Category Archives: internet

Still don’t care about net neutrality? Give the internet slow lane a try

Slate: One thing the Federal Communications Commission chairman, Tom Wheeler, seems to have overlooked in his widely loathed proposal for a net neutrality overhaul is that if the Internet has a fast lane, it must, necessarily, have a slow lane.

What would life be like in the slow lane—in a “pay to play” world where cable broadband providers can charge companies like Netflix a toll if they want reliable and swift streaming speeds? Well, not to exaggerate, but remember when you tried to use Neopets in 1999 on a dial-up connection?

Tech companies and activists are worried that the creation of two Internets: one quick and reliable for those that can afford it, and the other, of a lesser quality, would seriously undermine the Internet as an open medium for limitless entrepreneurship and communication.

And while we’re not at SOPA and PIPA protest levels by any means, people are coming up with creative ways to voice their disapproval. [Continue reading…]

Facebooktwittermail

EU court backs ‘right to be forgotten’: Google must amend results on request

The Guardian reports: The top European court has backed the “right to be forgotten” and said Google must delete “inadequate, irrelevant or no longer relevant” data from its results when a member of the public requests it.

The test case privacy ruling by the European Union’s court of justice against Google Spain was brought by a Spanish man, Mario Costeja González, after he failed to secure the deletion of an auction notice of his repossessed home dating from 1998 on the website of a mass circulation newspaper in Catalonia.

Costeja González argued that the matter, in which his house had been auctioned to recover his social security debts, had been resolved and should no longer be linked to him whenever his name was searched on Google.

He told the Guardian: “Like anyone would be when you tell them they’re right, I’m happy. I was fighting for the elimination of data that adversely affects people’s honour, dignity and exposes their private lives. Everything that undermines human beings, that’s not freedom of expression.” [Continue reading…]

Facebooktwittermail

Is Net neutrality dead?

Bill Moyers: If I told you that sovereign powers were about to put a toll booth on the street that leads from your house to the nearest Interstate, allowing your richest neighbors to buy their way to the open road while you were sent to the slow lane, you would no doubt be outraged. Well, prepare to scream bloody murder, because something like that could be happening to the Internet. [Transcript]

Facebooktwittermail

Stop using Microsoft’s IE browser until bug is fixed, U.S. and U.K. warn

If you don’t already use Firefox, it’s probably time to install it.

CNET reports: It’s not often that the US or UK governments weigh in on the browser wars, but a new Internet Explorer vulnerability — one that affects all major versions of the browser from the past decade — has forced them to raise an alarm: Stop using IE.

The zero-day exploit, the term given to a previously unknown, unpatched flaw, allows attackers to install malware on your computer without your permission. That malware could be used to steal personal data, track online behavior, or gain control of the computer. Security firm FireEye, which discovered the bug, said that the flaw is being used with a known Flash-based exploit technique to attack financial and defense organizations in the US via Internet Explorer 9, 10, and 11. Those versions of the browser run on Microsoft’s Windows Vista, Windows 7, and Windows 8, although the exploit is present in Internet Explorer 6 and above.

While the Computer Emergency Readiness Team in England and the US regularly issue browser advisories, this is one of the few times that the CERT team has recommended that people avoid using a specific browser. [Continue reading…]

Facebooktwittermail

Former Comcast and Verizon attorneys now manage the FCC and are about to kill the internet

Lee Fang reports: The open Internet may soon become a thing of the past.

Earlier this week, the Wall Street Journal dropped something of a bombshell with leaked news that the Federal Communications Commission is planning to abandon so-called “net neutrality” regulations—rules to ensure that Internet providers are prevented from discriminating based on content. Under the new proposed system, companies such as Comcast or Verizon will be able to create a tiered Internet, in which websites will have to pay more money for faster speeds, a change that observers predict will curb free speech, stifle innovation and increase costs for consumers.

Like so many problems in American government, the policy shift may relate to the pernicious corruption of the revolving door. The FCC is stocked with staffers who have recently worked for Internet Service Providers (ISP) that stand to benefit tremendously from the defeat of net neutrality.

The backgrounds of the new FCC staff have not been reported until now. [Continue reading…]

Facebooktwittermail

Too big to trust? Google’s growing credibility gap

Galen Gruman writes: Remember when we all loved Google? Its search engine was both simple to use and an unbiased portal to anything you wanted to know. It was founded by two college students at a time when Silicon Valley was a shining beacon of what was right in the world, during sunny economic and political times.

We don’t love Google so much any more, mainly because we trust it less and less. More and more people have realized that the Google search engine is hugely biased in favor of advertisers, and the results are increasingly manipulated by Google for inscrutable purposes. Google seems to track anything and everything we do — it peruses our emails, our files stored on its servers, our locations, and our chats. Americans are getting nervous.

When Google bought smart thermostat maker Nest earlier this year, the public recoiled — Nest owners didn’t want their thermometers to be the latest spying portal in their homes for Google to use. That negative reaction drove home the growing Google trust problem. Likewise, no one really believed that Google wasn’t participating in the NSA’s spying on users; it seemed a clear case of the lady doth protest too much. Plus, we saw how much Google is spying on us, whether or not in support of the NSA. If anything, Google’s response seemed to be indignation that the NSA was piggybacking on Google’s own privacy-mining efforts.

For most people, Google is still a shining star. It ranks as the second-most valuable brand in the world, after Apple and before Coca-Cola, a ranking that has grown in recent years. It’s also at the top of the rankings for best places to work. It’s not as if Google has yet become Facebook, whose abuse of personal information is assumed. But the cracks in Google’s reputation are growing. [Continue reading…]

Facebooktwittermail

Two major threats to the internet: The U.S. government and the Russian government

Ars Technica: Hector Xavier Monsegur, the hacker known as “Sabu,” became a confidential FBI informant following his 2011 arrest. But he continued to direct other hackers to attack more than 2,000 Internet domains in 2012, including sites operated by the Iranian, Syrian, and Brazilian governments.

Based on documents obtained by the New York Times, those attacks were carried out with the knowledge of the FBI agents supervising Monsegur. The Times report suggests that the data obtained in the attacks—including information on Syrian government sites—was passed to US intelligence agencies by the FBI.

Russian President Vladimir Putin clearly wants to exploit the climate of distrust that has been generated by the NSA and other branches of the U.S. government that have undermined internet security and sees in this the opportunity to push for a Russian internet — one in which the Russian government can exercise greater control over social media.

Vesti.ru reports (translation):

“The Internet emerged as a special project of the CIA USA, and continues to be developed as such,” said Putin [at the conference Mediaforum in St. Petersburg today]. Moreover, the president noted that the national search engine Yandex and the social network VKontakte are trying to develop business, mathematical and informational programming in Russia. “Our companies didn’t have resources free for such capital investments, but now they have appeared,” said the head of state. Putin expressed the hope that the Russian Internet would develop rather intensively and rapidly and will secure the interests of the Russian Federation.”

Meanwhile, ITAR-TASS reports:

Russia’s popular bloggers will now have to brace for considerable restrictions of their rights. The State Duma has just adopted a law introducing new rules they will have to abide by. The document incorporates a package of bills for effective struggle against terrorism and extremism. Earlier, the bill drew a mixed response from society, including sharp criticism from human rights activists.

The law introduces a new term: “Internet user called blogger.” Bloggers will be obliged to declare their family name and initials and e-mail address. Those authors whose personal website or page in social networks has 3,000 visitors or more a day must have themselves registered on a special list and abide by restrictions applicable to the mass media. In other words, registration requires the blogger should check the authenticity of published information and also mention age restrictions for users. Also, bloggers will have to follow mass media laws concerning electioneering, resistance to extremism and the publication of information about people’s private lives. An abuse of these requirements will be punishable with a fine of 10,000 to 30,000 roubles (roughly 300 dollars to 1,000 dollars) for individuals and 300,000 roubles (10,000 roubles) for legal entities. A second violation will be punishable with the website’s suspension for one month.

The Russian investigative journalists Andrei Soldatov and Irina Borogan write:

The NSA scandal made a perfect excuse for the Russian authorities to launch a campaign to bring global web platforms such as Gmail and Facebook under Russian law—either requiring them to be accessible in Russia by the domain extension .ru, or obliging them to be hosted on Russian territory. Under Russian control, these companies and their Russian users could protect their data from U.S. government surveillance and, most importantly, be completely transparent for Russian secret services.

Russia wants to shift supervision and control of the Internet from global companies to local or national authorities, allowing the FSB more authority and latitude to thwart penetration from outside. At December’s International Telecommunications Union (ITU) conference in Dubai, Moscow tried to win over other countries to its plan for a new system of control. The key to the project is to hand off the functions of managing distribution of domain names/IP-addresses from the U.S.-based organization ICANN to an international organization such as the ITU, where Russia can play a central role. Russia also proposed limiting the right of access to the Internet in such cases where “telecommunication services are used for the purpose of interfering in the internal affairs or undermining the sovereignty, national security, territorial integrity, and public safety of other states, or to divulge information of a sensitive nature.” Some 89 countries voted for the Russian proposals, but not the United States, United Kingdom, Western Europe, Australia, or Canada. The result is a stalemate.

Web services would be required to build backdoors for the Russian secret services to access what’s stored there. Prominent Russian MP Sergei Zheleznyak, a member of the ruling United Russia party, has called on Russia to reclaim its “digital sovereignty” and wean its citizens off foreign websites. He said he would introduce legislation this fall to create a “national server,” which analysts say would require foreign websites to register on Russian territory, thus giving the Kremlin’s own security services the access they have long been seeking. Of course, building such a national system would defeat the global value of the Internet.

Shane Harris writes:

When U.S. officials warn of the threat foreign cyber spies pose to American companies and government agencies, they usually focus on China, which has long been home to the world’s most relentless and aggressive hackers. But new information shows that Russian and Eastern European hackers, who have historically focused their energies on crime and fraud, now account for a large and growing percentage of all cyber espionage, most of which is directed at the United States.

Individuals and groups in Eastern Europe, and particularly in Russia and Russian-speaking countries, are responsible for a fifth of all cyber spying incidents in the world, according to a global study of data breaches conducted by Verizon, published this week. The spies are targeting a range of companies as varied as the global economy itself, and are stealing manufacturing designs, proprietary technology and confidential business plans. The cyber spies steal information on behalf of their governments in order to manufacture cheaper versions of technologies or weapons systems, or to give their home country’s corporations a leg up on their foreign competitors.

Facebooktwittermail

‘Russian Facebook’ is now effectively under state control

Moscow Times reports: Pavel Durov, the founder of Russia’s largest social networking website, fled the country on Tuesday, a day after he said he was forced out as the company’s CEO for refusing to share users’ personal data with Russian law enforcement agencies.

Durov, who created Vkontakte seven years ago, first announced his intention to leave the company on April 1 but withdrew his resignation letter two days later. On Monday, he announced that he had been fired and that the social network would now fall under “full control” of Kremlin-linked Rosneft CEO Igor Sechin and Vkontakte billionaire shareholder Alisher Usmanov.

The move to oust Durov is widely seen as part of a wider campaign by the Kremlin to tighten its grip on the Internet, and observers said the authorities aimed to “cleanse” the management of Russian Internet companies in the hopes of gaining control of their content.

Last week, Durov said in an interview with the New Times that the Federal Security Service had turned up the pressure on Vkontakte employees dramatically in recent months, demanding that Durov release personal information about Euromaidan activists. He said the Prosecutor General’s Office ordered him to shut down a group on the website dedicated to anti-corruption activist Alexei Navalny, though he refused to do so.

“I am out of Russia and have no plans to go back,” Durov said Tuesday in an interview with Techcrunch, a news website focused on technology. He said he intended to launch a mobile social network outside Russia. [Continue reading…]

Facebooktwittermail

As we sweat government surveillance, companies like Google collect our data

Dan Gillmor writes: As security expert Bruce Schneier (a friend) has archly observed, “Surveillance is the business model of the internet.” I don’t expect this to change unless and until external realities force a change – and I’m not holding my breath.

Instead, the depressing news just seems to be getting worse. Google confirmed this week what many people had assumed: even if you’re not a Gmail user, your email to someone who does use their services will be scanned by the all-seeing search and the advertising company’s increasingly smart machines. The company updated their terms of service to read:

Our automated systems analyze your content (including e-mails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.

My system doesn’t do this to your email when you send me a message. I pay a web-hosting company that keeps my email on a server that isn’t optimized for data collection and analysis. I would use Gmail for my email, if Google would let me pay for service that didn’t “analyze (my) content” apart from filtering out spam and malware. Google doesn’t offer that option, as far as I can tell, and that’s a shame – if not, given its clout, a small scandal. [Continue reading…]

Facebooktwittermail

It’s time to encrypt the entire internet

Wired reports: The Heartbleed bug crushed our faith in the secure web, but a world without the encryption software that Heartbleed exploited would be even worse. In fact, it’s time for the web to take a good hard look at a new idea: encryption everywhere.

Most major websites use either the SSL or TLS protocol to protect your password or credit card information as it travels between your browser and their servers. Whenever you see that a site is using HTTPS, as opposed to HTTP, you know that SSL/TLS is being used. But only a few sites — like Facebook and Gmail — actually use HTTPS to protect all of their traffic as opposed to just passwords and payment details.

Many security experts — including Google’s in-house search guru, Matt Cutts — think it’s time to bring this style of encryption to the entire web. That means secure connections to everything from your bank site to Wired.com to the online menu at your local pizza parlor.

Cutts runs Google’s web spam team. He helps the company tweak its search engine algorithms to prioritize certain sites over others. For example, the search engine prioritizes sites that load quickly, and penalizes sites that copy — or “scrape” — text from others.

If Cutts had his way, Google would prioritize sites that use HTTPS over those that don’t, he told blogger Barry Schwartz at a conference earlier this year. The change, if it were ever implemented, would likely spur an HTTPS stampede as web sites competed for better search rankings. [Continue reading…]

Facebooktwittermail

Behind closed doors, Google and Facebook are fighting efforts to stop NSA spying

Vice reports: Revelations about the National Security Agency’s most controversial surveillance program, which centers on the bulk collection of hundreds of billions of records of Americans’ phone conversations, were quickly greeted with calls for reform by major internet powerhouses like Facebook, Google, Microsoft, and Yahoo last year. But all four companies, along with dozens of other major tech firms, are actively opposing an initiative to prevent NSA spying known as the Fourth Amendment Protection Act, leaning on secretive industry lobbying groups while they profess outrage in official statements.

Virtually immediate public condemnation of government spying put the industry in an uncomfortable position when the Snowden leaks began pouring out in June 2013, and in carefully written responses to news reports claiming that they’d cooperated with the now notorious PRISM apparatus, these tech companies emphasized their compliance with existing laws that require them to hand over user data under certain conditions.

“When governments ask Facebook for data, we review each request carefully to make sure they always follow the correct processes and all applicable laws, and then only provide the information if [it] is required by law,” Mark Zuckerberg, the CEO of Facebook, wrote in a blog post last June. “We will continue fighting aggressively to keep your information safe and secure.”

Statements like this suggest Zuckerberg and his industry peers would support legislative efforts to rein in surveillance, and it’s true that they’ve called for reform in letters to the Senate Judiciary Committee applauding a bill known as the USA Freedom Act. Google, Facebook, and six other tech giants have even hired a firm that claims to fight NSA surveillance on their behalf.

The real action, however, has been much subtler, with the industry wielding its influence behind closed doors using two lobbying groups to oppose certain restrictions on internet surveillance: the IT Alliance for Public Sector (ITAPS) and the State Privacy and Security Coalition (SPSC). A look at the actions of these two groups suggests that the companies want reform, sure, but only on terms that don’t affect their day-to-day business.

In particular, VICE has uncovered that ITAPS and SPSC have sent letters to politicians lobbying against the Fourth Amendment Protection Act, a wide-sweeping bill that would limit the NSA’s ability to read private electronic communications without a warrant. [Continue reading…]

Facebooktwittermail

How Heartbleed broke the internet — and why it can happen again

Wired reports: Stephen Henson is responsible for the tiny piece of software code that rocked the internet earlier this week.

The key moment arrived at about 11 o’clock on New Year’s Eve, 2011. With 2012 just minutes away, Henson received the code from Robin Seggelmann, a respected academic who’s an expert in internet protocols. Henson reviewed the code — an update for a critical internet security protocol called OpenSSL — and by the time his fellow Britons were ringing in the New Year, he had added it to a software repository used by sites across the web.

Two years would pass until the rest of the world discovered this, but this tiny piece of code contained a bug that would cause massive headaches for internet companies worldwide, give conspiracy theorists a field day, and, well, undermine our trust in the internet. The bug is called Heartbleed, and it’s bad. People have used it to steal passwords and usernames from Yahoo. It could let a criminal slip into your online bank account. And in theory, it could even help the NSA or China with their surveillance efforts.

It’s no surprise that a small bug would cause such huge problems. What’s amazing, however, is that the code that contained this bug was written by a team of four coders that has only one person contributing to it full-time. And yet Henson’s situation isn’t an unusual one. It points to a much larger problem with the design of the internet. Some of its most important pieces are controlled by just a handful of people, many of whom aren’t paid well — or aren’t paid at all. And that needs to change. Heartbleed has shown — so very clearly — that we must add more oversight to the internet’s underlying infrastructure. We need a dedicated and well-funded engineering task force overseeing not just online encryption but many other parts of the net.

The sad truth is that open source software — which underpins vast swathes of the net — has a serious sustainability problem. [Continue reading…]

Facebooktwittermail

Astra Taylor: Misogyny and the cult of internet openness

In December, and again in February, at the Google Bus blockades in San Francisco, one thing struck me forcefully: the technology corporation employees waiting for their buses were all staring so intently at their phones that they apparently didn’t notice the unusual things going on around them until their buses were surrounded. Sometimes I feel like I’m living in a science-fiction novel, because my region is so afflicted with people who stare at the tiny screens in their hands on trains, in restaurants, while crossing the street, and too often while driving. San Francisco is, after all, where director Phil Kaufman set the 1978 remake of Invasion of the Body Snatchers, the movie wherein a ferny spore-spouting form of alien life colonizes human beings so that they become zombie-like figures.

In the movies, such colonization took place secretly, or by force, or both: it was a war, and (once upon a time) an allegory for the Cold War and a possible communist takeover. Today, however — Hypercapitalism Invades! — we not only choose to carry around those mobile devices, but pay corporations hefty monthly fees to do so. In return, we get to voluntarily join the great hive of people being in touch all the time, so much so that human nature seems in the process of being remade, with the young immersed in a kind of contact that makes solitude seem like polar ice, something that’s melting away.

We got phones, and then Smart Phones, and then Angry Birds and a million apps — and a golden opportunity to be tracked all the time thanks to the GPS devices in those phones. Your cell phone is the shackle that chains you to corporate America (and potentially to government surveillance as well) and like the ankle bracelets that prisoners wear, it’s your monitor. It connects you to the Internet and so to the brave new world that has such men as Larry Ellison and Mark Zuckerberg in it. That world — maybe not so brave after all — is the subject of Astra Taylor’s necessary, alarming, and exciting new book, The People’s Platform: Taking Back Power and Culture in the Digital Age.

The Internet arose with little regulation, little public decision-making, and a whole lot of fantasy about how it was going to make everyone powerful and how everything would be free. Free, as in unregulated and open, got confused with free, as in not getting paid, and somehow everyone from Facebook to Arianna Huffington created massively lucrative sites (based on advertising dollars) in which the people who made the content went unpaid. Just as Russia woke up with oil oligarchs spreading like mushrooms after a night’s heavy rain, so we woke up with new titans of the tech industry throwing their billionaire weight around. The Internet turns out to be a superb mechanism for consolidating money and power and control, even as it gives toys and minor voices to the rest of us.

As Taylor writes in her book, “The online sphere inspires incessant talk of gift economies and public-spiritedness and democracy, but commercialization and privatization and inequality lurk beneath the surface. This contradiction is captured in a single word: ‘open,’ a concept capacious enough to contain both the communal and capitalistic impulses central to Web 2.0.” And she goes on to discuss, “the tendency of open systems to amplify inequality — and new media thinkers’ glib disregard for this fundamental characteristic.”  Part of what makes her book exceptional, in fact, is its breadth. It reviews much of the existing critique of the Internet and connects the critiques of specific aspects of it into an overview of how a phenomenon supposed to be wildly democratic has become wildly not that way at all.

And at a certain juncture, she turns to gender. Though far from the only weak point of the Internet as an egalitarian space — after all, there’s privacy (lack of), the environment (massive server farms), and economics (tax cheats, “content providers” like musicians fleeced) — gender politics, as she shows in today’s post adapted from her book, is one of the most spectacular problems online. Let’s imagine this as science fiction: a group of humans apparently dissatisfied with how things were going on Earth — where women were increasing their rights, representation, and participation — left our orbit and started their own society on their own planet. The new planet wasn’t far away or hard to get to (if you could afford the technology): it was called the Internet. We all know it by name; we all visit it; but we don’t name the society that dominates it much.

Taylor does: the dominant society, celebrating itself and pretty much silencing everyone else, makes the Internet bear a striking resemblance to Congress in 1850 or a gentlemen’s club (minus any gentleness). It’s a gated community, and as Taylor describes today, the security detail is ferocious, patrolling its borders by trolling and threatening dissident voices, and just having a female name or being identified as female is enough to become a target of hate and threats.

Early this year, a few essays were published on Internet misogyny that were so compelling I thought 2014 might be the year we revisit these online persecutions, the way that we revisited rape in 2013, thanks to the Steubenville and New Delhi assault cases of late 2012. But the subject hasn’t (yet) quite caught fire, and so not much gets said and less gets done about this dynamic new machinery for privileging male and silencing female voices. Which is why we need to keep examining and discussing this, as well as the other problems of the Internet. And why you need to read Astra Taylor’s book. This excerpt is part of her diagnosis of the problems; the book ends with ideas about a cure. Rebecca Solnit

Open systems and glass ceilings
The disappearing woman and life on the internet
By Astra Taylor

The Web is regularly hailed for its “openness” and that’s where the confusion begins, since “open” in no way means “equal.” While the Internet may create space for many voices, it also reflects and often amplifies real-world inequities in striking ways.

An elaborate system organized around hubs and links, the Web has a surprising degree of inequality built into its very architecture. Its traffic, for instance, tends to be distributed according to “power laws,” which follow what’s known as the 80/20 rule — 80% of a desirable resource goes to 20% of the population.

In fact, as anyone knows who has followed the histories of Google, Apple, Amazon, and Facebook, now among the biggest companies in the world, the Web is increasingly a winner-take-all, rich-get-richer sort of place, which means the disparate percentages in those power laws are only likely to look uglier over time.

Continue reading

Facebooktwittermail

Ethiopia: How communications technology has become a tool of oppression

One day they arrested me and they showed me everything. They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely.
— Former member of an Oromo opposition party, now a refugee in Kenya, May 2013

Human Rights Watch: Since 2010, Ethiopia’s information technology capabilities have grown by leaps and bounds. Although Ethiopia still lags well behind many other countries in Africa, mobile phone coverage is increasing and access to email and social media have opened up opportunities for young Ethiopians—especially those living in urban areas—to communicate with each other and share viewpoints and ideas.

The Ethiopian government should consider the spread of Internet and other communications technology an important opportunity. Encouraging the growth of the telecommunications sector is crucial for the country to modernize and achieve its ambitious economic growth targets.

Instead, the ruling Ethiopian People’s Revolutionary Democratic Front (EPRDF), a coalition of ethnically-based political parties in power for more than 20 years, continues to severely restrict the rights to freedom of expression, association, and peaceful assembly. It has used repressive laws to decimate civil society organizations and independent media and target individuals with politically-motivated prosecutions. The ethnic Oromo population has been particularly affected, with the ruling party using the fear of the ongoing but limited insurgency by the Oromo Liberation Front (OLF) in the Oromia region to justify widespread repression of the ethnic Oromo population. Associations with other banned groups, including Ginbot 7, are also used to justify repression.

As a result, the increasing technological ability of Ethiopians to communicate, express their views, and organize is viewed less as a social benefit and more as a political threat for the ruling party, which depends upon invasive monitoring and surveillance to maintain control of its population.

The Ethiopian government has maintained strict control over Internet and mobile technologies so it can monitor their use and limit the type of information that is being communicated and accessed. [Continue reading…]

Facebooktwittermail

‘Cuban Twitter’ heads to hearings in Congress

The Associated Press reports: The head of the U.S. government agency that secretly created a “Cuban Twitter” communications network designed to undermine the communist government in Cuba is expected to testify next week before a senator who thinks the whole idea was “dumb, dumb, dumb.” The congressional hearing could resolve key questions around the clandestine program, including whether the Obama administration adequately informed lawmakers about its plans.

Administration officials on Thursday defended the program, saying it had been “debated” by Congress and wasn’t a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort.

An Associated Press investigation found that the network was built using secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba’s stranglehold on the Internet with a social media platform.

The program aimed first to build a Cuban audience, mostly young people. Then the plan was to push them toward dissent.

But the Cuban users of the network, called ZunZuneo, were not aware it was created by the U.S. Agency for International Development, overseen by the State Department. They also did not know that American contractors running the program were gathering personal data about them, in the hope that the information might be used someday for political purposes. [Continue reading…]

Facebooktwittermail

U.S. secretly created ‘Cuban Twitter’ to stir unrest

The Associated Press reports: In July 2010, Joe McSpedon, a U.S. government official, flew to Barcelona to put the final touches on a secret plan to build a social media project aimed at undermining Cuba’s communist government.

McSpedon and his team of high-tech contractors had come in from Costa Rica and Nicaragua, Washington and Denver. Their mission: to launch a messaging network that could reach hundreds of thousands of Cubans. To hide the network from the Cuban government, they would set up a byzantine system of front companies using a Cayman Islands bank account, and recruit unsuspecting executives who would not be told of the company’s ties to the U.S. government.

McSpedon didn’t work for the CIA. This was a program paid for and run by the U.S. Agency for International Development, best known for overseeing billions of dollars in U.S. humanitarian aid.

According to documents obtained by The Associated Press and multiple interviews with people involved in the project, the plan was to develop a bare-bones “Cuban Twitter,” using cellphone text messaging to evade Cuba’s strict control of information and its stranglehold restrictions over the Internet. In a play on Twitter, it was called ZunZuneo — slang for a Cuban hummingbird’s tweet.

Documents show the U.S. government planned to build a subscriber base through “non-controversial content”: news messages on soccer, music, and hurricane updates. Later when the network reached a critical mass of subscribers, perhaps hundreds of thousands, operators would introduce political content aimed at inspiring Cubans to organize “smart mobs” — mass gatherings called at a moment’s notice that might trigger a Cuban Spring, or, as one USAID document put it, “renegotiate the balance of power between the state and society.”

At its peak, the project drew in more than 40,000 Cubans to share news and exchange opinions. But its subscribers were never aware it was created by the U.S. government, or that American contractors were gathering their private data in the hope that it might be used for political purposes. [Continue reading…]

Facebooktwittermail

Disembodied: The Internet’s ability to make us active in places we are not present

a13-iconCarmen Maria Machado writes: Sometime in early 2009, Pia Farrenkopf died in the back seat of her Jeep, which was parked in the garage of her home. Around her, life in the suburban community of Pontiac, Michigan, went on. No one knew that she’d died. By all accounts, her neighbors hadn’t known her very well, though some of them would mow her grass when it got too high, according to a report in USA Today. They kept on doing so for five years, until, last month, her body was finally discovered.

Neighbors told reporters that Farrenkopf travelled abroad for business, which is why, they assumed, they never saw her, and had taken it upon themselves to manicure her lawn. Farrenkopf had left her job as a contractor with Chrysler Financial a few months before her death, according to USA Today, so no one was expecting her at work. Her family lived far away and had lost touch with her, according to Reuters.

Farrenkopf also had a bank account with a very large sum in it, and — this is the postmodern crux of the story — she had set up her mortgage and utility bills to be paid automatically from it. As her body decomposed in her garage, the funds went out regularly. Last year, Farrenkopf’s money finally ran out. Her mortgage payments stopped, and the bank foreclosed on the house. Earlier this month, a contractor employed by the bank was examining the home when he discovered Farrenkopf’s body — which has been called “mummified” — in her car in the garage. Since then, police have been attempting to piece together the details of her life and death, to find some answers to the mystery of who she was and why she is gone.

Between those two moments — when she died and when her body was discovered — she was a kind of Schrödinger’s cat, biologically dead but also, in a way, among the living, paying for her power and phone, the roof over her head. Until her body surfaced, Farrenkopf’s institutional ties were the only things keeping her “alive.” [Continue reading…]

Facebooktwittermail

Turkey YouTube ban: Full transcript of leaked Syria ‘war’ conversation between Erdogan officials

n13-iconInternational Business Times reports: Turkish Prime Minister Recep Tayyip Erdogan’s ban of YouTube occurred after a leaked conversation between Head of Turkish Intelligence Hakan Fidan and Turkish Foreign Minister Ahmet Davutoğlu that he wanted removed from the video-sharing website.

The leaked call details Erdogan’s thoughts that an attack on Syria “must be seen as an opportunity for us [Turkey]”.

In the conversation, intelligence chief Fidan says that he will send four men from Syria to attack Turkey to “make up a cause of war”.

Deputy Chief of Staff Lt. Gen. Yaşar Güler replies that Fidan’s projected actions are “a direct cause of war…what you’re going to do is a direct cause of war”.

Turkey’s foreign ministry said the leaked recording of top officials discussing the Syria operation was “partially manipulated” and is a “wretched attack” on national security.

In the leaked video, Fidan is discussing with Davutoğlu, Güler and other officials a possible operation within Syria to secure the tomb of Suleyman Shah, grandfather of the founder of the Ottoman empire.

Full transcript (translated by @castizbey): [Continue reading…]

Reuters adds: Turkey threatened two weeks ago to retaliate for any attack on the tomb following clashes between militants of the Islamic State of Iraq and the Levant (ISIL), an al Qaeda breakaway group, and rival rebel groups in the area, east of Aleppo near the Turkish border.

“An operation against ISIL has international legitimacy. We will define it as al Qaeda. There are no issues on the al Qaeda framework. When it comes to the Suleyman Shah tomb, it’s about the protection of national soil,” a voice presented as that of foreign ministry undersecretary Feridun Sinirlioglu says.

When the discussion turns to the need to justify such an operation, the voice purportedly of Fidan says: “Now look, my commander, if there is to be justification, the justification is, I send four men to the other side. I get them to fire eight missiles into empty land. That’s not a problem. Justification can be created.”

The foreign ministry said it was natural for state officials to discuss defending Turkish territory.

“In the meeting it was confirmed that Turkey would take necessary steps decisively to protect the security of our personnel at the Suleyman Shah tomb and Turkey’s will to defend it in the face of an attack was reiterated,” the statement said.

Facebooktwittermail