Beware of Zoom:

Protecting Privacy in the Age of Coronavirus Pandemic

  Our current global coronavirus pandemic leaves many casualties. Although nowhere near as immediate or searing as sickness and death, the potential loss of our privacy is among them. Privacy is critically important in a democratic society. It is also an assumed feature of the interaction between many nonprofit and social justice organizations and institutions …

Visiting a website could make you a subpoena target

Justice Department's Dreamhost Subpoena Ramps Up the Police State!

If the U.S. Department of Justice prevails in a case against web-hosting provider Dreamhost, you can become the subject of a criminal investigation by visiting a website.

You don’t have to re-read that. The problem is not with your eyes; it’s with your government. If the courts uphold this Justice Department action, the erosion of your privacy rights on the Internet, a process that began with the Patriot Act and picked up full-steam under the Obama administration, will have been completed under President Donald Trump.

A major pillar of a police state will now be in place.

You visit. You are a target.You visit. You are a target.

The sorry saga starts last January when the Justice Department began investigating people who had been organizing protests at Trump’s inauguration. In this unsavory combination of the federal government’s increasingly intrusive actions and Trump’s megamania, Justice lawyers presented Dreamhost with a search warrant on a website — Disruptj20.org — which was being used to organize those actions.

The house with the built-in backdoor

The Whatsapp Scandal

Since adding the feature in April, 2016, the Whatsapp app (or really its parent, Facebook) has paraded its “end to end encryption” as the reason to use it above all other smartphone message applications. It can handle calls, messages, video, files and just about everything any computer can and, because it’s encrypted end to end, nobody can read, see or hear any of it unless you want them to.

The pitch has worked; over a billion people now use the app and it is particularly prominent among people who need encryption — the computer protocol that makes reading your message impossible for anyone but the person you’re sending it to.

Activists, particularly, use Whatsapp to communicate everything from places for emergency demonstrations to important announcements to the latest information about their personal lives. Whatsapp is, in effect, a universe of communications for a billion people. It does everything and everything it does is encrypted. With Whatsapp, they’ve been saying, you are safe from intrusion and spying.

 safety or vulnerability?Whatsapp: safety or vulnerability?

The problem is, you’re not safe at all; the encryption can easily be broken. That news, first made public in the Guardian, has provoked a public gasp and a joust between developers and activists covered by journalists who, anxious to provide both “sides”, cloud the issue more than clarify.

Unlike many other debates, there aren’t two sides to this story. Whatsapp is not safe because its encryption has a huge exploit (or weakness): a product of what the company says is an attempt to make life a lot simpler for its users. Basically, it rewrites the keys used for encryption without telling you and that means a third party (like the government) can decrypt what you’ve written.

A scandal that reveals more than it says

Yahoo Scanned All Users' Emails for Government!

If you are one of the approximately 280 million people with Yahoo email accounts, your email was scanned for content and possibly turned over to the U.S. government. Yahoo, on Tuesday, admitted that fact.

Reuters revealed on Tuesday that the Internet mega-company (which is now being purchased by Verizon Communications) designed a special program last year to capture and scan all its users’ incoming email after being ordered to do that by the either the NSA or FBI. It deployed the program over the last year, scanning every piece of email Yahoo accounts received and apparently turning over all email that contained any of the tens of thousands of “keywords” the NSA considers suspicious.

The decision, Reuters says, was made by President and Chief Executive Officer Marissa Mayer, in collaboration with people in her legal department. It wasn’t without controversy: several Yahoo top staffers left the company including Chief Information Security Officer Alex Stamos (who left for a top job at Facebook).

Yahoh Chief Mayer -- She left out "scan all user email"Yahoh Chief Mayer — She left out "scan all user email"
 

The news is startling for several reasons. It’s also deceptive for some others.

The problematic relationship of Black people and the Internet persists

An Emancipation Proclamation for the Digital Age

We just celebrated “Juneteenth” (the start of the end of slavery in the U.S.) amid tumultuous and sometimes confusing politics and what appears to be an increase in racist mobilization. For internet activists the situation begs the question: what, at this moment in our history, is the relationship between technology and black people?

It’s a critical issue for us all.

Regular readers of this site have read it many times: with expanding globalization and the information economy, the internet has become a major, if not the major, communications technology in today’s world. In the United States, it’s the most popular tool for direct and group communications, study, research, diversion, journalism, intellectual collaboration and news consumption.

Most people reading this would agree that black people must be a part of that. But that truth is not a function only of a commitment to equality or justice. It’s a necessity if we are to preserve the Internet’s freedom and functionality and build a truly just and democratic society.

The use of the Internet by Black people has grown...and so have the problems.The use of the Internet by Black people has grown…and so have the problems.
 

That kind of society requires that Black people “sit at the table” of equality in this country and, to do that, they must enjoy a full, robust relationship with the internet that is equal to all other groups of people.

That, today, is simply not the case.

It's happening right under our noses!

Let’s Stop Google from Gobbling Up Our Schools

(The following article was co-written by Dr. Jackie Smith — of the International Network of Scholar Activsts — and TCBH writer Alfredo Lopez. It is being published here and in other places.)
 

In October of 2006, Google launched its Apps for Education, with Arizona State University being its first client. Today there are more than 25 million individual users in both K-12 and higher ed institutions, and 74 of the top 100 universities use Google apps for their university communications and software applications.

Victor Alhadeff, CEO of Boost eLearning, a Google for Work and Google for Education partner, cites projected figures exceeding 110 million users by 2020. He notes that the current user base represents only about 4.5% of the potential market, and that there is tremendous potential for growth—mainly in developing countries.

Google’s educational packages include things like the google calendar, Google docs, Google classroom, gmail, and most recently it has added the Chromebook. Chromebooks are low-cost and easy-to-use notebooks that come with support and built-in access to Google Apps. They are offered to schools participating in Google for Education for $149. Google reports that it sold more than 1 million Chromebooks in just the second quarter of 2014. In November of 2014, the New York City School Department of Education adopted Chromebook as part of its approved and supported tools in its 1800 schools.

Schools across the U.S. and around the world are now “going Google,” as the companies marketers like to say.

Google Drive in Our CollegesGoogle Drive in Our Colleges

Why should we worry?

Why the Best Candidate Can't Win the Support of People of Color

Where the Bern is Fizzling

In the recent New York primaries, Bernie Sanders experienced some very cold water thrown in his face. Not only did he lose, and soundly, but he was served a major lesson about one of the primary deficiencies in his campaign.

While the pundits joined his campaign organizers in attributing Hilary Clinton’s victory to her past as Senator from the state, most have ignored the problem the this defeat laid bare: Sanders’ campaign is weakest among people of color and, among black people, it has virtually no constituent support.

In today’s United States, you can’t become the Presidential candidate of the Democratic Party without that support. Bernie doesn’t have it and probably won’t get it and so those of us who support his candidacy — which merits support for his integrity, thinking and progressive commitment — are left to analyze why and observe with frustration what could have been. Had Bernie Sanders done a few things differently, he could well have been our next President.

 Great politics and a major deficiencyBernie Sanders: Great politics and a major deficiency
 

The tale of woe spins on a problem that will plague the Democratic Party from now on if it doesn’t make the needed adjustment, an adjustment that movements of struggle all over this country have been trying to make for the last 15 years. It starts by answering a simple question: What exactly is the role of people of color, particularly those of African descent, in American politics and how does a progressive campaign like Bernie’s recognize and address that role?
To hear Alfredo Lopez and Dave Lindorff discussing Sanders and the future of his campaign, click here or on the imageTo hear Alfredo Lopez and Dave Lindorff discussing Sanders and the future of his campaign, click here or on the image
 

Whatever its motives, Apple is on the right side

Apple Champions Privacy; Government Seeks to Trash It

Truth can be stranger than fiction…or at least more surprising. Apple Computer is the current champion of privacy against U.S. government attempts to expand its spying on us. The company, a frequent NSA and FBI collaborator in the past, finds itself in the strange position of confronting a federal court order to dislodge its iPhone security system, an action Apple insists will cripple encryption as a privacy-protection measure.

Last week, federal judge Sheri Pym ordered Apple to help the government de-crypt data on the iPhone of Syed Farook. Farook and his wife, Tashfeen Malik, shot up a government employees’ Christmas Party last year in San Bernardino, California killing 14 people and injuring many more. The couple are suspected Islamist terrorists and the government wants to know about Farook’s calls and text messages.

Apple’s CEO Tim Cook says that complying with the order would deeply damage all encryption on the iPhone and Apple has appealed it. The government counters that it’s doing no such thing: the order it insists is for one phone and Apple can easily help de-crypt the phone without affecting everyone else’s.

 Taking the Right StandApple CEO Tim Cook: Taking the Right Stand
 

The case has drawn enormous attention. Apple is…well…Apple and what it does is big news even before it does it. Encryption has become a major issue after whistle-blower revelations about how the government, particularly the National Security Agency, vacuums massive information from people in this and other countries every second of the day. There has been a predictable flurry of speculation about how the government might get that info without Apple’s help and the analysis about the potential impact has been voluminous, ranging from accepting Apple’s argument to calling it absurd.

In the roar, however, some truth is being drowned out. On the one hand, with ever increasing consciousness about privacy and security, Apple may be acting not out of commitment to privacy but because taking the stand may be good for business. It’s not clear how long it will resist. On the other hand, the government’s “only one case” argument is an outrageous and cynical lie. If Apple complies with the court order, the use of encryption on cell-phones will suffer profound and lasting damage.

That, many believe, is the real reason why the government wants Apple’s cooperation. “The government’s goal in this case has little to do with unlocking a single iPhone,” wrote surveillance expert Joshua Kopstein, “and everything to do with establishing a legal precedent that guarantees them the ability to achieve this access on any device.”

To put it mildly, there is a lot at stake.

He's the best but is he all we need?

The 'Bern' and the Internet

Bernie Sanders’ stunning success in the campaign for the Democratic Presidential nomination, highlighted by what is effectively a victory in the Iowa caucuses this past Monday, provokes serious thinking about what a Sanders presidency would look like.

Were he to take office, he would be doing so at a moment where the human race is considering the possibility of its extermination and thinking about ways to survive. In that conversation about survival, the Internet takes part of the center stage. It is not only a critical tool for education and information on our present and future but the communications tool in the struggle to have a future.

It is here that Sanders can mark his progressive territory because the Internet is so important to people’s lives and our movements of struggle. If Sanders is serious about this “political revolution” he talks about and has yet to really define, we’re going to need the Internet to make it happen.

 What are those possibles?Bernie Sanders: What are those possibles?
 

So the question is how good are Bernie’s politics on Internet issues. The answer is better than any other candidate’s. On issues of the Internet, Bernie is a vocal and public supporter of the Internet’s progressive movement but he’s not yet a leader. Whether he becomes a leader may impact the Internet’s freedom and, in the process, his own presidential aspirations.

Is T-Mobile's video app an attack on Net Neutrality?

Binge On, Opt In, Truth Out

Last week, T-Mobile’s CEO John Lagere publicly asked the Electronic Frontier Foundation a straightforward question: “Who the f*** are you anyway, EFF? Why are you stirring up so much trouble and who pays you?”

The question, delivered in a short podcast by the telephone mogul, was in response to a question EFF had asked T-Mobile: Doesn’t your latest video product, called Binge On, violate both the letter and spirit of the Net Neutrality laws?

That attack on EFF was the second part of Lagere’s response. Most commentators agree that it was just a dumb rant. The first part of his response was that Binge On’s software, which selects the best available data-stream for the user, doesn’t violate any Net Neutrality laws at all. That, the EFF says, is a lie.

John LagereJohn Lagere

In the resulting dust-up, T-Mobile has suffered a significant public relations hit and many technology analysts are now aggressively debating whether the company not only violated FCC rules but misled its customers in the process.

But the real question is whether this is actually illegal. If it isn’t, T-Mobile’s new product may be the first step taken by a telecommunications company in a dance several cellphone giants are about to join. Everyone in this industry is looking for a way around the FCC’s Net Neutrality decision and some say T-Mobile may have found one. It’s another round in the fight to keep the Internet alive.