Friday, October 1, 2010
New Internet Censorship Bill Introduced
Wednesday, September 29, 2010
An Open Letter From Internet Engineers to the Senate Judiciary Committee
Readers are encouraged to themselves write the Senate Judiciary Committee and ask them to reject this bill.
We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it.The letter is signed by the following:
We are writing to oppose the Committee's proposed new Internet censorship and copyright bill. If enacted, this legislation will risk fragmenting the Internet's global domain name system (DNS), create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. In exchange for this, the bill will introduce censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' ability to communicate.
All censorship schemes impact speech beyond the category they were intended to restrict, but this bill will be particularly egregious in that regard because it causes entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under this bill. These problems will be enough to ensure that alternative name-lookup infrastructures will come into widespread use, outside the control of US service providers but easily used by American citizens. Errors and divergences will appear between these new services and the current global DNS, and contradictory addresses will confuse browsers and frustrate the people using them. These problems will be widespread and will affect sites other than those blacklisted by the American government.
The US government has regularly claimed that it supports a free and open Internet, both domestically and abroad. We can't have a free and open Internet without a global domain name system that sits above the political concerns and objectives of any one government or industry. To date, the leading role the US has played in this infrastructure has been fairly uncontroversial because America is seen as a trustworthy arbiter and a neutral bastion of free expression. If the US suddenly begins to use its central position in the DNS for censorship that advances its political and economic agenda, the consequences will be far-reaching and destructive.
Senators, we believe the Internet is too important and too valuable to be endangered in this way, and implore you to put this bill aside.
- David P. Reed, who played an important role in the development of TCP/IP and invented the UDP protocol that makes real-time applications like VOIP possible today; Professor at MIT
- Paul Vixie, author of BIND, the most widely-used DNS server software, and President of the Internet Systems Consortium
- Jim Gettys, editor of the HTTP/1.1 protocol standards, which we use to do everything on the Web.
- Bill Jennings, who was VP of Engineering at Cisco for 10 years and responsible for building much of the hardware and embedded software for Cisco's core router products and high-end Ethernet switches.
- Steve Bellovin, one of the originators of USENET; found and fixed numerous security flaws in DNS; Professor at Columbia.
- Gene Spafford, who analyzed the first catastrophic Internet worm and made many subsequent contributions to computer security; Professor at Purdue.
- Dan Kaminsky, renowned security researcher who in 2008 found and helped to fix a grave security vulnerability in the entire planet's DNS systems.
- David Ulevitch, CEO of OpenDNS, which offers alternative DNS services for enhanced security.
- John Vittal, Created the first full email client and the email standards.
- Esther Dyson, chairman, EDventure Holdings; founding chairman, ICANN; former chairman, EFF; active investor in many start-ups that support commerce, news and advertising on the Internet; director, Sunlight Foundation
- Brian Pinkerton, Founder of WebCrawler, the first big Internet search engine.
- Dr. Craig Partridge, Architect of how email is routed through the Internet, and designed the world's fastest router in the mid 1990s.
- John Gilmore, co-designed BOOTP (RFC 951), which became DHCP, the way you get an IP address when you plug into an Ethernet or get on a WiFi access point. Current EFF board member.
- Karl Auerbach, Former North American publicly elected member of the Board of Directors of ICANN, the Internet Corporation for Assigned Names and Numbers.
- Paul Timmins, designed and runs the multi-state network of a medium sized telephone and internet company in the Midwest.
- Lou Katz, I was the founder and first President of the Usenix Association, which published much of the academic research about the Internet, opening networking to commercial and other entities.
- Walt Daniels, IBM’s contributor to MIME, the mechanism used to add attachments to emails.
- Gordon E. Peterson II, designer and implementer of the first commercially available LAN system, and member of the Anti-Spam Research Group of the Internet Engineering Task Force (IETF).
- John Adams, operations engineer at Twitter, signing as a private citizen
- Alex Rubenstein, founder of Net Access Corporation. We are an Internet Service Provider for nearly 15 years, and I have served on the ARIN AC.
- Roland Alden, Originator of the vCard interchange standard; builder of Internet infrastructure in several developing countries.
- Lyndon Nerenberg, Author/inventor of RFC3516 IMAP BINARY and contributor to the core IMAP protocol and extension.
- James Hiebert, I performed early experiments using TCP Anycast to track routing instability in Border Gateway Protocol.
- Dr. Richard Clayton, designer of Turnpike, widely used Windows-based Internet access suite. Prominent Computer Security researcher at Cambridge University.
- Brandon Ross, designed the networks of MindSpring and NetRail.
- James Ausman, helped build the first commercial web site and worked on the Apache web server that runs two-thirds of the Web.
- Michael Laufer, worked on the different networks they dealt with including the Milnet, other US Govt nets, and regional (NSF) nets that became the basis of the Internet. Also designed, built, and deployed the first commercial VPN infrastructure (I think) as well as dial up nets that were part of AOL and many other things.
- Janet Plato, I worked for Advanced Network and Service from 1992 or so running the US Internet core before it went public, and then doing dial engineering until we were acquired by UUNet. While at UUnet I worked in EMEA Engineering where I helped engineer their European STM16 backbone.
- Thomas Hutton, I was one of the original architects of CERFnet - one of the original NFSnet regional networks that was later purchased by AT&T. In addition, I am currently chair of the CENIC HPR (High Performance Research) technical committee. This body directs CENIC in their managment and evolution of Calren2, the California research and education network.
- Phil Lapsley, co-author of the Internet Network News Transfer Protocol (NNTP), RFC 977, and developer of the NNTP reference implementation in 1986 ... still in use today almost 25 years later.
- Stephen Wolff. While at NSF I nurtured, led, and funded the NSFNET from its infancy until by 1994 I had privatized, commercialized, and decommissioned the NSFNET Backbone; these actions stimulated the commercial activity that led to the Internet of today.
- Bob Schulman , worked on University of Illinois’ ANTS system in the Center for Advanced Computation in 1976 when ANTS connected a few hosts to the ARPAnet.
- Noel D. Humphreys, As a lawyer I worked on the American Bar Association committee that drafted guidelines for use of public key encryption infrastructure in the early days of the internet.
- Ramaswamy P. Aditya, I built various networks and web/mail content and application hosting providers including AS10368 (DNAI) which is now part of AS6079 (RCN), which I did network engineering and peering for, and then I did network engineering for AS25 (UC Berkeley), followed and now I do network engineering for AS177-179 and others (UMich).
- Haudy Kazemi, Implemented Internet connections (from the physical lines, firewalls, and routers to configuring DNS and setting up Internet-facing servers) to join several companies to the Internet and enable them to provide digital services to others.
- Mike Meyer, I helped debug the NNTP software in the 80s, and desktop web browsers and servers in the 90s.
- Richard S. Kulawiec, 30 years designing/operating academic/commercial/ISP systems and networks.
- Michael Alexander, I have been involved with networking since before the Internet existed. Among other things I was part of the team that connected the MTS mainframe at Michigan to the Merit Network. I was also involved in some of the early work on Email with Mailnet at MIT and wrote network drivers for IP over ISDN for Macintosh computers.
- Gordon Cook, I led the OTA study between 1990 and 1992 and since April 1992 have been self employed as editor publisher of the cook report.
- Thomas Donnelly, I help support the infrastructure for the world’s most widely used web server control panel.
- Peter Rubenstein, I helped design and run the ISP transit backbone of AOL, the ATDN.
- Owen DeLong, I am an elected member of the ARIN Advisory Council. I am the resource holder of record on a number of domains. I have been active on the internet for more than 20 years. I was involved in getting some of the first internet connections into primary and secondary schools before commercial providers like AT&T started sponsoring events like Net-Day.
- Erik Fair, co-author, RFC 1627, RFC 977, former postmaster@apple.com.
- Tony Rall, I was involved in providing Internet access to the IBM corporation - from the late 80s until last year. I worked within the company to ensure that Internet access was as "open" and transparent as possible.
- Bret Clark, Spectra Access. We are New Hampshire's largest wireless Internet service providers and have built a large footprint of Internet Access for businesses in New Hampshire.
- Paul Fleming, Run as33182 as a large hosting provider (5gbps+). develop monitoring software suite.
- David M. Kristol, Co-author, RFCs 2109, 2965 ("HTTP State Management") Contributor, RFC 2616 ("Hypertext Transfer Protocol")
- Anthony G. Lauck, I helped design and standardize routing protocols and local area network protocols and served on the Internet Architecture Board.
- Judith Axler Turner, I started the first NSF-approved commercial service on the Internet, the Chronicle of Higher Education's job ads, in 1993.
- Jason Novinger , I was the Network Administrator for Lawrence Freenet, a small wireless ISP in Lawrence, KS.
- Dustin Jurman, I am the CEO of Rapid Systems Corporation a Network Service Provider, and Systems builder responsible for 60 Million of NOFA funding.
- Blake Pfankuch, Over the years I have implemented thousands if not tens of thousands of webservers, DNS servers and supporting infrastructure.
- Dave Shambley, retired engineer (EE -rf-wireless- computers) and active in the design of web site and associated graphics.
- Stefan Schmidt, I had sole technical responsibility for running all of the freenet.de / AS5430 DNS Infrastructure with roughly 120.000 Domains and approximately 1.5 million DSL subscribers for the last 9 years and have been actively involved in the
- (No name listed) development of the PowerDNS authoritative and recursive DNS Servers for the last 4 years.
- Dave Skinner, I was an early provider of net connectivity in central Oregon. Currently I provide hosting services.
- Richard Hartmann, Backbone manager and project manager at Globalways AG, a German ISP.
- Curtis Maurand, founder of a small internet company in Maine in 1994. started delivering low cost broadband to municipalities and businesses before acquired by Time-Warner.
- James DeLeskie, internetMCI Sr. Network Engineer, Teleglobe Principal Network Architect
- Bernie Cosell, I was a member of the team at BBN that wrote the code for the original ARPAnet IMP. I also did a big chunk of the redesign of the TELNET protocol [addding DO/DONT/WILL/WONT].
- Eric Brunner-Williams, I contributed to rfc1122 and 1123, and co-authored rfc2629, Domain Name System (DNS) IANA Considerations, and authored the "sponsored registry" proposal, implemented as .aero, .coop and .museum, and assisted with .cat, authored the privacy policy for HTTP cookies, and contribute to both the IETF and to ICANN.
- Nathan Eisenberg, Atlas Networks Senior System Administrator, manager of 25K sq. ft. of data centers which provide services to Starbucks, Oracle, and local state
- Jon Loeliger, I have implemented OSPF, one of the main routing protocols used to determine IP packet delivery. At other companies, I have helped design and build the actual computers used to implement core routers or storage delivery systems. At another company, we installed network services (T-1 lines and ISP service) into Hotels and Airports across the country.
- Tim Rutherford, managed DNS (amongst other duties) for an C4.NET since 1997.
- Ron Lachman , I am co-founder of Ultra DNS. I am co-founder of Sandpiper networks (arguably, inventor of the CDN) I am "namesake" founder of Lachman TCP/IP (millions of copies of TCP on Unix System V and many other other platforms) Joint developer of NFS along with Sun MicroSystems.
- Jeromie Reeves, Network Administrator & Consultant. I have a small couple hundred user Wireless ISP and work with or have stakes in many other networks.
- Alia Atlas, I designed software in a core router (Avici) and have various RFCs around resiliency, MPLS, and ICMP.
- Marco Coelho, As the owner of Argon Technologies Inc., a company that has been in the business of providing Internet service for the past 13 years.
- David J. Bowie, intimately involved in deployment and maintenance of the Arpanet as it evolved from 16 sites to what it is today.
- Scott Rodgers, I have been an ISP on Cape Cod Massachusetts for 17 years and I agree that this bill is poison.
- William Schultz, for the past 10 years I've worked on hundreds of networks around the US and have worked for a major voice and data carrier. I do not agree with Internet censorship in any degree, at all.
- Rebecca Hargrave Malamud, helped advance many large-scale Internet projects, and have been working the web since its invention.
- Kelly J. Kane - Shared web hosting network operator. Tom DeReggi, 15yr ISP/WISP veteran, RapidDSL. Doug Moeller, Chief Technical Officer, Autonet Mobile, Inc.
- David Boyes, Operations Coordinator, SESQUInet, First mainframe web server, First Internet tools for VM/CMS, Caretaker, NSS1, Caretaker ENSS3, Author, Chronos Appt Management Protocol, Broadcast operator, IETF telepresence, IETF 28/29
- Jim Warren, I was one of Vint Cerf’s grad students and worked for a bit on the early protocols for the old ARPAnet ... back before it became the DARPAnet
- Christopher Nielsen, I have worked for several internet startups, building everything from email and usenet infrastructure to large-scale clusters. I am currently a Sr. Operations Engineer for a product and shopping search engine startup.
- David Barrett, Founder and CEO of Expensify, former engineering manager for Akamai. I helped build Red Swoosh, which delivers large files for legitimate content owners, and was acquired by Akamai, which hosts 20% of the internet by powering the world's top 20,000 websites.
- David Hiers, I have designed dozens of Internet edge networks, several transit networks, and currently operate a VOIP infrastructure for 20,000 business subscribers.
- Jay Reitz, Co-founder and VP of Engineering of hubpages.com, the 60th largest website in the US with 14M monthly US visitors.
- Peter H. Schmidt, I co-founded the company (Midnight Networks) that created the protocol test software (ANVL) that ensured routers from all vendors could actually interoperate to implement the Internet.
- Harold Sinclair, design, build, and operate DNS, Mail, and Application platforms on the Internet.
- John Todd, I invented and operate a DNS-based telephony directory "freenum.org" which uses the DNS to replace telephone numbers.
- Christopher Gerstorff, technician for a wireless broadband internet provider, Rapid Systems, Inc.
- Robert Rodgers, Engineer at Juniper and Cisco. Worked on routers and mobile systems.
- Illene Jones, I have had a part in creating the software that runs on the servers.
- Brandon Applegate, I have worked in the ISP sector since the mid-1990s as a network engineer.
- Leslie Carr, Craigslist Network Engineer
Age of Censorship and Internet Trade Wars
New U.S. legislation will impact every user of the Internet. The “Combating Online Infringement and Counterfeits Act” would empower the U.S. Department of Justice to shut down, or block access to, websites found to be dedicated to infringing activities. The bill also contains provisions to block sites with domain names and Top-Level Domains (TLDs) that are maintained by overseas companies, which exist outside the U.S. legal jurisdiction and enforcement mechanism. The Justice Department would obtain court orders directing United States-based Internet Service Providers to stop resolving the IP addresses that allow customers in the United States to access the infringing websites. As a result, the sites will be inaccessible to U.S.-based Web users who do not use some sort of proxy service. The bill was read twice and referred to the Committee on the Judiciary last Monday; it is sponsored by Senators Hatch, Leahy, Klobuchar, Whitehouse, Schumer, Kohl, Specter, Durbin, Bayh, Voinovich, and Feinstein.
The legislation is expected to have strong support in Hollywood, labor unions and manufacturers, but in some circles -- namely grassroots political organizations, alternative press, and Internet start-ups -- the response has been lukewarm, and even questioning. They are concerned that the “other purposes” of the legislation include censorship and, if made law, will employ the Justice Department to police the Internet, eventually resulting in the disruption of the free flow of information and trade globally.
To some extent, their concerns are formed by experience. There have been examples of business censorship, and government legislation to curtail what is viewed on the Internet. Infowars reported recently that “London’s St. Pancras International, one of the biggest transport hubs in the West," implemented “stringent filters that block users of their Wi-Fi service from accessing even mildly political websites." Sites like prisonplanet.com and thinkprogress.org were not available to customers in some areas. There are plans in Australia to promulgate legislation to institute a “mandatory, countrywide filtering system," which supporters say is “designed to keep out child abuse content, but which blocks a much wider variety of content and topics." And recently when media reported about an Iranian website with cartoons denying the Holocaust, some viewers in the U.S. discovered that access to the site was blocked.
Granted, there is recognition in Washington that the Internet is the new frontier for global enterprise, but some perceive that Washington still views the world through the lens of a bygone era. A critic of the bill told me that many nations, including the United States, legislate for businesses founded in a brick-and-mortar world; and attempts to regulate the Internet would be like turning back the clock.
“Nations will act independently and this will be detrimental to customers that use the Internet near and far,” advised the critic.
A similar sentiment was echoed by former Italian Prime Minister, Romano Prodi, in a speech at the Foreign Ministry Faculty of International Relations in Tehran. Mr. Prodi suggested that Italy within Europe must play a greater role in matters of global importance, and that may entail Europe’s acting with greater independence of the United States. The message, though given on a different topic, is not one that instills confidence to those who see governments encroaching on their privacy, and would prefer unrestricted use, or less regulation, of the services for which they pay.
The U.S. legislation for infringement is written to tackle many concerns, and is certainly not archaic in regard to lawmakers’ ambition to affect what goes on well beyond the scope of U.S. jurisdiction.
For infringing sites outside the United States, it provides for in rem action in the District of Columbia to prevent the importation into the United States of goods and services directed to U.S. residents. The effect of this “importation” must be that the owner or operator of the infringing site must harm intellectual property rights holders that are residents of the United States.
The Justice Department will be granted power to serve court orders upon the registry where the domain name registrar is not located in the United States, and upon receipt of such an order, the domain registry must suspend operations of, and lock, the domain name of the infringing site.
During the action intended to “lock the domain name," a court may determine, at a minimum threshold, that an Internet site is not conducting business to residents in the United States if the Internet site “states that it is not intended, and has measures to prevent, infringing materials from being accessed in or delivered to the United States,” including other provisions in subsection (d)(2)(B). The owner or operator of the “infringing site” shall also have recourse to petition the Justice Department to remove his domain name from an offending list, or petition the court to modify, suspend, or vacate the order in accordance with subsection (h)(1)(B).
The bill has an immunity clause which protects any entity from a cause of action in U.S. courts or administration agency for any action reasonably calculated to comply with an action intended to prevent the infringing site from continuing to do business with U.S.-based customers, receive financial transactions, and other matters under subsection (e)(3).
The U.S. legislation does not appear to put the onus on any businesses, such as Internet Service Providers, to stop known infringement from occurring. This is an interesting stance. In February, an Australian ISP won a precedent-setting copyright infringement lawsuit (Down Under) against the Motion Picture Industry. The bill sponsors may be cognizant of this ruling.
Softpedia reported that 34 U.S. movie studios and broadcasters filed a lawsuit in Australia against iiNet after the ISP refused to send warning letters to its customers who illegally downloaded movies using BitTorrent. The Australian Justice, Dennis Cowdrey, ruled that while iiNet had knowledge of infringements occurring, and did not act to stop them, such findings do not necessitate a finding that the ISP authorized the infringing activities. Possibly, Hollywood supporters of the U.S. infringement legislation now agree with Cowdrey’s ruling that to ask ISPs to police the Internet would “open them any number of legal claims for anything that might happen over their pipes,” and that would engender strong opposition to the legislation among ISPs in the United States. However, to take on the responsibility of policing the Internet may not seem a burden to Obama’s Justice Department.
Certainly, Hollywood will welcome any new infringement legislation aimed at stemming the loss of royalties through piracy and copyright violation in the digital age. Infringers often meet efforts to protect intellectual property with resilient and thought-out action to thwart the law. As a law intern in Thailand I learned, for example, that illegal duplication facilities for CDs and DVDs existed in mobile transportation. Persons engaged in copyright violations avoided the ability of local enforcement to easily locate them and shut them down. It is a sure bet that those engaged in infringing activities overseas will find ways and new technology to evade laws promulgated by a foreign government (like the U.S.) that will have no jurisdiction over them.
The Obama Justice Department, which tapped Hollywood lawyers, may be charged to police Intellectual Property -- an assignment to which attorneys for President George W. Bush were “strongly opposed.” The Republican President threatened to veto a previous version of the bill sponsored by the same Sens. Patrick Leahy and Arlen Specter.
In correspondence to the Senators, attorneys for President Bush wrote that they "strongly opposed" expanding the powers of the Justice Department. Doing so, they said, could undermine the Department’s prosecution of criminal cases and transform it into an office "serving as pro bono lawyers for private copyright holders."
It is obvious during this era when citizens’ rights are curtailed and infringed upon, with the bipartisan sponsorship of the bill and the composition of the current administration, that the infringement legislation has a better chance of becoming law. But will it open a Pandora’s Box? Will it do exactly what critics suspect it is intended to do: censor more of the Internet, create bottlenecks that will allow governments to intrude on the flow of information and services around the world, and do possible damage to a wider spectrum of businesses (other than those it is intended to protect)?
Many of the dynamic economies that U.S. businesses now compete against were born out of things other than a free market; and other economies are driven, or manipulated by State controls, as is the case of China. Foreign nations may follow the U.S. lead in writing laws to regulate the Internet and address their concerns, but not with the results U.S. legislators necessarily hope to engender.
Through retaliation, or even pretext, governments may decide to regulate, or shut down legitimate Internet traffic and services to violate human rights, hinder trade, and to engage in industry espionage. We already have examples of these developments with China’s efforts to regulate Google, and the recent firestorm when India and other nations, acting within their security concerns, decided to take action to regulate Blackberry and gain access to users’ encrypted corporate e-mails and messages. The offices of Sen. Byron L Dorgan and Rep. Sander M. Levin of the Congressional-Executive Commission on China undertook a hearing in March to investigate if China’s efforts to regulate the Internet contravene free trade and human rights. Delegates to the hearing cited that:
China’s Internet users remain subject to the arbitrary dictates of state censorship. More than a dozen agencies are involved in implementing a host of laws, regulations, and other tools to try to keep information and ideas from the Chinese people . . .
China’s censorship practices and control of the Internet have had a terrible impact on human rights advocates. These include ordinary people who promote political freedoms or try to organize online . . . attempting to share information about ongoing government repression.
Internet censorship and regulation in China have serious economic implications for many U.S. companies . . . [and] often run against basic international trade principles of nondiscrimination and maintaining a level playing field.To these charges, China responded that it laws regarding the Internet are not much different than those of the West, and that critics are applying a double standard.
Perhaps U.S. lawmakers have forgotten a cause it often champions: that respect for human rights, deregulation, and open trade are important to a dynamic and properly functioning global community. As ownership of patents, trademarks, and copyrights becomes a contested grey area, nations may block business occurring over the Internet through the guise of copyright infringement. Only the rich and powerful will have the resources to go through the legal hurdles at home and/or abroad to clear their domains of actions to lock them, and resume operations. Damage would be done to a business during the course of a legal action brought against it; its customers may simply believe that the domain ceases to exist, with transactions lost forever.
Small businesses could be shut out of that presumptuous dream of going global and becoming rich, while the elite, big businesses and powerful governments can dominate cyberspace. Many micro-states and individuals could be harmed, and educational pursuits stifled through this world of more legislation, regulation, and censorship.
Why should we be concerned about this future for the Internet?
Well, because the Internet is now everyone’s classroom; and perhaps more-so it has become individuals’ business personality. A properly set up website for a Mom-and-Pop enterprise can look as good as that of a billion dollar company’s front-store. The ramifications of more regulation will result in the free and booming frontier of cyberspace, now functioning as the gold rush for enterprise, ceasing to exist.
The U.S. may find it useful to confer with trading partners in the North and the South, and come to an understanding that perhaps unilateral action is not the way to address concerns in regard to a frontier in which everyone has an interest. President George W. Bush may have gotten it right when his attorneys writing on his behalf to Sens. Leahy and Specter implied, when taken altogether, that U.S. law already provides owners of Intellectual Property with effective legal tools to protect their rights. It need not go in the direction proposed by the Senators.
No one wants Washington’s efforts to backfire and force us to return to a world where we have to resort domestically to find the goods and services that we need, such as cheap medicine. Or, to have to wait on someone in a dusty library to find a book or paper we once could have accessed readily over the Internet. Or, in some far corner of the world men will cower in fear of infringing before they cite links as sources of information. A Big Brother that will censor access to the latest celebrity sex videos, or certain religious texts or even Osama bin Laden’s latest rant (however misguided they may be). The result of this could be that owners of presumed “infringing sites” must raise ungodly sums of money to hire attorneys to clear their domain names, while good sites like WikiLeaks (which make governments accountable for their actions) are shut down or blocked here and abroad through a pretext; and Mom-and-Pop operating a start-up Internet business within the cornfields of America are locked out through action suggested by a smooth operator with deep pockets who knows how to play the system and use it against his competitor, blocking sites because somebody with power did not like the owner's point of view.
Francis Anthony Govia received a Bachelor’s degree in International Relations at Boston University where he studied U.S. National Security and Foreign Policy with teachers who inspired him, such as General Fred F. Woerner (Ret.), Ambassador Stephen R. Lyne (Ret.), and Joseph Fewsmith. He received a law degree at the University of Wisconsin-Madison, and is a contributor to Activist Post.
Thursday, July 22, 2010
Obama's War on the Internet
![]() |
YES WE CAN! |
The excuses being given for the increasing government intervention into the internet are essentially two: first, that the anonymity of the internet has permitted criminal behavior, fraud, pornography, and libel. Second is the security argument, that managing the internet is an integral part of the "global war on terror" in that it is used by terrorists to plan their attacks requiring governments to control those who use it. The United States government takes the latter argument one step farther, claiming that the internet itself is a vulnerable "natural asset" that could be seized or damaged by terrorists and must be protected, making the case for a massive $100 billion program of cyberwarfare. Senator Joseph Lieberman (D-CT) argues that "violent Islamist extremists" rely on the internet to communicate and recruit and he has introduced a bill in the Senate that will empower the president to "kill" the internet in case of a national emergency.
But all of the arguments for intervention are essentially themselves fraudulent and are in reality being exploited by those who favor big government and state control. The anonymity and low cost nature of the internet means that it can be used to express views that are unpopular or unconventional, which is its strength. It is sometimes used for criminal behavior because it is a mechanism, not because there is something intrinsic in it that makes it a choice of wrongdoers. Before it existed, fraud was carried out through the postal service and over the telephone. Pornography circulated freely by other means. As for the security argument, the tiny number of actual terrorists who use the internet do so because it is there and it is accessible. If it did not exist, they would find other ways to communicate, just as they did in pre-internet days. In fact, intelligence sources report that internet use by terrorists is rare because of persistent government monitoring of the websites.
The real reason for controlling the internet is to restrict access to information, something every government seeks to do. If the American Departments of Defense and Homeland Security and Senator Lieberman have their way, new cybersecurity laws will enable Obama's administration to take control of the internet in the event of a national crisis. How that national crisis might be defined would be up to the White House but there have been some precedents that suggest that the response would hardly be respectful of the Bill of Rights. Many countries already monitor and censor the internet on a regular basis, forbidding access to numerous sites that they consider to be subversive or immoral. During recent unrest, the governments of both Iran and China effectively shut down the internet by taking control of or blocking servers. Combined with switching off of cell phone transmitters, the steps proved effective in isolating dissidents. Could it happen here? Undoubtedly. Once the laws are in place a terrorist incident or something that could be plausibly described in those terms would be all that is needed to have government officials issue the order to bring the internet to a halt.
But the ability to control the internet technically is only part of the story. Laws are being passed that criminalize expressing one's views on the internet, including both "hate crime" legislation and broadly drafted laws that make it a crime to support what the government describes loosely as terrorism in any way shape or form. Regular extra-legal government intrusion in the private lives of citizens is already a reality, particularly in the so-called Western Democracies that have the necessary technology and tech-savvy manpower to tap phones and invade computers. In Europe, draconian anti-terrorism laws enable security agencies to monitor phone calls and e-mails, in many cases without any judicial oversight. In Britain, the monitoring includes access to detailed internet records that are available for inspection by no less that 653 government agencies, most of which have nothing whatsoever to do with security or intelligence, all without any judicial review. In the United States, the Pentagon recently sought an internet and news "instant response capability" which it dubbed the Office of Strategic Influence and it has also seeded a number of retired military analysts into the major news networks to provide a pro-government slant on the war news. The State Department is also in the game, tasking young officers to engage presumed radicals in debate on their websites while the growing use of national security letters means that private communications sent through the internet can be accessed by Federal law enforcement agencies. The Patriot Act created national security letter does not require judicial oversight. More than 35,000 were issued by the FBI last year and the recipient of a letter commits a felony if he or she reveals the receipt of the document. In a recent case involving an internet provider in Philadelphia, a national security letter demanded all details of internet messages sent on a certain date, to include account information on clients with social security numbers and credit card references.
The danger is real. Most Americans who are critical of the actions of their own government rely on the internet for information that is uncensored and often provocative, including sites like Campaign for Liberty. As this article was being written, a story broke reporting that Wordpress host Blogetery had been shut down by United States authorities along with all 73,000 Blogetery-hosted blogs. The company's ISP is claiming that it had to terminate Blogetery's account immediately after being ordered to do so by law enforcement officials "due to material hosted on the server." The extreme response implies a possible presumed terrorist connection, but it is important to note that no one was charged with any actual offense, revealing that the government can close down sites based only on suspicion. It is also likely only a matter of time before Obama's internet warfare teams surface either at the Defense Department or at State. Deliberately overloading and attacking the internet to damage its credibility, witness the numerous sites that have been "hacked" and have had to cease or restrict their activities. But the moves afoot to create a legal framework to completely shut the internet down and thereby control the "message" are far more dangerous. American citizens who are concerned about maintaining their few remaining liberties should sound the alarm and tell the politicians that we don't need more government abridgement of our First Amendment rights.
Philip M. Giraldi is a former CIA counter-terrorism specialist and military intelligence officer who served 19 years overseas in Turkey, Italy, Germany, and Spain. He was Chief of Base in Barcelona from 1989 to 1992, was designated as senior Agency officer for support at the Olympic Games, and served as official liaison to the Spanish Security and Intelligence services. He has been designated by the General Accountability Office as an expert on the impact of illegal immigration on terrorism.
BurstNET, a Pennsylvania-based Web hosting service, said that it shut down Blogetery.com earlier this month after US law enforcement officials pointed out the al-Qaeda material on the platform used by some 70,000 bloggers.
In a statement, BurstNET said it was asked by law enforcement officials on July 9 to provide information about the ownership of the server hosting Blogetry.com.
"It was revealed that a link to terrorist material, including bomb-making instructions and an al-Qaeda 'hit list,' had been posted to the site," BurstNET said.
"Upon review, BurstNET determined that the posted material, in addition to potentially inciting dangerous activities, specifically violated" the company's terms of use, BurstNET said.
"This policy strictly prohibits the posting of 'terrorist propaganda, racist material, or bomb/weapon instructions,'" BurstNET said.
"Due to this violation and the fact that the site had a history of previous abuse, BurstNET elected to immediately disable the system," it said.
The unidentified operator of Blogetary.com complained in a post on a Web forum that the service had been cut off without explanation.
"After being BurstNet customer for 7 months our server was terminated without any notification or explanation," the operator said.
Friday, June 25, 2010
Obama Can Shut Down Internet For 4 Months Under New Emergency Powers
by Paul Joseph Watson for Prison Planet
President Obama will be handed the power to shut down the Internet for at least four months without Congressional oversight if the Senate votes for the infamous Internet ‘kill switch’ bill, which was approved by a key Senate committee yesterday and now moves to the floor.
The Protecting Cyberspace as a National Asset Act, which is being pushed hard by Senator Joe Lieberman, would hand absolute power to the federal government to close down networks, and block incoming Internet traffic from certain countries under a declared national emergency.
Despite the Center for Democracy and Technology and 23 other privacy and technology organizations sending letters to Lieberman and other backers of the bill expressing concerns that the legislation could be used to stifle free speech, the Senate Homeland Security and Governmental Affairs Committee passed in the bill in advance of a vote on the Senate floor.
In response to widespread criticism of the bill, language was added that would force the government to seek congressional approval to extend emergency measures beyond 120 days. Still, this would hand Obama the authority to shut down the Internet on a whim without Congressional oversight or approval for a period of no less than four months.
The Senators pushing the bill rejected the claim that the bill was a ‘kill switch’ for the Internet, not by denying that Obama would be given the authority to shut down the Internet as part of this legislation, but by arguing that he already had the power to do so.
They argued “That the President already had authority under the Communications Act to “cause the closing of any facility or station for wire communication” when there is a “state or threat of war”, reports the Sydney Morning Herald.
Fears that the legislation is aimed at bringing the Internet under the regulatory power of the U.S. government in an offensive against free speech were heightened further on Sunday, when Lieberman revealed that the plan was to mimic China’s policies of policing the web with censorship and coercion.“Right now China, the government, can disconnect parts of its Internet in case of war and we need to have that here too,” Lieberman told CNN’s Candy Crowley.
While media and public attention is overwhelmingly focused on the BP oil spill, the establishment is quietly preparing the framework that will allow Obama, or indeed any President who follows him, to bring down a technological iron curtain that will give the government a foot in the door on seizing complete control over the Internet.
As we have illustrated, fears surrounding cybersecurity have been hyped to mask the real agenda behind the bill, which is to strangle the runaway growth of alternative and independent media outlets which are exposing government atrocities, cover-ups and cronyism like never before.
Indeed, China uses similar rhetoric about the need to maintain “security” and combating cyber warfare by regulating the web, when in reality their entire program is focused around silencing anyone who criticizes the state.
The real agenda behind government control of the Internet has always been to strangle and suffocate independent media outlets who are now competing with and even displacing establishment press organs, with websites like the Drudge Report now attracting more traffic than many large newspapers combined. As part of this war against independent media, the FTC recently proposing a “Drudge Tax” that would force independent media organizations to pay fees that would be used to fund mainstream newspapers.
-------Commentary: Joe Lieberman. "Evil Joe". Lieberman has this almost satanic ability to radiate evil and to always, always, be right in the middle of most, if not all, the really ugly and evil plans the Empire is cooking up for the rest of us. In the same vein as Kissinger, Perle or Dershowitz, Lieberman is a living caricature of the "evil Jew" of the Nazi propaganda. Why is that? Why do these guys go out of their way to match the most extreme anti-Jewish stereotypes? I just don't get it...
The Saker
Tuesday, February 3, 2009
NYT article with mode details about Javed Iqbal and the Zio-snitch who ratted him out to the Feds
Mr. Iqbal’s home, a modest two-story stone and brick house on Van Name Avenue in Mariners Harbor, stands out because among the children’s toys in the backyard were eight satellite dishes.
But this week, the budding entrepreneur’s house and storefront were raided by federal agents, and Mr. Iqbal was charged with providing customers services that included satellite broadcasts of a television station controlled by Hezbollah — a violation of federal law.
Yesterday, Mr. Iqbal was arraigned in Federal District Court in Manhattan and was ordered held in $250,000 bail. The Hezbollah station, Al Manar — or “the beacon” in Arabic — was designated a global terrorist entity by the United States Treasury Department in March of this year.
Hezbollah was designated a foreign terrorist organization by the State Department in 1997.
“The charge lurking in the background is material support for terrorism,” Stephen A. Miller, an assistant United States attorney, told United States Magistrate Judge Gabriel W. Gorenstein. He said Mr. Iqbal, 42, was a flight risk because he has family in England and Pakistan. “We think there is a strong incentive for him to run,” Mr. Miller said.
Mr. Iqbal’s lawyer, Mustapha Ndanusa, said his client, who came to the United States from Pakistan, is a compassionate man, and at one point offered shelter in his house to a homeless woman.
"He has been very generous in the community," Mr. Ndanusa said outside court. "He’s a fun-loving guy."
Another spokesman for Mr. Iqbal called the government’s charges ridiculous. "It’s like the government of Iran saying we’re going to ban The New York Times because we think of it as a terrorist outfit," the spokesman, Farhan Memon, said before the hearing. “Or China trying to ban CNN.”
Civil libertarians also expressed alarm.
“It appears that the statute under which Mr. Iqbal is being prosecuted includes a First Amendment exemption that prevents the government from punishing people for importing news communications,” Donna Lieberman, executive director of the New York Civil Liberties Union, said in a statement. “Such an exemption is constitutionally necessary, and the fact that the government is proceeding with the prosecution in spite of it raises serious questions about how free our marketplace of idea is.”
Court papers filed by the government to obtain a warrant to search Mr. Iqbal’s business and home suggested that the authorities learned that certain high-definition global transmission

Mr. Dubowitz said in a telephone interview that Al Manar’s programming includes “very explicit calls for violence,” including ones that promote suicide bombing against American troops in Iraq and “death to America.”
He said that some broadcasts, which he characterized as racist and anti-Semitic, glorify suicide bombings and suicide bombers themselves as martyrs and that children’s programming encourages youngsters to “join the jihad and give their lives for the cause.”
The programming, he said, is sophisticated and diverse, ranging from soap operas and dramas, produced in Syria and Iran, to what he called “MTV-like” music videos. A 28-part series that was broadcast over Ramadan and based on the Protocols of the Elders of Zion included a dramatization that depicted what he said looked like an Orthodox Jew slitting the throat of a Christian child and draining the child’s blood to make food for Passover.
According to the government documents, agents flew a helicopter over Mr. Iqbal’s home, then sent a confidential informant to the shop to buy a satellite package from Mr. Iqbal. The informant said that Mr. Iqbal had told him that the station was legal. Mr. Iqbal, according to the government, pressed the informant to buy a package with Al Manar instead of another service.
Mr. Iqbal’s family members declined comment yesterday. Neighbors said that the family had lived there for about five years. A sign attached to a chain-link fence along the driveway announces the business, “HDTV-LTD,” and advertises “TX/RX Earthstation and video, audio data, IP security.”
Melinda Edwards, who lives across the street, said Mr. Iqbal would use his snow blower to clear her driveway after winter storms.
“He seemed nice,’’ she said. “He seemed like everyone else.” Like many others in the neighborhood, Ms. Edwards said she noticed the large number of satellite dishes — some of which can be seen from across the street — and asked him about them a while back.
“I said, ‘You got more satellite dishes than anyone I’ve ever seen,’” Ms. Edwards said.
She said that Mr. Iqbal told her that the satellites were for his business.