Cypherpunks: Freedom and the Future of the Internet Read online

Page 4


  JÉRÉMIE: We also have this example of Eagle, the system sold by the French company Amesys that was sold to Gaddafi’s Libya, and on the commercial document it was written, “Nationwide interception mechanism.” It’s a big box that you put somewhere and you just listen to all your people’s communications.45

  JULIAN: Ten years ago this was seen to be a fantasy, this was seen to be something only paranoid people believed in, but the costs of mass interception have now decreased to the point where even a country like Libya with relatively few resources was doing it with French technology. In fact most countries are already there in terms of the actual interception. It’s the efficiency of understanding and responding to what’s being intercepted and stored that’s going to be the next big leap. Now in many countries we have strategic interception of all traffic in and out of the country, but engaging in subsequent actions, like automatically blocking bank accounts, or deploying police, or marginalizing particular groups, or emancipating others, is still something we are on the cusp of. Siemens is selling a platform for intelligence agencies that does actually produce automated actions. So when target A is within a certain number of meters of target B according to their mobile intercept records, and target A receives an email mentioning something—a keyword—then an action is triggered. It’s on the way.

  FIGHTING TOTAL SURVEILLANCE WITH THE LAWS OF MAN

  JÉRÉMIE: So now it’s a fact that technology enables total surveillance of every communication. Then there is the other side of that coin, which is what we do with it. We could admit that for what you call tactical surveillance there are some legitimate uses—investigators investigating bad guys and networks of bad guys and so on may need, under the supervision of the judicial authority, to be able to use such tools—but the question is where to draw the line for this judicial supervision, where to draw the line for the control that the citizens can have over the use of those technologies. This is a policy issue. When we get to those policy issues you have politicians that are asked to just sign something and don’t understand the underlying technology, and I think that we as citizens have a role, not only to explain how the technology functions at large, including to politicians, but also to wade in to the political debates that surround the use of those technologies. I know that in Germany there was a massive movement against generalized data retention that led to the overturn of the Data Retention law in front of the constitutional court.46 There is a debate going on in the EU about revising the Data Retention Directive.47

  ANDY: You are describing the theory of the democratic state which, of course, does need to filter out some bad guys here and there and listen to their phone calls on the basis of a court decision with overview to make sure it is done in the proper way. The trouble with that is that the authorities need to act in compliance with the law. If they don’t do that then what are they good for? Especially with this strategic approach, democratic states within Europe are massively buying machines that allow them to act exactly outside the law in regard to interception because they don’t need a court decision, they can just switch it on and do it, and this technology can’t be controlled.

  JULIAN: But are there two approaches to dealing with mass state surveillance: the laws of physics; and the laws of man? One is to use the laws of physics by actually building devices that prevent interception. The other is to enact democratic controls through the law to make sure people must have warrants and so on and to try to gain some regulatory accountability. But strategic interception cannot be a part of that, cannot be meaningfully constrained by regulation. Strategic interception is about intercepting everyone regardless of whether they are innocent or guilty. We must remember that it is the core of the Establishment carrying such surveillance. There will always be a lack of political will to expose state spying. And the technology is inherently so complex, and its use in practice so secret that there cannot be meaningful democratic oversight.

  ANDY: Or you spy on your own parliament.

  JULIAN: But those are excuses—the mafia and foreign intelligence—they are excuses that people will accept to erect such a system.

  JACOB: The Four Horsemen of the Info-pocalypse: child pornography, terrorism, money laundering, and The War on Some Drugs.

  JULIAN: Once you have erected this surveillance, given that it is complex, given that it is designed to operate in secret, isn’t it true that it cannot be regulated with policy? I think that except for very small nations like Iceland, unless there are revolutionary conditions it is simply not possible to control mass interception with legislation and policy. It is just not going to happen. It is too cheap and too easy to get around political accountability and to actually perform interception. The Swedes got through an interception bill in 2008, known as the FRA-lagen, which meant the Swedish signals intelligence agency the FRA could legally intercept all communication travelling through the country in bulk, and ship it off to the United States, with some caveats.48 Now how can you enforce those caveats once you’ve set up the interception system and the organization doing it is a secret spy agency? It’s impossible. And in fact cases have come out showing that the FRA had on a variety of occasions broken the law previously. Many countries simply do it off-law with no legislative cover at all. So we’re sort of lucky if, like in the Swedish example, they decided that for their own protection from prosecution they want to go legal by changing the law. And that’s the case for most countries—there is bulk interception occurring, and when there is a legislative proposal it is to protect the ass of those who are doing it.

  This technology is very complex; for example in the debate in Australia and the UK about proposed legislation to intercept all metadata, most people do not understand the value of metadata or even the word itself.49 Intercepting all metadata means you have to build a system that physically intercepts all data and then throws everything but the metadata away. But such a system cannot be trusted. There’s no way to determine whether it is in fact intercepting and storing all data without having highly skilled engineers with authorization to go in and check out precisely what is going on, and there’s no political will to grant access. The problem is getting worse because complexity and secrecy are a toxic mix. Hidden by complexity. Hidden by secrecy. Unaccountability is built-in. It is a feature. It is dangerous by design.

  JÉRÉMIE: I’m not saying that the policy approach can work. I’m saying that this is the theory of how a democratic system would function, and indeed, even within this theory you have the secret services that are allowed to go beyond what is the rule for standard police forces and investigators. So even if we frame the behavior of the standard investigators properly, there would be other people who would be able to use those technologies. But there is a real question of whether or not we should regulate the fact of just buying and owning those technologies as opposed to regulating the use of them.

  JULIAN: This is the bulk interception kits that can intercept half a country or a city.

  JÉRÉMIE: Yes. Like a nuclear weapon: you cannot sell a nuclear weapon easily, and some countries may want to build one but have problems. When we talk about weapons systems it’s the technology that is regulated and not the use that is made of it. I think the debate might be about whether or not these technologies should be considered as war.

  JACOB: It depends. When it is weapons—and there is no question that surveillance equipment is a weapon in places like Syria or Libya—they specifically use it to target people politically. The French company, Amesys, targeted people in the United Kingdom using French equipment that would be illegal to run in France, and they sold it knowingly.50

  ANDY: And they’d never do that, right?

  JACOB: Well, Amesys were caught with their own internal documents in The Spy Files.51 If we’re going to talk about it in terms of weapons, we have to remember it is not like selling a country a truck. It’s like selling a country a truck, a mechanic and a team that goes in the truck that selectively targets people and then shoots them.

 
JULIAN: It’s like selling it a whole army of trucks.

  ANDY: It’s interesting that cryptography is regulated. There’s the Wassenaar Arrangement, which applies internationally, meaning you cannot export encryption technology, which helps to protect against surveillance technology, to those countries declared evil or, for whatever reason, problematic. But if you are dealing surveillance equipment you can sell that internationally. There are no export restrictions on that. The reason, I would say, is simply because even the democratically-run governments have a self-interest, which is to control. And even if you’re dealing with evil countries and you bring them surveillance equipment to do evil things you will benefit, because you will learn what they are listening to, what are they afraid of, who are the most important people in the country opposing the government, organizing political events and so on. So you will be able to predict future happenings, to sponsor actions and so on. Here we are in the very dirty game of what is happening between countries, and that’s the reality of why surveillance systems are not regulated.

  JULIAN: I want to explore this analogy of mass surveillance being a weapon of mass destruction. It was a fact of physics that it was possible to make an atomic bomb, and when an atomic bomb was made then geo-politics changed, and life for many people changed—in different ways, some positive perhaps, and others on the brink of total apocalypse. A regulatory movement applied controls and so far those controls have, with the exception of Japan, saved us from nuclear war. But it’s easy to tell when such weapons are used and when they are not.

  With the increase in the sophistication and the reduction of the cost of bulk surveillance that has happened over the past ten years, we’re now at a stage where the human population is doubling every twenty-five years or so—but the capacity of surveillance is doubling every eighteen months. The surveillance curve is dominating the population curve. There is no direct escape. We’re now at the stage where just $10 million can buy you a unit to permanently store the mass intercepts of a medium sized country. So I wonder if we need an equivalent response. This really is a big threat to democracy and to freedom all around the world that needs a response, like the threat of atomic war needed a mass response, to try and control it, while we still can.

  ANDY: I was seeing in Libya how the democratic movement ran into the surveillance stations, they took records, they provided evidence that Western companies supported the Gaddafi regime in suppressing political actions, and then the new government took over exactly these facilities which are now operating in full service again.52 So while I do agree that it would be a good idea to control this technology, I am a bit skeptical about the interests of citizens against the interests of people in power. I wouldn’t even call it governments necessarily, because whoever has the ability to listen to all the phone calls has the ability to do things. This is about stock rates also—economically, you can benefit a lot if you know what’s going on.

  JULIAN: Where countries have legislation as to what the targets of their major electronic spy agencies are supposed to be—agencies like the NSA in the United States, GCHQ (Government Communications Headquarters) in the United Kingdom, the DSD (Defense Signals Directorate) in Australia—they have changed that legislation to include economic intelligence. For example, say Australia and the US are vying for a wheat deal, they snoop on all the people who are involved in the deal. This has been around for a long time now, at least ten years in public—but it is granted because people are doing it anyway. It started with arms deals, where you have companies like Lockheed Martin, Raytheon, and Northrup doing arms deals, and also being involved in building mass interception systems because these groups are close at a patronage level. They got favors from their friends and covered arms deal intercepts under national security criteria. But now it applies to anything that could economically benefit a country, which is almost everything.

  JACOB: A good analogy that some people in the Chaos Communication Congress brought up in December 2011 was the concept of treating surveillance technology, especially tactical surveillance technology but also strategic surveillance technology, like landmines.53 I think that’s a very powerful thing. Just because it’s possible doesn’t mean that it’s inevitable that we will go down this path, and it doesn’t mean that we have to get all the way to the point of every person being monitored.

  There are some economic incentives that are against us though. For example, someone explained to me that the way that the Norwegian telephone system used to work is such that it would essentially run a meter which, depending on how far away your call, would run faster or slower. But it was not legal for the Norwegian telephone company to store or to keep a ledger of the actual metadata about the call you made, such as the number you dialed, specifically because of privacy concerns surrounding the Second World War. So it is possible to build that same technology in a way that is privacy-friendly but still allows for a market-based approach, which still allows for economic contributions. However we cannot win, for example, with GSM (mobile) technologies. At the moment the way that these systems are set up, not just in terms of billing but in terms of the architecture, means they have no location privacy, they have no content privacy.

  JULIAN: A mobile phone is a tracking device that also makes calls.

  JACOB: Exactly. For example, if we’re talking about everybody in the Third World being spied on, realistically what does that mean? It means their telephone systems, which are their link to the rest of the world, are spy devices when someone chooses to use the data collected in that way.

  ANDY: I saw African countries are getting a whole internet infrastructure, including fiber optic cable and backbone switches, as a gift from the Chinese.

  JACOB: As a ZTE gift or something like that?54

  ANDY: Yes, and of course the Chinese have an interest in the data, so they don’t need to be paid back in money, they take it in data, the new currency.

  PRIVATE SECTOR SPYING

  JÉRÉMIE: State-sponsored surveillance is indeed a major issue which challenges the very structure of all democracies and the way they function, but there is also private surveillance and potentially private mass collection of data. Just look at Google. If you’re a standard Google user Google knows who you’re communicating with, who you know, what you’re researching, potentially your sexual orientation, and your religious and philosophical beliefs.

  ANDY: It knows more about you than you know yourself.

  JÉRÉMIE: More than your mother and maybe more than yourself. Google knows when you’re online and when you’re not.

  ANDY: Do you know what you looked for two years, three days and four hours ago? You don’t know; Google knows.

  JÉRÉMIE: Actually, I try not to use Google anymore for these very reasons.

  JACOB: It’s like the Kill Your Television of the 21st century.55 Effective protest except the network effect prevents your protest from working.56 Kill your television, man.

  JÉRÉMIE: Well it’s not a protest, it is more my personal way of seeing things.

  ANDY: I watched these beautiful movies of people throwing their televisions out of three-storey houses.

  JÉRÉMIE: It’s not only the state-sponsored surveillance, it’s the question of privacy, the way data is being handled by third parties and the knowledge that people have of what is being done with the data. I don’t use Facebook so I don’t know much about it. But now with Facebook you see the behavior of users who are very happy to hand out any kind of personal data, and can you blame people for not knowing where the limit is between privacy and publicity? A few years ago, before digital technologies, people who had a public life were either in show-business, politics or journalism, and now everybody has the potential for public life by clicking a publish button. “Publish” means make something public, it means handing out access to this data to the rest of the world—and, of course, when you see teenagers sending pictures of themselves drunk or whatever, they may not have this vision that it means the whole of the rest of the world,
potentially for a very, very long period of time. Facebook makes its business by blurring this line between privacy, friends, and publicity. And it is even storing the data when you think that it is only meant for your friends and the people you love. So whatever the degree of publicity that you intend your data to be under, when you click publish on Facebook you give it to Facebook first, and then they give access to some other Facebook users after.

  JULIAN: Even this line between government and corporation is blurred. If you look at the expansion in the military contractor sector in the West over the past ten years, the NSA, which was the biggest spy agency in the world, had ten primary contractors on its books that it worked with. Two years ago it had over 1,000. So there is a smearing out of the border between what is government and what is the private sector.

  JÉRÉMIE: And it can be argued that the US spying agencies have access to all of Google’s stored data.

  JULIAN: But they do.

  JÉRÉMIE: And all of Facebook’s data, so in a way Facebook and Google may be extensions of these agencies.

  JULIAN: Do you have a Google subpoena Jake? Was a subpoena sent to Google to hand over information related to your Google account? WikiLeaks got subpoenas to our California domain name registrar dynadot, which is where the wikileaks.org registration is made. They were subpoenas from the secret ongoing Grand Jury investigation into WikiLeaks, asking for financial records, login records, et cetera, which it gave them.57

  JACOB: The Wall Street Journal reported that Twitter and Google and Sonic.net, three services that I use or have used in the past, each received a 2703(d) notice, which is this unusual form of secret subpoena.58