“Sad But True”: The Only Way To Save The Open Internet Requires Sucking Up To Corporate Titans
The Internet as we know it will permanently change if new rules proposed this week by the Federal Communications Commission (FCC) allow Comcast or AT&T to create a “fast lane” on the Web for companies that pay a fee. Content providers who buy off telecoms for faster speeds would simply outmuscle their counterparts, stifling innovation from startups that can’t afford to compete. If my local McDonald’s opened a special lane to their register that was closed to all competing traffic, while reaching the Burger King down the street required hacking through a mile of jungle, I’ll probably just get a Big Mac instead of a Whopper.
The FCC had to act, because of an appellate court ruling in January blocking their previous open Internet rules. But net neutrality advocates wanted the agency to reclassify broadband Internet as a common carrier service, as they do with telephones, preventing discrimination on whatever passes through the pipe. Instead, FCC Chair Tom Wheeler, a former cable industry lobbyist, opted for an alternative that will enrich Internet service providers (ISPs) and lead to a permanent digital divide. Wheeler’s justification, that no content would face discrimination, but telecoms can charge for faster service, has been roundly criticized, and with good reason. But will anyone be able to mobilize against the powerful interests pushing through the proposed rules?
There’s a recent precedent for Internet-based mobilization actually bringing down a corporate giveaway that initially looked inevitable. In 2011, Congress appeared close to sneaking through the Stop Online Piracy Act (SOPA) just before the Christmas holidays. The bill would have empowered the government to compel ISPs to shut down websites based on subjective audio or video copyright claims. It was a giant wet kiss to the movie and music industries, a bill that would have effectively eliminated user-generated content on the Web (could Facebook be expected to police their entire site minute-by-minute for copyright infringement?) and allowed media conglomerates to take over. You won’t be surprised that the staffers in House Judiciary Committee chair Lamar Smith’s office who wrote the bill left right afterward to become entertainment industry lobbyists.
But the Internet, in a coordinated pushback, beat SOPA, amid virtual silence from broadcast media, whose parent companies supported the bill. Web users of all political stripes bombarded Congress. At one point, Tumblr announced they were generating 3.6 calls per second. On January 18, 2012, hundreds of websites, including Wikipedia, participated in the largest Internet strike in history, redacting their content and posting links to help people register constituent complaints. Lawmakers walked away from the bill in droves; in the end, it never even got a vote.
The net neutrality fight shares some common elements with the SOPA battle. The universe of people affected—everyone who uses the Internet—is sufficiently big to enable a mass coalition. Demand Progress, a group active in the SOPA fight, has already begun to mobilize in conjunction with RootsAction, gathering 26,000 signatures on a petition in a matter of hours.
But the SOPA fight was truly trans-partisan, as conservatives made common cause with progressives against censorship of their websites. That potential doesn’t exist on net neutrality, as Republicans have rejected what they consider government regulation of the Internet. So the fight already begins with a narrower base. In addition, it’s easier to target individual members of Congress over proposed legislation, than rules from independent regulatory agencies (although, considering that the Obama Administration reaffirmed their commitment to net neutrality just two months ago, activists can try to hold them accountable).
Most important, net neutrality advocates likely need buy-in from corporate America. In a recent political science study, Martin Gilens of Princeton and Benjamin Page of Northwestern found that economic elites and organized business interests can have significant impact over public policy, while ordinary citizens just don’t. When the government acts in the interest of citizens at all, it’s often an accidental by-product of public preferences coincidentally matching those of business groups.
Many took this study to mean that the United States now functionally operates as an oligarchy rather than a democracy. It may actually mean that in America, citizens are typically disorganized on most public policy questions, particularly in an age of labor union decline, but can reverse that through mass organizing. Whatever your perspective, the SOPA fight offers a perfect case study. That effort really took off when Google, Reddit, and other major websites decided to join the fight, counterbalancing pressure on the other side from Hollywood. Tech giants knew that their businesses would be damaged by onerous copyright restrictions. The public interest and the interests of at least one set of elites aligned.
It’s not yet clear whether the same coalition will materialize to fight the FCC. The larger incumbent content providers, like Yahoo and Google, may well like paying for a faster Internet pipe, because it narrows competition to those who are already established. Netflix has already started paying for priority speeds, in a deal with Comcast for better back-end transit. In addition, Google is both a content producer and, through Google Fiber, an Internet service provider, and can reap profits by charging tolls for their fast lane. The company has been veering away from net neutrality for quite some time. Notably, the Internet Association, a coalition featuring Google, eBay, Netflix and other tech bigwigs, has said nothing about the FCC’s proposed rules yet, despite nominally supporting net neutrality. Google did not respond to a request for comment for this article.
This transformation by Google and others is common. As formerly upstart companies mature, they suddenly grow comfortable with regulations that favor incumbency—as long as they’re the incumbents. For a movement-based response to the FCC to succeed, activists must peel off companies willing to stay true to their word, and essentially rebuild a new corporate coalition that can engage their user base.
Netflix seems like an obvious choice. Despite their previous dealings, the streaming video giant has lashed out against Comcast for “arbitrary interconnection tolls,” and publicly opposed the merger between Comcast and Time Warner. Surely Netflix executives understand that a telecom industry freed to charge for faster broadband speeds will be able to raise prices over the years, and gouge incumbents. Netflix can go along with the arms race, or help to end it before it begins. Their leadership will attract smaller Internet players that can take more risks, because a pay-to-play Internet really does threaten their survival.
In this case, you can easily recognize the seeds of mass mobilization, which may provide enough political cover for a Netflix or Twitter to act. Tech communities with big audiences have responded to the FCC announcement with outrage. People intuitively know and resist the concentration of power controlling the tools they use every day. Several Democrats have criticized the proposal, from Cory Booker to Bernie Sanders to Nancy Pelosi, who actually urged people to contact the FCC with their criticisms. The ferocity of the backlash may have rocked the FCC back on their heels a bit, but time is short, with a May 15 meeting to move forward on the proposal looming.
But the sad fact of modern political life is that democratic action requires more than mere expressions of dissent, or the expectation that politicians who share our tribal sympathies will work on our behalf. To reach the critical mass necessary to succeed, savvy political organizing in the 21st century now includes convincing the business sector to recognize their interests and when they’re imperiled.
By: David Dayen, The New Republic, April 24, 2014
“Court Sanctioned Discrimination, Again”: Big Monopolies Are Now Free To Ruin The Internet
Countries like China or Russia, with centuries-long traditions of authoritarian rule, revert to their past practices when confronted with any kind of novelty. The United States, with its tradition of frontier free marketism, reverts to the laissez-faire when confronted with the new. But the result in both cases is the same: the radical constriction of popular democracy and freedom. A case in point is yesterday’s Appeals Court ruling on net neutrality.
The question is this: Can internet providers like Verizon and Comcast allow some web companies to provide better (that is, faster) service to their customers than their competitors by paying a higher price to the providers? Can Amazon knock an upstart by providing better service to its customers by paying off Verizon? Or can the Heritage Foundation’s web site provide better service than, say, that of the Economic Policy Institute by paying higher prices to Verizon? In 2010, the Federal Communications Commission (FCC) ruled that internet providers could not discriminate among web sites in this manner. Yesterday, the Appeals Court ruled that they could. That’s an obvious blow to consumers, who will suffer the usual effects of monopoly; but it could also be a blow to free speech on the internet.
The obvious villain is the Appeals Court, but the damage was actually done earlier. In 2002, the FCC under chairman Michael Powell—the son of Colin Powell and reputedly an extremely decent person, but also a doctrinaire pro-business libertarian in the mold of the Koch brothers—issued a ruling that internet companies were “information services” and not “telecommunications companies.” That seemingly innocuous decision on wording held momentous consequences, because it meant that the internet could not be regulated like the public utility that it is. Phone companies, for instance, can’t by law provide static-free service to callers from a wealthy suburban area (at a price), but barely audible service to callers from the inner city, because they are regulated like a public utility. By the FCC’s ruling, internet providers could discriminate, and in 2005, the Supreme Court affirmed the FCC’s right to make this invidious distinction.
Obama’s first appointee as FCC chairman, Julius Genachowski, understood the damage that Powell’s ruling had done, and sought to undo it. In May 2010, Genachowski announced that he was redefining cable as a telecommunications service. That would have opened the door to re-regulating it. The cable and wireless industry stepped in. “He felt himself to be in a difficult position,” Susan Crawford, the author of Captive Mind and an expert on communications law, recalled. She said Genachowski feared that it would “be World War III. And the president didn’t need World War III.” So in December 2010, Genachowski announced that he would not attempt to counter Powell’s definition. That left any attempt to regulate broadband—including the net neutrality standards that the administration adopted—open to a court challenge. Verizon then proceeded to challenge the FCC’s right to set net neutrality standards, and yesterday it won, and the FCC and the American people lost.
Powell was happy about the ruling. He is now the President of the National Cable & Telecommunications Association in Washington, the industry’s chief lobbying arm. “It’s ironic that the big winner coming out of the court’s decision could end up being the one person who wasn’t a litigant—the consumer,” Powell declared. It’s unclear whether Genachowski’s successor as FCC chair, former industry lobbyist Tom Wheeler, will challenge the ruling. But if he doesn’t, and the ruling stands, the FCC can kiss goodbye its power to regulate the internet and the protect the rights of citizens and consumers against avaricious monopolies.
By: John B. Judis, The New Republic, January 15, 2014
“No Company Is Secure”: Stop Asking Me For My Email Address
It’s hard out there for a paranoid cybersecurity reporter.
I’ve covered enough breaches, identity thefts, cybercrime and worse, to know it’s a terrible idea to hand over my personal data — even something as seemingly innocuous as my birthday or email address — to a store clerk, or a strange login page on the Internet.
But it’s getting hard to resist. I was in the middle of buying a swimsuit recently when the sweet lady behind the boutique counter asked me for my email address. I explained, as I have a hundred times before, that I’m a paranoid security reporter who makes it a general rule of thumb not to hand out information unnecessarily.
“We won’t spam you or anything,” she said, perplexed. “We just need it for our database.”
I knew then that the conversation was headed into a whole lot of awkward, as it had dozens of times before. The fact is, a boutique doesn’t need my email address so I can buy a swimsuit. The hotel I stayed in recently didn’t need my birth date, or my home address, or my driver’s license number, before I could check in. And Target doesn’t need to store your debit card PIN.
After news of Target’s breach first broke last month, a reader emailed complaining that after a recent purchase at a Target store in San Francisco, she was asked for her driver’s license after her credit card was authorized. “I gave it to her thinking she was only going to look at it, however she immediately scanned it through her register. I was a bit shocked and asked why she did that. She said it is always done but ‘Don’t worry, it is secure.’”
That, we now know, is absurd.
There is a temptation to think that major retailers like Target– and now Neiman Marcus– are more secure because they have more cash to spend on security. It’s the same assumption users made thinking Snapchat was secure because it magically makes selfies disappear, or that LinkedIn knew how to protect data because it likes to talk up big data, or that Adobe could protect our passwords.
Actually, I take that back: Compromised Adobe PDF files have been used in far too many cyberattacks to mention here.
The point is that no company is secure. None of them. Not when they are up against an increasingly sophisticated, elusive enemy. But the problem is not just retailers, or technology companies or hackers, it’s us.
We regularly hand over data simply because we’re politely asked. We don’t read privacy policies, or ask companies whether our email addresses and passwords will be “salted” or “hashed,” encrypted with long or short keys, or whether those keys will be stored on separate systems from the ones they can unscramble. We don’t challenge major credit card companies to hurry up and adopt smart-chip credit cards. And we don’t stop doing business with companies that don’t take data protection seriously.
So we’ll all feign shock that the Target breach did not just affect 40 million people as it previously reported, but well over one-third of America’s adult population. And then, in a few days, we will likely go back to politely handing over our email addresses and birth dates.
But for now, the sweet lady at the boutique just has this: privacyreporter@stopaskingme.com.
By: Nichole Perlroth, Digital Diary, The New York Times, January 10, 2014
“Bad History And Bad Policy”: The Hidden Consequences Of Snowden’s NSA Revelations
There is more than a little hypocrisy to the outcry that the government, through the National Security Agency (NSA), is systematically destroying Americans’ right to privacy. Edward Snowden’s revelations have been stripped of their social, technological and historical context. Unless you’ve camped in the Alaskan wilderness for two decades, you know — or should — that millions upon millions of Americans have consciously and, probably in most cases, eagerly surrendered much of their privacy by embracing the Internet and social media.
People do not open Facebook, Twitter, LinkedIn and Instagram accounts because they wish to shroud their lives in secrecy. They do not use online dating services or post videos on YouTube because they cherish their anonymity. The Internet is a vehicle for self-promotion, personal advertising and the pursuit of celebrity.
The Pew Research Center’s surveys confirm that these behaviors are now entirely mainstream. In 2013, 85 percent of Americans used the Internet. Of these, almost three-quarters (73 percent) belonged to social media sites (the biggest: Facebook). Almost one-fifth of adult Internet users have posted personal videos, many hoping, says Pew, that “their creations go viral.” Among people “single and looking” for mates, nearly two-fifths (38 percent) used online dating.
If Americans think their privacy is dangerously diminished, there are remedies. They can turn off their PCs, toss their smartphones and smash their tablets. Somehow, this seems unlikely, even though another Pew survey finds that “86 percent of adult Internet users have taken steps . . . to avoid surveillance by other people or organizations.”
To these conscious sacrifices of privacy must be added murkier, collateral losses that are orchestrated by the world’s Googles, Facebooks, service providers and “data brokers,” writes Alice Marwick of Fordham University in the New York Review of Books. They scan users’ digital decisions (sites visited, products and services purchased, habits and hobbies favored) to create databases, often merged with other socio-economic information. These target advertising, improve political appeals — President Obama’s campaign excelled at this — and influence hiring decisions, as Don Peck notes in the Atlantic.
The NSA’s damage to privacy is dwarfed by the impact of market activity. The sensationalism surrounding Snowden’s revelations obscures this. Case in point: The disclosure that U.S. telephone calls are open to NSA monitoring. Suddenly, Big Brother looms. In our mind’s eye, we see the NSA’s computers scouring our every phone call. We’re exposed to constant snooping and the possibility that the government will misuse the information it finds.
The reality is far more limited. The NSA is governed by legal restrictions. It does not examine the full database. It searches individual numbers only after it has determined there’s a “reasonable, articulable suspicion” that a number might be linked to terrorist groups. In 2012, there were 288 of these findings. After one is made, the NSA can retrieve three items about the number: the dates of calls made and received for five years; the other phones’ numbers; and the calls’ length. The NSA is not entitled to listen to conversations, but it can order similar searches on the other numbers involved. Thousands of calls are caught in the dragnet, but the total is puny compared with the untold billions of annual calls.
Whether these searches are effective in fighting terrorism is disputed. The NSA says they’re valuable. A panel of experts appointed by Obama concluded that the monitoring “was not essential to preventing attacks.” But more important for civil liberties and privacy, the panel found that present practices don’t approach past abuses. During the Vietnam War, the panel noted, the CIA investigated 300,000 anti-war critics. The government also sought to “expose, disrupt, and neutralize their efforts to affect public opinion.”
By all means, let’s debate the NSA. Some policies seem suspect, spying on the heads of friendly governments topping the list. It’s also important to recognize that government can coerce and punish in ways that private markets cannot. The potential for abuse is greater. But let’s also keep the debate in perspective.
In a digitized world, spying must be digitized. Then there’s cyberwarfare. Our electronic systems remain vulnerable, as the recent theft of data from millions of credit and debit cards at Target demonstrates. Government and the private sector need to collaborate more closely to protect vital systems. But these “efforts are as good as dead for the foreseeable future,” says Dmitri Alperovitch of CrowdStrike, a cybersecurity firm. The NSA controversy has “significantly damaged the trust between the private sector and government.” This may be the Snowden affair’s most insidious (and overlooked) consequence.
Vilifying the NSA — letting Snowden dictate the terms of debate — promotes bad history and bad policy. It’s bad history, because the most powerful assaults on privacy have originated in markets. It’s bad policy, because weakening the NSA leaves the United States more exposed to cyberattacks.
By: Robert Samuelson, Opinion Writer, The Washington Post, January 5, 2014
“Who Watches The Watchers?”: The Government Wouldn’t Be Able To Accumulate Data On Citizens If Companies Weren’t Collecting It
Yesterday, President Obama for the first time publicly addressed the controversies surrounding the National Security Agency’s Internet snooping, noting that there’s an important discussion to be had about the balance between security and liberty in a free country. “I welcome this debate,” he said.
I wonder, though, whether this debate is too narrowly drawn: Is the nub of the problem too much government surveillance or too much surveillance, period? After all, the government wouldn’t be able to so easily accumulate all this data on private citizens if private companies weren’t collecting it first.
In case you live under a rock, the kerfuffle involves a pair of National Security Agency programs. In one the agency spent years collecting the nation’s phone records – who called whom when and from where. In the other, codenamed PRISM, it has reportedly mined data – emails, chats and photographs, for example – of ostensibly foreign targets from prominent Internet providers like Microsoft, Yahoo, Google, Facebook, AOL and Apple, to name a few. (For their part, these companies have issued various types of denials regarding their cooperation in the program.)
But as I said, the government surveillance, which is deeply unsettling, raises a larger question about corporate surveillance. Amie Stepanovich of the Electronic Privacy Information Center points out that none of the information in question would be sharable if Internet and telecommunications companies encrypted it to protect privacy. In other words, it’s not a given that corporations must collect vast amounts of information from and about us. But failing to do so wouldn’t be good for business.
Somebody’s watching you. As security technologist Bruce Schneier has written, “The Internet is a surveillance state.” The mere act of visiting websites means you’re being tracked whether you’re aware of it or not. “Click tracking is a huge source of personal data that most people aren’t aware is being collected,” says Stephen Wicker, a Cornell University professor and author of the forthcoming “Cellular Convergence and the Death of Privacy.” He adds that “sites that you would think are relatively benign are actually hosting third party click trackers that take this data and then resell it.”
Indeed, earlier this year The Atlantic’s Alexis Madrigal dug into the world of Internet tracking and discovered 105 companies that had tracked him in a 36-hour period of normal Web surfing. “Every move you make on the Internet is worth some tiny amount to someone, and a panoply of companies want to make sure that no step along your Internet journey goes unmonetized,” he wrote. (Full – or at least partial – disclosure: I do not know whether and to what extent usnews.com employs click trackers.)
Or consider the big data kid on the block: Google. Many people probably view the company as a search engine, or a map provider, or a mobile phone company or a cloud repository for documents. What Google is, in fact, is a data collection company: It collects data on you 15 ways to Sunday, sorts it, chops it up and sells it. And as Robert Epstein pointed out on this site in May, it’s not just when you’re using the Google search engine or Gmail (though it is assuredly the case then).
The Internet behemoth is collecting information on you whether you know it or not and whether you’re using its products or not. Using Safari or Firefox? Both web browsers, Epstein wrote, use Google’s blacklist, “an ever-changing list of about 600,000 websites that Google’s bots have identified – sometimes mistakenly – as dangerous. No government agency or industry association ever gave Google the authority to maintain such a list, but it exists, and Firefox uses it.” So does Safari. If you’re visiting a website that uses Google analytics (and most major sites do) or is serviced by Google ads or has Google maps embedded in it then Google, as Epstein writes, has gotcha.
But Google’s the “Don’t be evil” company, right? (After all, they’ve just gotten Vince Vaughn and Owen Wilson to star in a two-hour movie-cum-commercial.) And don’t all major social media platforms have privacy policies to protect consumers? Maybe. But in the last few years Google, Facebook and MySpace (remember that site?) have reached settlements with the Federal Trade Commission for charges related to how they handled users’ personal and private data.
The spy in your pocket. And that doesn’t even get into the personal, portable surveillance tools practically everyone in the country voluntarily carries around with them: mobile phones and other wireless devices. Pew Research reported this week that for the first time a majority of Americans own a smart phone of some kind, while fully 91 percent of the adult population now owns some flavor of cell phone. (The wireless industry lobbying group CTIA reports that wireless devices have now reached 102 percent penetration in the U.S. and its territories, which means that the machines now outnumber the people.)
And if you’re using your mobile phone, you’re being tracked. “I don’t think people realize they’re revealing their location to their carrier just by using their device,” says Ashkan Soltani, an independent privacy researcher and consultant. A 2011 investigation by the Wall Street Journal (on which Soltani consulted) found that Apple and Android smart phones routinely send location information, including information about local Wi-Fi networks, back to Apple and Google. Separately, the Journal reported in 2011, Apple’s iPhone collected and stored location data even when users had turned off “location services” – which is to say when they thought they had opted out of being tracked.
Why? This information is a potential treasure trove for these companies. From the Journal:
Google and Apple are gathering location information as part of their race to build massive databases capable of pinpointing people’s locations via their cellphones. These databases could help them tap the $2.9 billion market for location-based services – expected to rise to $8.3 billion in 2014, according to research firm Gartner, Inc.
Google uses this information to help show on its maps where automobile traffic is especially heavy or light. Verizon sells aggregate location data to advertisers, according to Soltani, so they can know where to place billboards. The wireless companies’ viewpoint, according to Soltani, is “we got this information for free, let’s use it for this other use-case, which is the marketing data.”
And there are a lot of companies trying to get a piece of this financial pie. In another story, the Journal surveyed 101 popular iPhone and Android apps and found that “56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven apps transmitted the phone’s location in some way. Five sent age, gender and other personal details to outsiders.” As Soltani told a Senate subcommittee in 2011, “applications can access and transmit data which includes text messages, emails, phone numbers, contacts stored and even browser history stored on the device.”
So if you woke yourself up this morning with an alarm clock app on your phone, the instant it went off, says Soltani, not only did it transmit noise to your ears but location data back to people you don’t know. “There are times where there are 50 or 100 third parties – companies that you’ve never had a relationship with – who are able to monitor your … activities,” he says.
Not big on apps? Consider your next visit to the local mall. Carriers and other companies are installing sensors around shopping malls, Soltani says, allowing them to track where people are lingering, what’s popular and what’s not, analytics that then go to the mall.
Perverse incentive. All of this creates what Soltani calls a “perverse incentive that creates this worst case scenario for consumers.” Companies have an incentive to collect and keep user data; and that trove proves an irresistible target for the government in its ongoing war on terrorists.
Which brings us back to the current uproar over the NSA’s data collection and data mining. The outrage is justified, as is the broader concern about how the cult of secrecy has infected and distorted the government. But there is something somewhat comforting to the notion that government agencies are ultimately responsible to the voters, even if that process has become calcified and overly complex.
But the surveillance state is built upon its corporate counterpart. And who watches those watchers?
By: Robert Schlesinger, U. S. News and World Report, June 8, 2013