likeness of a company or person who isn’t you. If you decide, for some reason, to create a parody account of a public figure or organization – though we can think of better sites to do that on, frankly – make sure you make that as clear as possible in your display name, avatar, and bio.

Infringement of copyright or intellectual property rights. Don’t post copyrighted works without the permission of its original owner or creator. This extends, for example, to copying and pasting a copyrighted set of words into a comment and passing it off as your own without credit. If you think someone has unlawfully violated your own copyright, please follow the DMCA procedures set forth in our Terms of Service.

Mass or automated registration and following. We’ve worked hard to build the site’s infrastructure. If you manipulate that in any way to game your follow count or register multiple spam accounts, we’ll have to terminate your account.

Exploits, phishing, resource abuse, or fraudulent content. Do not scam our members into giving you money, or mislead our members through misrepresenting a link to, say, a virus.

Exploitation of minors. Do not post any material regarding minors that’s sexually explicit, violent, or harmful to their safety. Don’t solicit or request their private or personally identifiable information. Leave them alone.

So how do we take punitive action against anyone who violates these? Depends on the severity of the offense. If you’re a member with a good track record who seems to have slipped up, we’ll shoot you an email telling you why your content was removed. If you’ve shared, written, or done something flagrantly and recklessly violating one of these rules, we’ll ban you from the site through deleting your account and all that’s associated with it. And if we feel it’s necessary or otherwise believe it is required, we will work with law enforcement to handle any risk to one of our members, the This. community in general, or to public safety.

To put it plainly – if you’re an asshole, we’ll kick you off the site.

Let’s make that a little more concrete.

I want to say: “Former Vice-President Dick Cheney should be tortured for a minimum of thirty (30) years and be kept alive for that purpose, as a penalty for his war crimes.”

I can’t say that on This. because:

  • “incitement to violence” If torture is ok, then so it other violence.
  • “harmful to marginalized group” If you think of sociopaths as a marginalized group.
  • “harassment” Cheney is a victim too. He didn’t start life as a moral leper.
  • “excessively violence content” Assume I illustrate the torture Cheney should suffer.

Rules broken vary by the specific content of my speech.

Remind me to pass this advice along to: Jonathan “I Want To Be A Twitter Censor” Weisman. All he needs to do is build a competitor to Twitter and he can censor to his heart’s delight.

The build your own platform isn’t just my opinion. This. confirms my advice:

If you don’t like these rules, feel free to create your own platform! There are a lot of awesome, simple ways to do that. That’s what’s so lovely about the internet.

Art and the Law: [UK Focused]

Sunday, June 12th, 2016

Art and the Law: Guides to the legal framework and its impact on artistic freedom of expression by Jodie Ginsberg, chief executive, Index on Censorship.

From the post:

Freedom of expression is essential to the arts. But the laws and practices that protect and nurture free expression are often poorly understood both by practitioners and by those enforcing the law.

As part of Index on Censorship’s work on art and offence, Index has published a series of law packs intended to address questions about legal limits related to free expression and the arts.

We intend them as “living” documents, to be enhanced and developed in partnership with arts groups so that artistic freedom is nurtured and nourished.

This work builds on an earlier study by Index on Censorship, Taking the Offensive, which showed how self-censorship manifests itself in arts organisations and institutions.

Descriptions of:

Child Protection: PDF | web

Counter Terrorism: PDF | web

Obscene Publications: PDF | web

Public Order: PDF | web

Race and Religion: PDF | web

along with numerous other resources appear on this page.

Realize these are UK specific and the laws on such matters vary widely. That’s not a criticism but an observation for the safety of readers. Check your local laws with qualified legal advisers.

Unlike Jonathan “I Want To Be A Twitter Censor” Weisman, my advice for when you find offensive content, is to look away.

What other people choose to create, publish, perform, listen to, view, read, etc., is their business and certainly none of yours.

Criminal acts against other people, children in particular, are already unlawful and censorship isn’t required outlaw them.

Jonathan Weisman: Don’t Let The Door Hit You

Saturday, June 11th, 2016

Jonathan Weisman has decided to leave Twitter for reasons he sets forth (at length) at: Why I Quit Twitter — and Left Behind 35,000 Followers.

The essence of his complaint: Twitter failed to censor the speech of other Twitter users.

I offer no defense for the offensive and crude tweets Weisman received via Twitter.

However, as the The Times’s deputy Washington editor, Weisman had the resources to filter his Twitter stream to remove such posts on his own.

But avoiding the offensive tweets wasn’t his goal.

Weisman’s goal is to silence others and to enlist Twitter in that task.

I have to agree that Twitter’s use of its “terms of service” is arbitrary and capricious, not to mention lacking transparency, but that’s all the more reason to discard content rules from “terms of service,” not make them more onerous.

Weisman’s parting shot is to describe Twitter as a “…cesspoll of hate….”

Humanity has a number of such cesspools as well as large swaths of people who fall somewhere between there and sainthood. No reason to expect social media that reflects society to be any different.

Jonathan Weisman leaving Twitter is the loss of another advocate for censorship and there can never be too few of those.

PS: The New York Times needs to seriously think about why it employs a censorship advocate as its deputy Washington Editor.

#NoTROHere – Defending Free Speech and MuckRock

Thursday, June 2nd, 2016

Court grants Temporary Restraining Order forcing removal of MuckRock documents by Michael Morisy.

From the post:

A King County, Washington court has ordered MuckRock to un-publish documents that the City of Seattle released to one of our users, Phil Mocek, via a public records request concerning private contractors who bid on the city’s smart utility meter program.

Although MuckRock has complied with the order, we disagree with the court’s decision and are confident that ultimately we will vindicate our right to publish the documents that Mr. Mocek lawfully obtained.

I don’t see my name or yours on the TRO or any of the other documents.

To enable you (and me) to compare the original documents to both the redacted copies and the highly amusing affidavits filed in support of the facially flawed TRO, find the following:

Landis-Gyr-Managed-Services-Report-2015-Final.pdf

Req-9-Security-Overview.pdf

Disclaimer: I did NOT obtain these documents from MuckRock or anyone known to me to be associated with MuckRock or named in any of the pleadings referenced above. (Just to forestall any groundless accusations of contempt, etc.)

Request: In the unlikely event that someone serves me with a TRO, please repost the documents on your blogs, discussion lists, twitter feeds, etc.

If Landis+Gyr wants to violate the U.S. Constitution and state constitutions in every county/parish (Louisiana) in the United States, let’s give them that opportunity. #NoTROHere

Before I forget, all the legal documents are here, including the affidavits.

PS: I know I am violating the advice I gave in Avoiding Imperial (Computer Fraud and Abuse Act (CFAA)) Entanglement – Identification but:

  • I never claimed to be perfectly consistent, and
  • The public is the ultimate arbiter of the conduct of its government. Concealment of information by government serves only to breed mistrust and a lack of confidence in outcomes.

Look for my analysis of the public documents vs. the affidavits next Monday, 6 June 2016.

Four Horsemen Of Internet Censorship + One

Wednesday, June 1st, 2016

Facebook, Twitter, YouTube, Microsoft back EU hate speech rules by Julia Fioretti and Foo Yun Chee.

From the post:

Facebook (FB.O), Twitter (TWTR.N), Google’s (GOOGL.O) YouTube and Microsoft (MSFT.O) on Tuesday agreed to an EU code of conduct to tackle online hate speech within 24 hours in Europe.

EU governments have been trying in recent months to get social platforms to crack down on rising online racism following the refugee crisis and terror attacks, with some even threatening action against the companies.

As part of the pledge agreed with the European Commission, the web giants will review the majority of valid requests for removal of illegal hate speech in less than 24 hours and remove or disable access to the content if necessary.

They will also strengthen their cooperation with civil society organizations who help flag hateful content when it goes online and promote “counter-narratives” to hate speech.

(original story dated 31 May 2016)

Reading the four horsemen of internet censorship, Facebook, Twitter, YouTube and Microsoft had joined with the EU to further censorship of the internet, I did try for due diligence.

I was able to find the original press release: European Commission and IT Companies announce Code of Conduct on illegal online hate speech

Along with the CODE OF CONDUCT ON COUNTERING ILLEGAL HATE SPEECH ONLINE, to take away some of the hand-waving about what is to be censored.

Not to mention the Framework Decision on combating certain forms and expressions of racism and xenophobia by means of criminal law.

None of the co-conspirators in this league of censors seems to recall there are alternatives to affirmative censorship by the four horsemen of internet censorship plus the EU.

Consider this image from 1999 (assuming 3 months = 1 internet year, that’s 68 years ago in internet time):

pics-460

That image appeared in Paul Resnick’s PICS, Censorship, & Intellectual Freedom FAQ. For a variety of reasons, PICS failed, but the principle of filtering by the user, remains sound.

The major obstacle to PICS was the lack of labeling of content by content providers, who quite naturally don’t want any obstruction to the content they seek to deliver.

It’s reasonable to assume that would be the same today. Except that we don’t need to rely on content providers to label content in order to filter it.

You may have heard about the rapid advances in neural networks and deep learning. I suspect the four horsemen of internet censorship have but haven’t considered their use for user-side filtering of content.

Perhaps I’m deeply offended by some variation on “hate speech” (a euphemism for “speech I don’t like”) plus insults about Erdogan.

I rather doubt, at least at present, the four horsemen of internet censorship are going to protect me from the combination.

Or conjure up your own combination of speech from which you desire protection.

The sensible alternative to censorship is to empower users, not the four horsemen, not the EU nor anyone else, to filter their own content.

Let’s keep free speech and empower users, not the four horsemen of internet censorship in their bid to curry favor with the EU.

PS: The EU is always attempting to grow a cottage IT industry, creating adaptive deep learning censors for users is an open market for users who fear content.

Help Defend MuckRock And Your Right To Know!

Wednesday, May 25th, 2016

A multinational demands to know who reads MuckRock and is suing to stop us from posting records about them by Michael Morisy.

Michael captures everything you need to know in his first paragraph:

A multinational owned by Toshiba is demanding MuckRock remove documents about them received under a public records act request, destroy any copies we have, and help identify MuckRock readers who saw them.

After skimming the petition and the two posted documents (Landis+Gyr Managed Services Report 2015 Final and Req 9_Security Overview), I feel like the man who remarked to George Bailey in It’s A Wonderful Life, “…you must mean two other trees,” taking George for being drunk. 😉

As far as I can tell, the posted documents contain no pricing information, no contact details, etc.

Do you disagree?

There are judges who insist that pleadings have some relationship to facts. Let’s hope that MuckRock draws one of those.

Do you wonder what other local governments are involved with Landis+Gyr?

There is a simple starting point: Landis+Gyr.

Breaking News: Europe != World

Monday, May 23rd, 2016

Google’s appeal, described in GNI welcomes appeal to the global reach of “the right to be forgotten” by Ryan McChrystal, puts all of Europe on notice, despite centuries of Euro-centric education, publication, history writing and institutions:

Europe != World

From the post:

The Global Network Initiative welcomes the announcement that Google is appealing a French data protection authority ruling requiring the global take down of links to search information banned in France under Europe’s “right to be forgotten”.

We are concerned that the ruling, made by Commission Nationale de L’Informatique et des Libertes (CNIL) in March, sets a disturbing precedent for the cause of an open and free Internet, and sends the message to other countries that they can force the banning of search results not just inside their own jurisdictions, but assert that jurisdiction across the globe.

Google began delisting search content in response to the Costeja ruling in July of 2014. Search links that are delisted in response to French citizens’ requests are removed from the local French domain (google.fr) as well as all of Europe. In early 2016 the company announced that it would further restrict access to links delisted in Europe by using geolocation technology to restrict access to the content on any Google Search domain when an individual searches from France. Despite this, the French authorities continue to demand global removal of these links from all Google search domains – regardless of from where in the world they are accessed.

“We are concerned about the impact of the CNIL order, which effectively allows the government of one country to dictate what the rest of the world is allowed to access online,” said GNI Board Chair Mark Stephens, CBE. “Enshrined in international law is the principle that one country cannot infringe upon the rights of citizens of another country,” he said.

Make no mistake, I am utterly a child of the West/Europe but all the more reason to resist its cultural and legal imperialism.

Differences in cultures, languages, legal systems, whether current or historical, enrich the human experience.

Censoring expression and in the “right to be forgotten” case, censoring history, or rather attempts to discover history, impoverishes it.

The “right to be forgotten” is ample evidence that Europeans need productive leisure pursuits.

Non-Europeans should suggest hobbies, sports, or activities to distract Europeans from search engine results and towards more creative activities.

Terrorism and Internet Censorship

Monday, May 23rd, 2016

Bold stance: Microsoft says terrorism is bad by Shaun Nichols.

From the post:

Microsoft is enacting a new policy to remove terrorist content from its consumer services.

The Redmond software giant said that the new terms and conditions for its hosted services will bar any content containing graphic violence or supporting material for any group considered a terrorist organization by the United Nations Sanctions List.

Additionally, Microsoft says that it will remove terrorist-related content from its Bing search engine whenever requested by government agencies and will try to display links promoting anti-terror non-government organizations when returning queries for terrorism-related search results.

Censorship on the Internet and sadly support for the same grows every week.

From the Microsoft announcement:


We believe it’s important that we ground our approach to this critical issue in central principles and values. We have a responsibility to run our various Internet services so that they are a tool to empower people, not to contribute, however indirectly, to terrible acts. We also have a responsibility to run our services in a way that respects timeless values such as privacy, freedom of expression and the right to access information. We’ve therefore carefully considered how to address terrorist content that may appear on our services without sacrificing the fundamental rights we all hold dear. Although Microsoft does not run any of the leading social networks or video-sharing sites, from time to time, terrorist content may be posted to or shared on our Microsoft-hosted consumer services. In light of this, we want to be transparent about our approach to combatting terrorist content.

I have doubts about the statement:

We’ve therefore carefully considered how to address terrorist content that may appear on our services without sacrificing the fundamental rights we all hold dear.

If they had, “…carefully considered…,” the question they would not engage in censorship at all.

If you disagree, consider the United Nations Sanctions List, circa 1939:

CNi.001 Name: 1: Mao Zedong 2: Mao 3: na 4: na Name (original script) 毛泽东 Nationality: Chinese Passport no: na National Identification: na Address: China Listed on: January 1, 1927 Other information: Created the Southwest Jiangxi Provincial Soviet Government. Skilled in-fighter with many internal rivals.

CNe.001 Name: Southwest Jiangxi Provincial Soviet Government
Address: na Listed on: June 1, 1930 Other Information: na

Or the United Nations Sanctions List, circa 1800:

UKe.001 Name: Continental Congress 2: na 3: na 4: na
Address: British colonies, America Listed on: January 1, 1776 Other Information: Criminal association of traitors, former British military officers and opportunists.

UKi.001 Name: George Washington 2: na 3: na 4: na DOB: February 22, 1732 Nationality: UK Address: Virginia Listed on: January 1, 1775 Other information: Former colonel in British Army, skilled tactician, co-conspirator with other known traitors.

UKi.002 Name: Thomas Jefferson 2: “Tom” Jefferson 3: na 4: na DOB: April 13, 1743 Nationality: UK Address: Virginia Listed on: January 1, 1775 Other information: Propagandist of first order.

UKi.003 Name: Thomas Paine 2: “Tom” Paine 3: Thomas Pain 4: na DOB: January 29, 1737 Nationality: UK Address: various Listed on: January, 1774 Other information: Known associate of revolutionaries in American colonies of the UK, collaborator with French revolutionaries (1790’s), author of “Common Sense” and wanted for conviction on seditious libel (1792).

The question for Microsoft today is which of the publications and news reports from the revolution in China and/or the American Revolutionary War would they censor as supporting terrorists and/or terrorism?

With even a modicum of honesty, all will concede that acts of terrorism were committed both in China and in what is today known as the United States.

Unless you would censor Mao Zedong, George Washington, Thomas Jefferson, Thomas Paine, then “terrorist” and “terrorism” offer no basis for censoring content.

In truth, “terrorist,” and “terrorism,” are labels for atrocities committed by others, nothing more.

Strive for a free and non-censored Internet.

Let history judge who was or wasn’t a terrorist and even then that changes over time.

Does social media have a censorship problem? (Only if “arbitrary and knee-jerk?”)

Sunday, May 22nd, 2016

Does social media have a censorship problem? by Ryan McChrystal.

From the post:


It is for this reason that we should be concerned by content moderators. Worryingly, they often find themselves dealing with issues they have no expertise in. A lot of content takedown reported to Online Censorship is anti-terrorist content mistaken for terrorist content. “It potentially discourages those very people who are going to be speaking out against terrorism,” says York.

Facebook has 1.5 billion users, so small teams of poorly paid content moderators simply cannot give appropriate consideration to all flagged content against the secretive terms and conditions laid out by social media companies. The result is arbitrary and knee-jerk censorship.

Yes, social media has a censorship problem. But not only when they lack “expertise” but when they attempt censorship at all.

Ryan’s post (whether Ryan thinks this or not I don’t know) presumes two kinds of censorship:

Bad Censorship: arbitrary and knee-jerk

Good Censorship: guided by expertise in a subject area

Bad is the only category for censorship. (period, full stop)

Although social media companies are not government agencies and not bound by laws concerning free speech, Ryan’s recitals about Facebook censorship should give you pause.

Do you really want social media companies, whatever their intentions, not only censoring present content but obliterating comments history on a whim?

Being mindful that today you may agree with their decision but tomorrow may tell another tale.

Social media has a very serious censorship problem, mostly borne of the notion that social media companies should be the arbiters of social discourse.

I prefer the hazards and dangers of unfettered free speech over discussions bounded by the Joseph Goebbels imitators of a new age.

Suggestions for non-censoring or the least censoring social media platforms?

Canary Watch [Tracking Warrant Service?]

Sunday, May 8th, 2016

Canary Watch

From the webpage:

“Warrant canary” is a colloquial term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Canarywatch tracks and documents these statements. This site lists warrant canaries we know about, tracks changes or disappearances of canaries, and allows submissions of canaries not listed on the site.

Follow us on Twitter for updates and notifications about canaries on this site.

All of the “warrant canaries” I saw listed were from service providers and other organizations.

I recently saw a “warrant canary” posted by an individual (more on that this week).

The thought did occur to me that if enough individuals had “warrant canaries” on fairly short (monthly?) renewal cycles, it would be possible to track the service of warrants through particular communities.

Comments/suggestions?

DIY – Chilling Free Speech

Saturday, May 7th, 2016

Homeland Security Wants To Subpoena Us Over A Clearly Hyperbolic Techdirt Comment by Mike Masnick.

The Department of Homeland Security (DHS) has contacted Techdirt by phone and email asking where to send a subpoena and saying a subpoena was on the way for the identity of a commenter on Techdirt.

From Mike’s post:

Now, it’s entirely possible that there are more details here involving a legitimate investigation, but it’s difficult to believe that’s the case given the information we have to date. Also, we have not yet received the subpoena, just the phone calls and emails suggesting that it’s on its way. Normally, we’d wait for the details before publishing, but given a very similar situation involving commenters on the site Reason last year, which included a highly questionable and almost certainly unconstitutional gag order preventing Reason from speaking about it, we figured it would be worth posting about it before we’ve received any such thing.

While I appreciate Mike and Techdirt sounding the alarm about a possible subpoena, it is also distinctly possible that was the intended result of the contacts by DHS.

Not that Mike or Techdirt give a toss about the opinions held by DHS, but you can bet there are commenters and potential commenters who are quite so brave.

DHS and its unsavory companions in the government don’t have to seize newspapers, burn presses, or any of the overt things we usually associate with censorship.

They are much more insidious, not to mention cowardly.

The DHS avoids taking a chance a court might refuse its request for a subpoena but still creates a climate of fear for commenters at Techdirt.

Courts can’t rule on what is not presented to them and the DHS is well aware of that fact.

Which raises the interesting question: How often does DHS call or email about subpoenas and no subpoenas arrive? Is this, as I suspect, a systematic practice at DHS?

Question: Is anyone tracking DHS phone calls and emails about subpoenas? Where no subpoena arrives?

PS: I disagree that calling for violence, even in hyperbole, is in poor taste. People are condemned to death and worse every day in the polite language of privilege and power. It’s time we stopped having a double standard for privileged versus non-privileged violence.

Hacking Book Sale! To Support the Electronic Frontier Foundation

Wednesday, April 27th, 2016

Humble Books Bundle: Hacking

No Starch Press has teamed up with Humble Bundle to raise money for the Electronic Frontier Foundation (EFF)!

$366 worth of No Starch hacking books on a pay what you want basis!

Charitable opportunities don’t get any better than this!

As I type this post, sales of these bundles rolled over 6,200 sales!

To help me participate in this sale, consider a donation.

Thanks!

Criticizing Erdoğan

Sunday, April 24th, 2016

Dutch journalist arrested in Turkey for criticising Erdoğan.

From the post:

A Dutch journalist was arrested early on Sunday at her home in Turkey for tweets deemed critical of the Turkish president, Recep Tayyip Erdoğan, according to her Twitter account.

“Police at the door. No joke,” wrote Ebru Umar, a well-known atheist and feminist journalist of Turkish origin.

If the story wasn’t disturbing enough, it concludes:


Trials in Turkey for insulting Erdoğan have multiplied since his election to the presidency in August 2014, with nearly 2,000 such cases currently open.

I started this post to ask for suggested criticisms of or insults for Erdoğan in Turkish.

But my criticisms and/or insults, in English and/or Turkish, aren’t going to burden Erdoğan or those using big data to track all the criticisms/insults. What’s one more?

Saying that I support those who criticize and/or insult Erdoğan is true, but again, that’s no skin off of Erdoğan and his overworked criticism/insult trackers. They must have NSA-sized cloud space just to keep up with the ones in Turkish.

Whatever the Turkish equivalent of “asshole” is, every occurrence in print or speech is likely a direct and/or indirect reference to Erdoğan. That is by definition a big data problem.

With his sensitivity to criticism and insults, how would Erdoğan react to all the banks in Turkey going dark? All of them. Turkish and foreign.

The banking/business community would take that to reflect unfavorably on Erdoğan. Yes?

Therefore, avoiding that sort of problem, would be good planning on the part of Erdoğan. Which would include ending and apologizing for all the past and present insult/criticism charges.

It isn’t the case that “…business as usual…” is an absolute, “…business as usual…” is an indulgence of those who control the switches and hubs of modern communication and networking.

Erdoğan has voluntarily departed from the norms expected for “…business as usual….” Let’s all hope that he quickly and voluntarily returns to expected norms of civilized behavior. For the banks sake if no one else’s.

PS: It would require more planning and expertise than defacing a KKK website (or Denver’s) but where’s the challenge in twitting racists?