In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Showing posts with label Big Brother. Show all posts
Showing posts with label Big Brother. Show all posts

Tuesday, May 3, 2016

9912 - Bohra community's smart card system shows us what a post-Aadhaar world could look like-Scroll.In

BIG BROTHER

Published Apr 30, 2016 · 09:15 am.   Updated Apr 30, 2016 · 09:57 am.


The sect uses radio-frequency enabled identity cards to keep track of the religious activities of its members.

Image credit:  Danish Siddiqui/Reuters

A month after the Lok Sabha hurriedly passed the Aadhaar Bill, the debate over privacy and surveillance related to the gathering of biometric data by the Unique Identification Authority continues. The Bill, notified as a law on March 28, allows the government to collect and centralise biometric data of its citizens, and assign each individual with a unique 12-digit identification number.

Though Aadhar numbers are ostensibly to be used to transfer government subsidies and benefits to those eligible for a variety of welfare schemes, the law also gives the Unique Identification Authority the discretion to let any “requesting entity”, including private businesses, access the Aadhaar database. Even before the Aadhaar bill was notified, some private companies began to advertise apps and services that would use Aadhaar numbers to perform background checks on potential employees. This is worrying in a country without a privacy law in place.
For now, citizens can only imagine the extent to which their biometric data could be misused. But why just imagine? To get a clearer picture of what unwanted mass surveillance could look like, we need to look only as far as the small Dawoodi Bohra sect of Shia Islam, and the electronic identity cards it has made mandatory for its followers.

From E-jamaat to ITS
Dawoodi Bohras, who predominantly hail from Gujarat, are estimated to number 1.5 million worldwide. Around half of them live in India. A close-knit business community, the Bohras are known to be wealthy, well-educated and also tightly-controlled by the dawat – the religious and administrative headquarters of the sect. The head of the dawat is the community’s leader, known as the Syedna.

A decade ago, the leadership issued mandatory E-jamaat cards for all Bohras. These were identity cards linked to an electronic database that contains personal and professional details of individual community members. The plastic E-jamaat card was meant to serve as a Bohra’s passport to the community – to be scanned while entering mosques or pilgrimage spots.

Around three years ago, all Bohras were asked to upgrade their E-jamaat cards to new smart cards called ITS cards (short for Idaratut Ta’reef al Shakhsi). These are radio frequency-enabled, bar-coded identity cards that connect to an international database managed by the Bohra dawat.

To upgrade to the ITS card, Bohras were expected to report at their local mosque and get photographed with very precise specifications, much like a passport photo. While their biometric data, such as fingerprints or iris scans, were not taken, the ITS registration form asked for personal and professional details of an individual’s entire family, which some Bohras found intrusive. “I remember asking them how secure they would keep such sensitive information,” said Fatema (identity concealed on request), a Bohra from the UK. “But of course I got no answer.”

The Bohra website for the authentication of the ITS smart card.

Big Brother watching?
Like the E-jamaat card, Bohras are told to scan their ITS cards every time they enter a mosque, community hall or musafir khana (pilgrim guest house) anywhere in the world. Access to the dawat’s main website is also restricted to those who have an ITS number. Thus, only card-holders can access online application forms to go for pilgrimages or attend major religious events.

For many pious Bohras, this is a welcome convenience. But for many others, it is a form of policing. “The card records everything,” said Jameela (identity concealed on request), a Mumbai resident. “[From] the number of times you go to the masjid, how often you attend Moharram sermons, what time you enter the mosque for sermons and more.”

Faiyaz (identity concealed), a Bohra businessman from Pune, said he resented the fact that the ITS card was considered mandatory for anyone who wished to remain within the community fold. “Our privacy is completely lost,” said Faiyaz. “Last Moharram, I actually got a call from my local mosque asking me why I had not been attending sermons, because they saw that my card had not been swiped. I know people who send their cards with their wives to be swiped by proxy at the mosque.”

Even donations are not anonymous anymore, said Faiyaz, because religious authorities insist on recording the donated amount on the ITS database.

Community members are afraid to openly criticise the Syedna or the dawat because it could entail getting excommunicated. But the resentment against the surveillance enabled by the smart card is evident on online forums. One thread on Dawoodi-Bohras.com is called “Shredded my E-jamaat card”.

“The card is really creepy because the moment you scan it, they can see your entire history of records instantly,” said Fatema. “They say it is for organisational purposes, but it’s really like Big Brother is watching you.”

ITS and Aadhaar
This sentiment is familiar to activists protesting the use of the Aadhaar card. An electronic database of citizens’ demographic and biometric information could easily be used for similar surveillance of anyone the state may deem suspicious. Handing over such data to private, commercial parties poses even greater threats to privacy.

While the government has claimed that the biometric information will not be handed out to any “requesting entity”, the Aadhaar Act allows for this data to be disclosed to any government joint secretary “in the interest of national security” – a phrase that remains undefined.

“Aadhaar is a platform that will be used to converge all existing databases, and it is already happening,” said Gopal Krishna, a member of the Citizens Forum for Civil Liberties. “The fear is that it could be used to classify and profile all kinds of citizens.”
Krishna said the Bohra ITS card can easily be compared to the Aadhaar. “The community’s members need to realise that electronic databases are never really secure, and may not remain in control of the community authorities,” he said. “Bohras are endangering themselves because their information can be used not only for surveillance by their own clergy but also can be used by any hostile body to get personal information about them.”

We welcome your comments at letters@scroll.in.

Saturday, April 23, 2016

9864 - How a Cashless Society Could Embolden Big Brother - The Atlantic


In 2014, Cass Sunstein—one-time “regulatory czar” for the Obama administration—wrote an op-ed advocating for a cashless society, on the grounds that it would reduce street crime. His reasoning? A new study had found an apparent causal relationship between the implementation of the Electronic Benefit Transfer system for welfare benefits, and a drop in crime.
Under the new EBT system, welfare recipients could now use debit cards, rather than being forced to cash checks in their entirety—meaning there was less cash circulating in poor neighborhoods. And the less cash there was on the streets, the study’s authors concluded, the less crime there was.
Perhaps burglaries, larcenies, and assaults had gone down because there was simply less to readily steal. Perhaps, also, the debit cards deterred people from spending money on drugs and other black market goods. While nothing was really stopping them from withdrawing cash and then spending it illegally, the famous Sunsteinian Nudge was in effect—the very slightest friction in the environment pushed people away from committing crime.
The year after Sunstein’s op-ed was published, in a seemingly unrelated incident, a student at Columbia University was arrested and charged with five drug-related offenses, including possession with the intent to sell. Supposedly, his fellow students and customers had paid him through the Paypal-owned smartphone app Venmo.
Venmo makes every transaction public by default. The app features a social-network-like feed where you can see your friends sending each other varying sums of money, often accompanied with cute descriptions and emoji. The alleged dealer asked his customers to write a funny description for every transaction, and in doing so, turned his feed (and others’) into an open record of drug trafficking.
Nothing was really stopping the students from going to an ATM and withdrawing cash to use in the old-fashioned way. But that takes time and energy and meanwhile Venmo is sitting right in your pocket. The Ivy League’s best and brightest were Nudged into narcing on themselves.
In a cashless society, the cash has been converted into numbers, into signals, into electronic currents. In short: Information replaces cash.
Information is lightning-quick. It crosses cities, states, and national borders in the twinkle of an eye. It passes through many kinds of devices, flowing from phone to phone, and computer to computer, rather than being sealed away in those silent marble temples we used to call banks. Information never jangles uncomfortably in your pocket.
But wherever information gathers and flows, two predators follow closely behind it: censorship and surveillance. The case of digital money is no exception. Where money becomes a series of signals, it can be censored; where money becomes information, it will inform on you.
* * *
In the spring of 2014, the Department of Justice began to come under fire for Operation Choke Point, an initiative aimed at discouraging or shutting down exploitative payday lenders. The ends were, on the face of it, benign, but the means were highly dubious.
At the time, the need for consumer protection was painfully obvious, but payday lending was and is still legal. So the DOJ got creative, and asked banks and payment processors to comply with government policies, and proactively police “high-risk” activity. Banks were asked to voluntarily shut down the kinds of merchant activities that government bureaucrats described as suspicious. The price of resistance was an active investigation by the Department of Justice. By December 2013, the DOJ had issued fifty subpoenas to banks and payment processors.
The most vociferous objections to Operation Choke Point came from gun-rights activists, as the firearms and ammunitions industry were labeled “high-risk.” But guns were only one industry among a bizarre miscellany that had been targeted. Tobacco sales, telemarketing, pornography, escort services, dating services, online gambling, coin dealers, cable-box descramblers, and “racist materials” were all explicitly listed on the Federal Deposit Insurance Corporation (FDIC) website as “merchant categories that have been associated with high-risk activity.”
Critics of Operation Choke Point saw the initiative as a policing of vice, rather than a consumer protection campaign. Many of the targeted industries—like pornography—could be seen as morally unsavory. And in many cases—as with guns—such moral judgments were highly politicized. One pundit wrote, “[W]hile abortion clinics and environmental groups are probably safe under the Obama administration, if this sort of thing stands, they will be vulnerable to the same tactics if a different administration adopts this same thuggish approach toward the businesses that it dislikes.”
For many conservatives, Operation Choke Point was a new liberal offensive in the culture war, a backhanded attack on the Second Amendment. There was never any evidence that guns were the primary focus of Operation Choke Point, but the outrage continued, fueled by an alarming number of stories of firearms vendors being cut off by credit-card companies or suddenly having their bank accounts closed.
Similarly, porn performers began to report being cut off from the financial system in similar ways, with Chase shutting down the personal bank accounts of “hundreds of adult entertainers” in the spring of 2014. But the troubling effects of Operation Choke Point wouldn’t stop there.
* * *
Eden Alexander fell ill in the spring of 2014. It started when she suffered a severe allergic reaction to a prescribed medication. Then by her account, when she sought medical attention, the care providers declined to treat her, assuming that the problem was illegal drug use.
Alexander is a porn actress. According to her, she was profiled and discriminated against, and failed to receive due medical care. In the end, she developed a staph infection. She couldn’t work, and she struggled to take care of herself, let alone her medical bills, her apartment, her rent, her dogs.
Her friends and supporters—many of whom were also in the adult entertainment industry—started a crowdfunding campaign on the GiveForward platform, hoping to cover her medical expenses. She had raised over a thousand dollars when the campaign was shut down and the payments were frozen.
GiveForward said that her campaign had violated the terms of service of their payment processor, WePay: “WePay’s terms state that you will not accept payments or use the Service in connection with pornographic items.”
A few hours after Alexander received the notice via email, and posted about it on Twitter, she had to be taken to the hospital in an ambulance.
The initial reaction on social media was to assume that Alexander had, again, been discriminated against, and that the campaign had been shut down because of the stigma of her occupation. It turned out, however, that one of her supporters had offered to exchange nude pictures for donations to Alexander’s fund, on Twitter. (Of course, this only raises the question of how WePay had discovered the tweet, and whether they were in the habit of policing the Twitter conversations around all of the crowdfunding campaigns they were servicing.)
The suspension of payments to Eden Alexander frustrated her well-wishers and supporters. How could it be so difficult to send Alexander a small amount of money? We live in a world of abundant crowdfunding platforms, and every year brings a fresh crop of money transfer smartphone apps. In the cashless society, payments are supposed to flow more freely and easily than ever.
Of course, the abundance of forward-facing services and apps conceals the infrastructure that made Operation Choke Point possible in the first place. Transactions route through several tangled layers of vendors, processors, and banks. At various points in the chain, all transactions squeeze through bottlenecks created by big players like Visa, Mastercard, and Paypal: These are the choke points for which Operation Choke Point is named.  
The choke points are private corporations that are not only subject to government regulation on the books, but have shown a disturbing willingness to bend to extralegal requests—whether it is enforcing financial blockades against the controversial whistleblowing organization WikiLeaks or the website Backpage, which hosts classified ads by sex workers, and allegedly ads from sex traffickers as well. A little bit of pressure, and the whole financial system closes off to the government’s latest pariah. Operation Choke Point exploited this tendency on a wide scale.
It’s probably fair to say that the federal government never targeted Eden Alexander, and that her hospitalization was not a foreseeable consequence of that bare list of bullet points put out by the FDIC—the list that threw “Pornography” next to “Debt Consolidation Scams” and “Get Rich Products.”

FDIC
But subsequent statements made by WePay sketch out a cause-effect relationship between Operation Choke Point and the shutdown of Alexander’s crowdfunding campaigning, revealing how powerful the ripple effects of such initiatives could be. “WePay faces tremendous scrutiny from its partners & card networks around the enforcement of policy, especially when it comes to adult content,” a representative wrote in a blog post. “We must enforce these policies or we face hefty fines or the risk of shutdown for the many hundreds of thousands of merchants on our service. We’re incredibly sorry that these policies added to the difficulties that Eden is facing.”
Where paternalism is bluntly enforced through a bureaucratic game of telephone, unpleasant or even inhumane unintended consequences are bound to result. Looking at the FDIC bullet point list of “high-risk” industries, it’s strange to see a list of a handful of actually-illegal activities (e.g., “scams” and “Ponzi schemes”) alongside legal vices—gambling, tobacco sales, and pornography.
The Electronic Benefit Transfer system is largely benign, and indeed it is a step towards offering banking for the “unbanked”—and that in itself could be a great benefit for a segment of the population that currently must rely on payday loans and check cashing operations. However, it is part of a larger trend, pushing us closer to a world where the cashless society offers the government entirely new forms of coercion, surveillance, and censorship.
EBT nudged society’s most vulnerable closer towards the cashless society; Operation Choke Point used the affordances of the cashless society to enforce what its proponents saw as a consumer protection scheme, and what its critics saw as a campaign against vice. Choke Point rippled out across society—by assessing certain industries as “high-risk,” the FDIC pressured the financial industry into policing and punishing legal activities. Eventually this effect trickled down to WePay, which concluded it had to cut Eden Alexander off from her fundraiser.
Alexander’s ordeal was made possible by our march towards the seemingly inevitable cashless society. Where electronic payments reign supreme, the choke points become more important than ever. Cash has not always been with us—indeed, credit systems predate the use of gold and silver as money. But it is fair to say that we are seeing an unprecedented future in which the totality of financial activity is captured within the same informational system, one that can be both monitored and influenced by a powerful and sprawling administrative state.
The cashless society makes it more possible for the vulnerable to experience Eden Alexander’s ordeal. On the face of it, it’s bizarre that a consumer protection scheme resulted in what Alexander suffered. But consumer protection and anti-vice run along in the same vein: It is all paternalism, and in particular, paternal regulation of the poor.
And when it comes to anti-vice in particular, the poor suffer the most—they are held to a higher moral standard than others, and are policed and punished for straying from it. Welfare recipients must undergo invasive and time-consuming drug testing. Women (often women of color) walking in areas “known for prostitution” are hassled or even arrested for simply carrying condoms in their purse.
A cashless society promises a world of limitation, control, and surveillance—all of which the poorest Americans already have in abundance, of course. For the most vulnerable, the cashless society offers nothing substantively new, it only extends the reach of the existing paternal bureaucratic state.
* * *
The poor may be disparately impacted, but the cashless society affects everyone. And so relatively privileged technolibertarians have long feared the cashless society, seeing it as an electronic Panopticon, one of a host of privacy erosions introduced by the digital age. This fear has motivated a number of innovations, from David Chaum’s ecash (described in his 1985 paper “Security without identification: transaction systems to make big brother obsolete”), to the much-hyped Bitcoin protocol.
Chaum focused on circumventing the surveillance-capabilities of digital cash; bitcoin’s pseudonymous creator (or creators) Satoshi Nakamoto focused on eliminating the ability of trusted third parties to prevent or reverse transactions—the very capability that allows the kind of financial censorship encouraged by Operation Choke Point. These cryptocurrencies are attempts to create vents and pockets of freedom inside the future cashless world.
Their success has been, at best, dubious. I needn’t tell you about the viability of ecash. If you’ve heard of it, you already know; if you haven’t, that tells you everything already. As for bitcoin, while it has certainly seen greater adoption, the digital currency has been hit with increasing regulation, concentrated on the bitcoin exchanges which trade government currency for bitcoin. This regulatory trend has recreated the very same bottlenecks and choke points that Satoshi Nakamoto sought to circumvent in the first place.
But cryptocurrency isn’t really a federal priority, and as long as that’s the case, it can be a viable backchannel when payment processors institute blockades. Payment processors stopped serving WikiLeaks in the wake of Cablegate; eventually the organization was funded mostly through bitcoin. And when Visa and Mastercard stopped serving Backpage in 2015, sex workers also turned to bitcoin.
* * *
In June 2015, Thomas Dart, the sheriff of Cook County—the largest county in Illinois, which includes the city of Chicago—wrote an open letter to the major payment processors. “As the Sheriff of Cook County, a father and a caring citizen, I write to request that your institution immediately cease and desist from allowing your credit cards to be used to place ads on websites like Backpage.com.”
Backpage is a website that hosts classified ads, including ads from escorts. It is so prominent it has been called “America’s largest escort site.” According to several anti-sex-trafficking organizations, it is also a haven for sexual slavery. Some sex workers say, however, that if they themselves are prevented from advertising, they are put in harm’s way. “[H]aving the ability to advertise online allows sex workers to more carefully screen potential customers and work indoors,” writes Alison Bass. “Research shows that when sex workers can’t advertise online and screen clients, they are often forced onto the street, where it is more difficult to screen out violent clients and negotiate safe sex (i.e. sex with condoms). They are also more likely to have to depend on exploitative pimps to find customers for them.”
The nuances of this debate were never argued in a legislature or even a court of law. Visa and Mastercard immediately folded in the face of Dart’s letter, and stopped serving Backpage, making it nearly impossible for sex workers (and allegedly traffickers as well) to advertise.
Dart’s open letter resembled Operation Choke Point, in a far flimsier yet more menacing fashion. If Dart had brought a legal action against Backpage, he would have no doubt been trounced in court. The sheriff had already lost a lawsuit against Craigslist in 2009 over their erotic services ads. Although Dart clearly identified himself as the Sheriff of Cook County, he never actually said he was actually going to enforce any law against Visa, Mastercard, or even Backpage. The letter made reference to the federal anti-money-laundering statute and to the alleged existence of sex-trafficking on the website, but it was in essence a missive composed to elicit fear, uncertainty, and doubt. As with Operation Choke Point, it was a request for voluntary action, rather than a criminal complaint, indictment, or injunction.
Perhaps if Visa or Mastercard had put up a fight, Dart would have followed through on his veiled threats, the way the Department of Justice issued subpoenas to errant banks and processors. But because the two companies capitulated instantly, there’s no way of knowing.
In December 2015, a federal appeals court in Illinois granted Backpage an injunction against Dart. The opinion, written by the esteemed Richard Posner, ripped into Dart for trying to “shut down an avenue of expression of ideas and opinions through ‘actual or threatened imposition of government power or sanction’” in violation of the First Amendment.
In court, Visa claimed that “at no point did Visa perceive Sheriff Dart to be threatening Visa,” and that it had simply made a voluntary choice to stop servicing Backpage. But back in June, Dart’s director of communications had sent an email informing Visa that the Sheriff’s office was about to hold a press conference on Backpage and sex trafficking, and that “[o]bviously the tone of the press conference will change considerably if your executives see fit to sever ties with Backpage and its imitators.” Internal emails between Visa employees at the time referred to the Dart press conference email as “blackmail.”
For Judge Posner, Dart’s tactics were troubling. They could be easily replicated, following a formula of “unauthorized, unregulated, foolproof, lawless government coercion ... coupling threats with denunciations of the activity that the official wants stamped out, for the target of the denunciation will be reluctant to acknowledge that he is submitting to threats but will instead ascribe his abandonment of the activity to his having discovered that it offends his moral principles.”
Posner made no mention of it in his opinion, but the same strategy had been repeated years earlier, when Senator Joseph Lieberman had convinced the payment processors to cut off WikiLeaks in the wake of the publication of the State Department diplomatic cables. As with Backpage, and was with Operation Chokepoint, this was a “voluntary” decision on their part. The financial blockade would only be lifted (partially) two years later in 2013.
The Seventh Circuit Backpage decision is an important First Amendment precedent, a much-needed corrective in an age of ever-more-frequent financial blockading. But much of the decision builds its case by pointing to Sherriff Dart’s hamfisted tactics, the obvious coercion that Visa employees called “blackmail” in writing. What happens to a more factually subtle case that lands in front of a less-libertarian-leaning judge?
As paper money evaporates from our pockets and the whole country—even world—becomes enveloped by the cashless society, financial censorship could become pervasive, unbarred by any meaningful legal rights or guarantees.
* * *
In January 2011, shortly after the WikiLeaks financial blockade was put into place, the founder of WePay posted an Ask Me Anything on Reddit, calling his company the “anti-Paypal.” He wrote that he was particularly concerned with how readily PayPal froze accounts that collected money for good causes.
It had only been a month or two since payment processors—including PayPal—had chosen to blockade WikiLeaks. So predictably, one commenter asked a direct question about WikiLeaks.
“Theoretically, you can use WePay to collect money from people in your social circles, and donate that money to whomever you'd like,” he wrote in response. “That being said, we've intentionally tried to keep our heads down and sit on the sidelines for this one. … [W]e pride ourselves on not freezing accounts, but in extreme cases like wikileaks, there is always the chance that authorities will force us to do so.”

Four years later, the company seemed to have decided that a fundraiser for a sex worker’s hospital bills was an extreme case like WikiLeaks.

Tuesday, July 9, 2013

4401 - Big Brother is Watching - EPW


What was suspected for long stands confirmed; states are monitoring their citizens' conversations.

The suspicion among internet democracy and civil liberty activists that the behemoth databases and servers of Google, Facebook, Microsoft, Apple and Skype have for long been used by intelligence agencies in the United States (US) now stands confirmed. Edward Snowden, a contractor for the secretive US National Security Agency (NSA), bravely leaked confidential and classified documents to The Guardian in early June which confirmed the existence of an electronic surveillance programme code-named PRISM. Launched in 2007, PRISM enabled the NSA to perform in-depth surveillance on electronic communications and data by accessing servers of several “participating technology companies”.

Since the revelations the companies have denied active participation beyond what is legally permissible under US law – specifically the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (FISA) – but the leaked documents suggest that they have gone out of their way to enable the NSA to collect data. The documents point out that the NSA is collecting 200 billion pieces of intelligence every month. The leaks also pointed to other related data mining programmes such as “Boundless Informant” that analysed metadata information captured by PRISM, colour coding data retrieved from around the world based on intensity of surveillance – Iran was where the highest amount of data was gathered and India was fifth in the leaked list. Such metadata are enough to construct behavioural and interest patterns among internet users, so claims that the metadata does not carry much informational value unless it pertained to specific suspects are spurious.

It goes without saying that this surveillance programme run by the US military industrial complex – for want of a better definition a term for the collaboration between the US military establishment and the biggest internet and communication companies in the world – is a massive attack on the right to privacy of billions of users of internet and communication services. US government officials, senators and intelligence spokespersons have defended the programme arguing that it has served the purpose of national security and have added that the programme has been used only for surveillance of foreign subjects. This is doubly unacceptable for it makes a mockery of the trust shown by consumers across the world who sign up for services offered by the internet companies (which claim to operate on the basis of elaborate privacy policies) and shows scant regard for the sovereignty of foreign nations. The world’s super power has been engaged in mass spying of citizens and governments of foreign nations. There is no other way of describing the NSA’s activities.
States today realise that the technology that enables surveillance of the internet and electronic communications is a useful tool to identify and curb voices of dissent. Globally, public attention has been fixated on “authoritarian” China and its use of extensive surveillance and firewall operations to monitor and restrict internet communications domestically for “national security purposes”. As the NSA programmes have shown, the so-called liberal democratic states follow similar methods, on perhaps a much larger scale.

In the US, the so-called “war against terror”, which enabled legislations such as the Patriot Act of 2001 and the FISA amendments, has given the intelligence bodies enormous powers to conduct mass surveillance. These institutions have utilised data in ways that have arguably further fuelled and exacerbated terrorism. For example, surveillance data have enabled intelligence agencies to conduct illegal operations such as drone attacks which have killed thousands of innocents in countries such as Pakistan and Afghanistan.

Alarmingly, the Indian state, which itself has been spied upon by the US, has sought to emulate its western counterparts in enacting legislation that would enable similar forms of mass electronic surveillance. The Information Technology Amendment Act of 2008 enables e-surveillance. Government agencies such as the Telecom Enforcement, Resource and Monitoring (TREM) and the Centre for Development of Telematics (C-DOT) in collaboration with the Intelligence Bureau have reportedly prepared what is called a Central Monitoring System (CMS) that facilitates collection of call data records and data mining for intelligence purposes. The CMS has been in operation since April 2013, and when combined with the flawed Unique Identification project that seeks to link all databases across government services, it is apparent that the infrastructure for a massive surveillance apparatus is being constructed.

It remains to be seen as to how the US judicial system will react to the submissions by civil rights groups opposing the surveillance programmes of the US state. Will India’s governing authorities realise the dangers of emulating such dystopian surveillance systems? Will India’s civil society and political representatives rise to the occasion to prevent these attacks on our fundamental rights? It is a battle which cannot be evaded.

Tuesday, February 26, 2013

3068 - Will Americans Soon Not Be Able To Buy, Sell Or Get A Job Without A Global ID Card?



February 22nd, 2013


A plan being pushed in Congress right now by senators from both major political parties would force all Americans to get a biometric national ID card.  It is being promoted as a key “immigration reform” measure, but the truth is that a national ID card is much more about the government’s endless appetite for more control over the American people.  If this national ID card plan is passed by Congress, you will not be able to get a job without one.  So how are you going to survive if you can’t work?  In addition, this national ID card would undoubtedly soon be used to identify us for all sorts of other purposes.  For example, have you tried to open up a bank account lately?  They make you jump through all sorts of hoops to prove that you are who you say that you are.  So what would happen if the government decided to require you to show your national ID card before opening up a bank account?  If you refused to get a card, how would you be able to function in society without a bank account?  Would you try to conduct all of your transactions in cash only?  That might work for a while.  And of course you would not be able to drive or get on a plane without your national ID card.  So forget about going anywhere.  Are you starting to get the picture?  Unfortunately, the push for a national ID card in the United States is only a small part of the overall push toward a “global ID card” that is happening all over the planet.  The eventual goal is to have a “universal ID” that every man, woman and child on the planet will be forced to take.
That is why it is so important for the American people to speak up about this.
Right now, all of the big mainstream media outlets are lining up on the side of a national ID card.  For instance, just check out this short excerpt from a recent Washington Post article entitled “The case for a national ID card“…


An effective solution would be to issue tamper-proof, biometric ID cards — using fingerprints or a comparably unique identifier — to all citizens and legal residents. Last week, bothPresident Obama and a bipartisan group of eight senators seeking immigration reform urged something along those lines, without calling it a universal national identity card. That’s a major step forward.
And of course the Wall Street Journal is reporting on this too…
Key senators are exploring an immigration bill that would force every U.S. worker—citizen or not—to carry a high-tech identity card that could use fingerprints or other personal markers to prove a person’s legal eligibility to work.
The idea, signaled only in vaguely worded language from senators crafting a bipartisan immigration bill, has privacy advocates and others concerned that the law would create a national identity card that, in time, could track Americans at airports, hospitals and through other facets of their lives.
According to investigative reporter James Tucker, there are those in the Obama administration that are optimistic that they will be able to get a national ID card through Congress now that Ron Paul has left the House of Representatives…
At a recent reception in Washington, D.C., an AMERICAN FREE PRESS source overheard Thomas E. Donilon, a White House national security advisor and past Bilderberg member, speaking of Paul’s retirement and the good chance that the global card could now be shepherded through Congress. Paul’s son, Senator Rand Paul (R-Ky.), would not object to the plan, added the individual with whom Donilon was talking. He was referring to the fact that Senator Paul has backed off from the strong pro-nationalist positions of his father because he is fantasizing about being elected president in 2016.
So will anyone in Congress step up and fight this on behalf of the American people?
Let’s hope so.
But of course there are many other large nations that are actually far ahead of the United States when it comes to implementing this global ID card scheme.
Just check out what is going on in Indonesia
Since the start of the government of Indonesia’s multi-modal biometrics-based National Electronic ID Card (e-KTP) program in August 2011, record enrollments are being achieved across the country’s population of 172 million ID-eligible residents.
More than 103 million people have been enrolled and de-duplicated in one year with 80% or 140 million residents of the eligible population already enrolled and 85% already processed. Statistics show that over 1 million de-duplication transactions are being achieved in a single day in the data center and 600,000 enrollments being achieved in a single day in the field. In addition 60 million ID cards have been printed.
And India is currently collecting biometric information on more than a billion people…
In India, a massive effort is underway to collect biometric identity information for each of the country’s 1.2 billion people. The incredible plan, dubbed the “mother of all e-governance projects” by the Economic Times, has stirred controversy in India and beyond, raising serious concerns about the privacy and security of individuals’ personal data.
The plan is moving ahead at a clip under the auspices of the National Population Register (NPR) and the Unique ID (UID) programs, separately governed initiatives that have an agreement to integrate the data they collect to build the world’s largest biometric database. Upon enrollment, individuals are issued 12-digit unique ID numbers on chip-based identity cards. For residents who lack the necessary paperwork to obtain certain kinds of employment or government services, there’s strong incentive to get a unique ID. While the UID program is voluntary, enrollment in the NPR program is mandatory for all citizens.
Are you starting to understand what is happening?
This is a global effort.
At this point, there are approximately 100 countries that now issue mandatory ID cards, and undoubtedly this campaign to gather the biometric information of every person on earth will continue to spread.
In fact, soon you may not even be able to log in to your favorite Internet sites without a fingerprint or an iris scan.
Does that sound crazy to you?
It doesn’t sound crazy to the major technology firms that are a part of the Fast Identity Online Alliance
Imagine logging on to your eBay account with your fingerprint. Or perhaps accessing your Facebook account via an iris scan.
It might seem a bit much for the average computer user, but it may not be that far off if an initiative is successful.
The use of biometric data as an added security measure is just one of the solutions being proposed by a consortium of firms who have come together to form the Fast Identity Online (FIDO) Alliance.
We live in a world that has become obsessed with information and obsessed with security.
At first, we may all just be forced to carry around ID cards, but eventually cards will not be considered to be good enough.
Cards are easily lost, they can be stolen, and they can be forged.
But what about an electronic tattoo?
Wouldn’t that be much more secure?
That is the argument that will be made.
And the advancements that have been made in the field of electronic tattooslately have got a lot of scientists very excited…
Temporary electronic tattoos could soon help people fly drones with only thought and talk seemingly telepathically without speech over smartphones, researchers say.
Does that sound “cool” to you?
That is how these changes will be marketed to the public.  They will be sold as the “hip” and “cool” things to do.
But the truth is that these electronic tattoos are incredibly dangerous.  They can receive electrical signals from your brain, and they can also send electrical signals to your brain…
The devices are less than 100 microns thick, the average diameter of a human hair. They consist of circuitry embedded in a layer or rubbery polyester that allow them to stretch, bend and wrinkle. They are barely visible when placed on skin, making them easy to conceal from others.
The devices can detect electrical signals linked with brain waves, and incorporate solar cells for power and antennas that allow them to communicate wirelessly or receive energy. Other elements can be added as well, like thermal sensors to monitor skin temperature and light detectors to analyze blood oxygen levels.
This is very frightening stuff.
But most people just do whatever the “authorities” tell them to do without thinking about it.
So will you take a national ID card if Congress requires you to?
Will you take an electronic tattoo on your hand or your forehead someday if the authorities require it for “security” reasons?
The control freaks that run things just love to find new ways to watch us, track us and control us.
For example, just check out what is going on in New York City.  The following is from a recent article in the Telegraph
Created by Microsoft and the New York Police Department, the Domain Awareness System, known as “the dashboard,” is state-of-the-art crime fighting technology.
“The dashboard,” instantaneously mines data from the NYPD’s vast collection of arrest records, emergency 911 calls, more than 3,000 security cameras, license plate readers and portable radiation detectors and aggregates it into a user-friendly, readable form in the control room.
Eventually, that data will be able to be seen in real time by officers on laptops in their squad cars and on mobile devices as they walk their beat.
Could you imagine how much more intrusive such a system would be if “national ID cards” were constantly feeding information about all of us into their computers?
But the “authorities” insist that all of this “security” is making life so much “better” and “safer” for all of us.
Well, what about for 3-year-old Lucy Schulte?
She is a sweet little disabled girl in a wheelchair that has Spina bifida.  Recently she was getting ready to get on a plane to go to Disney World, but TSA workers decided that she was a potential terrorist and so they manhandled her and confiscated her stuffed toy.
You can see very disturbing video of this incident below…

Is this really want we want America to become?
For much more on how America is being transformed into a Big Brother police state, please see the following article: “29 Signs That The Elite Are Transforming Society Into A Total Domination Control Grid“.
So what do you think about all of this?
Do you believe that a global ID card is a good idea or a bad idea?
Would you take a national ID card if Congress made it mandatory?
Please feel free to post a comment with your thoughts below…