Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 11 September 2013

Internet S.O.S.

Posted on 15:23 by Unknown
The Huffington Post, Timothy Karr, Campaign Director, Free Press and SavetheInternet.com

Posted: 09/10/2013 7:38 am 

Is the Internet on life support?

Last week we learned that U.S. and British intelligence agencies have broken the back of digital encryption -- the coded technology hundreds of millions of Internet users rely on to keep their communications private.

Over the weekend, Der Spiegel reported that the NSA and its British counterpart are also hacking into smartphones to monitor our daily lives in ways that wouldn't have been possible before the age of the iPhone.

This news, just the latest revelations from the files of Edward Snowden, only heighten our sense that we can no longer assume anything we say or do online is secure.



But that's not all. In a case heard before a U.S. federal appeals court on Monday, telecommunications colossus Verizon argued that the First Amendment gives it the right to block and censor Internet users. (That's right. Verizon is claiming that, as a corporation, it has the free speech right to silence the online expression of everybody else.)

Government and corporate forces often work together to chip away the two pillars of the open Internet: our ability to control our personal data and our right to connect and communicate without censorship or interference.

The Surveillance Industrial Complex

A series of reports coordinated among the Guardian, the New York Times and ProPublica revealed that the NSA and its British counterpart have secretly unlocked encryption technologies used by popular online services, including Google, Facebook and Microsoft.

Using National Security Letters and other secret court orders, intelligence agencies can wedge their way onto the large telecommunications networks that move most of the world's Internet traffic. Getting access to the data is only half the challenge. To read and sort these communications, the NSA works with a lesser-known assortment of security vendors that filter through mountains of data, target references and patterns of interest and crack codes designed to safeguard user identity and content.

Many of the companies that ply this trade are only now being exposed through "Spyfiles," collaboration among WikiLeaks, Corporate Watch and Privacy International designed to shed light on the multibillion-dollar industry. According to the latest documents provided by Edward Snowden, U.S. intelligence agencies alone spend $250 million each year to use these companies' commercial security products for mass surveillance.

It's part of a sprawling complex of companies, lobbyists and government officials seeking to rewire the Internet in ways that wrest control over content away from Internet users.

While motivations may differ, the result is the same: a communications network that works against the Interests of many for the benefit of the few.

Tearing the Fabric

The Internet wasn't meant to be like this. Bruce Schneier, an encryption fellow at Harvard's Berkman Center for Internet and Society, says that the NSA and the companies it works with are "undermining the very fabric of the Internet."

Telecommunications companies are doing their part by giving spy agencies access to our data. They're also bankrolling a multimillion-dollar lobbying effort to destroy Net Neutrality -- the one rule that prohibits Internet service providers from blocking or degrading our ability to connect to one another, share information and use the online services of our choosing.

If Verizon wins its case in Washington, ISPs will be able to prioritize certain online content while degrading user access to sites and services that the big companies don't like.

It's a business that puts at risk the most integral function of the World Wide Web. Sir Tim Berners-Lee, the Web's pioneer, saw the network as a "blank canvas" -- upon which anyone could contribute, communicate and innovate without permission.

Berners-Lee's invention relied on an open protocol that gave everyday users power over the network. This networking principle has far-reaching political implications, favoring systems that are more decentralized and democratic.

Without safeguards that protect users from surveillance and censorship, the Internet's DNA will change in ways that no longer foster openness, free expression and innovation.

Media Policy

If we've learned anything during the Summer of Snowden, it's that corporations and governments alone can't be trusted to be good stewards of the Internet.

We need media policies that protect our privacy and promote access to open networks.

The fight for these policies is being led by a diverse and bipartisan alliance of civil liberties and communications-rights organizations, including the ACLU, EFF, Free Press and Public Knowledge.

We're not alone. Millions joined the call for Net Neutrality in 2010; millions more stood up to defend the Internet against the PIPA and SOPA Web-censorship bills in 2012. The battle to protect users' privacy has engaged new audiences as we've learned more about the extent of the NSA's mass surveillance.

In each of these arenas, we're working to stop bad laws, amend others and implement new policies that put Internet users first.

A grassroots movement is fueling this fight. If you haven't joined us yet, now's the time to step up and save the Internet.

Follow Timothy Karr on Twitter: www.twitter.com/TimKarr
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Industry News, James Jones, networking security, Security, Security; Identity Management, Web | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • Cisco Career Certifications Awarded American National Standards Institute Accreditation
    Achievement Demonstrates Compliance With Rigorous, Internationally Recognized Standards SAN JOSE, CA--(Marketwire - Jan 16, 2013) - Unders...
  • CyberWatch West Free Student 2 Student Webinar October 30th
    Online Workshop Oct 30 at 10:30 am PDT Man-in-the-Middle Attacks Using Mobile Devices Register @ cyberwatchwest.webex.com Student 2 Student ...
  • Spring 2013 NEW CCCApply Webinar Series
      Monday, 28 January 2013, TechEDge Written by Tim Calhoon Saturday, 26 January 2013 The New CCCApply online admissions application...
  • Community college grads out-earn bachelor's degree holders
    By Jon Marcus at The Hechinger Institute @CNNMoney February 26, 2013: 6:23 AM ET Nearly 30% of Americans with associate's degrees now ...
  • ACM CCECC Alice Summer Workshops Registration now open
    Registration has opened for the Alice Summer Workshops! A week has been set aside for a Community College focused workshop at Walt Disn...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • NCRIC Cyber Internship Program
    Northern California Regional Intelligence Center Cyber Internship Program Northern California Regional Intelligence Center (“NCRIC”) Mission...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ►  November (41)
    • ►  October (53)
    • ▼  September (44)
      • Why we hate the new tech boom
      • U.S. Agencies Revamp Standards for Cybersecurity P...
      • Digital Media Content & Technology Spend to Reach ...
      • USF opening $54 million science and innovation center
      • Hackbright Academy puts women coders in their own ...
      • Last Chance to Register for 2013 National Cyber Le...
      • 2013 IBM Master the Mainframe Contest Begins Octob...
      • Community College League of California - Remediation
      • MOUSE Squad Student Tech Leadership Program
      • Free Expanding Computing Education Pathways (ECEP)...
      • New California law will let minors digitally erase...
      • The Internet Is Important To Everyone Infographic
      • California Community College - Local Workforce Inv...
      • California Community College 2013 CTE Career Pathw...
      • Free 4-Day Juniper Training and JNCIA Certificatio...
      • Hackers Unite: Student Cybersecurity Teams Get a G...
      • San Francisco Hackathon September 20-22, 2013
      • Computer science major ranks No. 8 for salary pote...
      • Cybersecurity Field Not Ready to Be Professionaliz...
      • California Workforce Association: From Jail to Jo...
      • 5 Things I Learned By Turning Off My Smartphone Fo...
      • IT driving UK economy as skills gap widens
      • Udacity teams up with Google, AT&T and other tech ...
      • California Career Briefs: Get Soft Skills
      • National CyberWatch Center Sponsors 4th National I...
      • The State of Publicly-Funded GIS Data
      • National Cyber League (NCL) Registration Open Unti...
      • U.S. National Cyber Talent Search: Cyber Aces
      • Tablet Shipments to Exceed Personal Computers
      • Free Juniper 4-Day Course - $1700 Value
      • Internet S.O.S.
      • Convergence Technology Center (CTC) Summer Working...
      • National Cyber League (NCL) Registration Still Open!
      • Square Announces Code Camp for High School and Col...
      • Inside Hack Reactor, The Coding Bootcamp That Want...
      • California accelerates shift in student testing
      • Fed Says Tech Demand Outstripping Supply in Boston...
      • California Virtual Campus: 19,873 Online Courses;...
      • CCC Confer News and Resources
      • Kimberly Bryant at Black Girls Code Receives White...
      • CodeNow Launches Fall Trainings in the Bay Area. N...
      • StartSomethingToday.org Challenge to Inspire Stude...
      • California Career Briefs: Start a Conversation
      • Code for America on Why Civic Hacking Matters
    • ►  August (21)
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile