A Personal Transfer: From Shell International to Bits of Freedom

Bits of Freedom
Bits of Freedom

About 4.5 years ago I wrote about me going to work for Shell. Now I am changing employer again. Starting today I will be the director of Bits of Freedom, a Dutch organization focusing on privacy and freedom of communication in the digital age.

I’ve had a wonderful time at Shell: a steep learning curve, many opportunities for doing interesting projects in the learning technology and disruptive innovation fields, smart colleagues and enough scale and budget to try out big things. I wasn’t looking to leave, but couldn’t let this chance pass by.

If you know me even a little, then you will understand that going to work for Bits of Freedom is very much a passionate choice. As somebody who understands and appreciates the positive potential of technology, I am deeply worried about the technology-mediated future we are currently creating for ourselves. I want to make an impact and change that for the better. I can’t imagine a place in the Netherlands that is more at the forefront on issues like surveillance, the EU privacy directive or net neutrality than Bits of Freedom. I am honoured that I get to work there for the next few years.

This will likely also mean a change in course for this blog. Future digital rights related posts will go up in Dutch on the Bits of Freedom blog (Creative Commons-licensed naturally). I will have less time to focus on the world of learning, but will put some thinking into privacy of learners, data ownership and learning analytics in the next few months. Let’s see what gets posted here going forward…

The Future of Digital Identity

The Future of Digital Identity
The Future of Digital Identity

Just now I attended an event organized by the Club of Amsterdam (“Shaping Your Future in the Knowledge Society”) about the Future of Digital Identity at Info.nl. After getting a badge and being photographed without my consent I could enter.

There were three speakers, below my notes.

Can you be in control of your online identity?

Michael Hagen talked to us about IDchecker. His talk was framed as follows:

Nowadays we can’t imagine a world without Internet anymore. We use the Internet for Social media, shopping, search engine etc and because of that we share a whole lot of information about ourselves. Once the information is there, it is nearly impossible to get it of the Internet. Is there a way we are able to change this? I think there is hope for all of us!

Hagen’s business is built on the inconvenience of having to identify yourself with paper things to do significant things online (like opening a bank account).

When you buy something in the offline world you aren’t asked a lot of information when you buy (a magazine paid for by cash for example), in the online world you need to share lots of personal details. This is not only inconvenient, but also is a security risk. He thinks these details should be left in a secure place (trusted 3rd parties), like E-Herkenning or NSTIC. They should be the trusted intermediary between you and an online service provider (or merchant). This can only work if these parties are free for the consumer (but they can make money with the data that you are willing to give away), independent and international/global.

IDchecker is only one part of the total puzzle (not an e-identity provider) . They have three main services:

  • ID Document verification
  • Intelligent Data Capture
  • Face recognition (biometrics)

There was some strong criticism from Rop Gongrijp who said that these three things are trivial to forge, meaning that either the consumer doesn’t get what is promised or merchant gets the wrong information. Rop said: “Are you aware that you are potentially creating a worse nightmare than you are solving?” Another person asked why he would centralize information that was decentralized before (“my airline currently doesn’t know what books I buy”). According to Hagen these are issues with the trusted 3rd party e-identity providers and not with his ID checking service.

How I Learned to Stop Worrying and Love Living in the Panopticon

Balázs Bodó described his talk as follows:

The story of having a double identity / multiple personas is one of the most basic toposes of human imagination. We don’t need to be Dr. Jekyll (and Mr. Hyde), or Superman (and Clarke Kent) to realize that most of us have more than one face. One we show in public, one, we prefer to keep private, one, we consciously maintain, another we unwillingly hint at, etc. The Internet makes it hard to compartmentalize these personas, since we all live in the “perfect prison”, in the Panopticon. Will Jeremy Bentham’s dream “Morals reformed — health preserved — industry invigorated — instruction diffused — public burthens lightened — Economy seated, as it were, upon a rock — the gordian knot of the poor-law not cut, but untied — all by a simple idea in Architecture!” will finally be achieved now?

The notion of privacy is culturally determined. Since moving to the Netherlands he has been thinking about how to live in a surveillance society. He doesn’t mean government surveillance, but the surveillance we create for ourselves with our smartphones. The definition between the public and the private has become somewhat blurry. He showed a Facebook graph search query: Family members of people who live in China who like Falun Gong. This is information that we create ourselves.

He asked people why we have such big windows in the Netherlands without curtains. They came back with a few answers:

  • Showing off wealth
  • Calvinist prescriptions
  • Transparency as the casual enforcement of civility

The last of course relates to Bentham’s panopticon and Foucault describing how this type of thinking has completely permeated our everyday lives. Will transparency and reform our society? To more tolerance? Or to better ways of lying and deceiving?

We don’t really seem to care about these questions if we can:

  • privatize surveillance
  • turns privacy into an (exclusive) commodity
  • data mine the networks
  • turn the lack of privacy, and the decentralized resources of those observed into shareholder value

But Foucault also said “Where there is power there is resistance.”. There is a re-emergence of an underground (like the enlightenment and pirate publisher and the samizdat in the past) on the Internet. Think of things like Wikileaks, VPN, TOR, etc. According to Bodó we might have people taking advantage of our current privacy state, but in the long run “The technologies of disappearance will create gaps” and will “win”.

Panoptic Dystopia or Citizens’ Utopia?

Annie Machon‘s talk was summarized as::

We are at a crossroads in history: never before have people had such access to information and the ability to communicate with others as the Internet now provides. Conversely, never before have governments, intelligence agencies and corporations had such an ability to track our every move, thought and word, with social media such as Facebook providing access the spies could only dream of 15 years ago. As technology continues to evolve, how do we, as citizens, preserve our basic freedoms?

Machon used to be an MI5 intelligence officer and turned into a whistleblower because she saw many things in there that were wrong and illegal. This turned her and her partner into criminal and they had to go on the run. Having to be careful for many years about her behaviour has led her to think about how it would be to live in a police state.

Her whole talk consisted of terrible examples of how we are heedlessly sliding towards a panoptic distopia, she likes to spread the awareness…

In certain parts of the world this police state is in actual effect already: the American kill list leads to many people being killed in North Africa and the Middle East by drones without the US justifying this from a legal perspective. The Patriot Act has shredded the American constitution according to Machon. Websites with an American TLD like .com, .org or .net can just be taken down without any due process. The most famous case being Kim Dotcom who was illegally spied on by the US in New Zealand and arrested by an FBI swat team. We now even pursue thought crimes. She gave the example of a professor who posted his plan to behead a fake copy of prince William during the prince’s marriage ceremony and was promptly and pre-emptively locked up for 24 hours. The UK is famous for its CCTV cameras (currently there are at least 4 million publicly owned cameras). There are even talking CCTV cameras now that are monitored live. The next step will of course will be drones for crowd control.

Mussolini said that “Fascism is the merger of the corporate with the state” and this is precisely what we are seeing in the West. We need to fight back.

Behind the Scenes of the Internet: Julian Oliver & Danja Vasiliev

The Networkshop
The Networkshop

This week I was in the fortunate position to be able to attend a five day workshop at de Waag in Amsterdam. Julian Oliver and Danja Vasiliev hosted Behind The Scenes of the Internet.

The workshop opened with a presentation on the influence of engineering on society. Julian and Danja refer to themselves as critical engineers and have a clear understanding of the deep influence of technology on how we relate to each other (“Look at what Easyjet has done to the shape of Europe.”).

According to them we have more and more black boxes (often locked down) which place a rich interface (a marketing, business or political decision) between the person and the device while at the same time being very intimate to us: think about the iPod Nano in your pocket (and compare it to the old grammophone). Opening these blackboxes (essentially hacking) should then be considered research. The right to open the things we own, if only for study, is increasingly contested. This is problematic because they think technology you depend upon should be understood.

They define the Internet as a deeply misunderstood technology that we have become deeply dependent on. Somebody does own (parts of) the Internet. When they did a workshop in Peru they found out that all of the Internet traffic in that country was routed through Telefonica, giving Spain the hypothetical power to turn off Peru’s Internet when they want to. The question of geography is interesting on the Internet. Where are you on the Internet? Can you access your data and get to it? What will they say when you show up at a data center and request your files? Olver and Vasiliev consider the cloud to be a dangerous form of reductionism.

McLuhan writes in one of his introductions for Understanding Media:

The power of the arts to anticipate future social and technological developments, by a generation and more, has long been recognized. In this century Ezra Pound called the artist “the antennae of the race”. Art as radar acts as “an early alarm system,” as it were, enabling us to discover social and psychic targets in lots of time to prepare to cope with them. This concept of the arts as prophetic, contrasts with the popular idea of them as mere self-expression. [..] Art as a radar environment takes on the function of indispensable perceptual training rather than the role of a privileged diet for the elite.

Julian and Danja showed their abilities as a radar by talking about some of their artistic projects that they are working on to try and problematize these topics. Julian has just made something he calls the Transparency Grenade, a little computer wrapped in a grenade shaped holder which start snooping on the wireless netwerks around it whenever you pull out the pin. Danja is working on Netless which tries to be a network of nodes that connect to each other independently from the net. Both of them showed worked in a recent exhibit for which the Weise7 book was created. It is a box shaped like an old-fashioned book with a computer inside. When you open the book it becomes a Wifi access point that allows you to read all the information about the exhibit. When you close the book, the computer turns itself off. They also created a project that plays with what they call the “browser-defined reality”: NewsTweek which used the faux sloga: “Behind every mind is a network. Own it. Fixing the facts. One hotspot at a time”. I’ve written about this project before. It allows you to change news sites in your local wifi network. You can check what people are changning on the NewsTweek Twitter account.

All workshop participants then got a specially designed virtual machine full of networking tools that we could run in VirtualBox. Everybody had to get up to speed with the command line which got a wondeful ode by Julian: Knowing the command line is great because it is a shared language across many machines. You are talking to the computer and it is talking straight back to you. You ask and the computer responds. You can take the output of one program and make it the input of the next program. It allows you to automate the operating system (rather than the computer turning you into a proletarian clicking machine). The command line is far from going away. As computers get smaller, the command line interaction becomes a dominant model.

The artists gave us a crash course on how to use the command line interface. I love how they desribed moving between the directories as moving inside the spatial landscape of your computer. We quickly moved on to commands like netcat (or nc), ifconfig, arp arp-scan, ssh and scp. We discussed what a network packet consists of, the header (SRC, DEST, LEN, SWQ) and the body with its payload.

On the fourth day we got a short lecture on routing and how to set your default gateway on the command line. At that point in time we had created and configured our own little network and were able to ping eachother, log into each others machines and go online using the “base” computer as the gateway and our local DNS server.

In the afternoon we explored the inherent vulnerabilities in using open Wifi networks. By using Aircrack and Driftnet we were able to see images scrolling by from sites that people were browsing on a public Wifi network in a local bar. Driftnet’s manual says the following:

Driftnet watches network traffic, and picks out and displays JPEG and GIF images for display. It is an horrific invasion of privacy and shouldn’t be used by anyone anywhere.

This blog is very much my notebook too. I therefore want to make sure I keep the following three commands (in this order):

[code language=”bash”]
sudo ifconfig wlan0 down
sudo airmon-ng check kill
sudo airmon-ng start wlan0
sudo airodump-ng mon0
[/code]

The final day was about how to protect yourself a bit better online (a lot of the participants had started to feel “naked” after the Wifi snooping sessions of a day earlier. We discussed how encryption helps you with your basic human right to privacy while in the public space called the network and looked at the difference between anonimity and encryption. They explained HTTPS and Tor with this live diagram from the Electronic Frontier Foundation (EFF):

Tor and HTTPS
Tor and HTTPS

They also made us download the the Tor Browser Bundle and discussed a few handy Firefox addons:

  • GoogleSharing to anonimize your Google searches.
  • User Agent Switcher allows you to change your browser user agent so that the webpage thinks you are using a different device.
  • HTTPS everywhere to force your browser to use HTTPS whenever it is available.
  • DoNotTrackMe helps to protect you against companies tracking you online (they want to do sentiment-analysis and try to pre-empt your behaviour.

We looked at setting up a VPN which is great tool to protect you against Wifi sniffing and to quickly . They showed us ipredator and OpenVPN and have inspired me to finally turn on the VPN capabilities of my VPN server.

Finally they shared a link to their Cryptoparty Handbook. This 400 page book was written in four day sprint and provides a comprehensive overview of everything that we learned (and much more).

For many participants this workshop was a truly transforming experience, hopefully changing their relationship to technology forever. I need to thank Dorien Zandbergen for masterminding this and making it possible!

Brewster Kahle on “Universal Access to All Knowledge”

Brewster Kahle
Brewster Kahle

This afternoon I attended a session at info.nl in Amsterdam with Brewster Kahle who wants to create “Universal Access to All Knowledge”. He has founded The Internet Archive, a non-profit library with about 150 people. It is best known for its Wayback Machine (collecting about 5 billion web pages a month, amazingly still fitting in a container).

They are convinced that it is feasible to store all the world’s knowledge. Texts are being digitized (i.e. scanned) for representation on the screen (see Open Library for examples) and are openly available. The Internet Archive have made their own scanners pushing the costs per scanned page (mostly labour) down to about 10 cents per page. Their scanning centers now have 3,000,000 free ebooks available online (incl. 500,000 for the blind/dyslexic and 250,000 modern books available for lending) and they have about 8 million more to go. They have made a book mobile that can download and print a book for about one dollar.

Book Mobile
Book Mobile

They are also focusing on archiving all audio, offering unlimited storage and unlimited bandwidth for free and for ever to bands who want to store their tapes online. They have over 1 million audio items in over 100 collections. They are doing similar things to moving images, making permanent archives of video sites that have gone out of business, home movies and even television (do check that one out, it makes TV news quotable and even includes a lending model for physical DVDs of TV news).

They store their 10 Petabytes of data in a redundant fashion and also store 600,000 books in a physical archive (growing fast of course).

Brewster also talked a little bit about his case against the US government when he received a national security letter from the FBI which was deemed unconstitutional with a bit of help from the EFF and from the fact that he is a library.

Daniel Erasmus from Digital Thinking Network (DTN) did a short presentation on NewsConsole which uses a big data approach and aims to collect all the world’s news and put it in an interface that allows for easy interacting with it. I’ve been using it for a while to find news in the field of learning technology. I particularly liked his key lessons from working with big data, like:

  • SQL won’t cut it
  • Big data is messy, a lot of effort goes into cleaning it up
  • Moving a petabyte of data is very expensive and difficult, store it correctly the first time
  • Testing on small subsets doesn’t work, because you get unexpected bottlenecks when you scale
  • It is a humbling problem

Panopticon and Why You Should Care About Your Privacy

Last night I watched the Dutch documentary Panopticon which explores our privacy in the Netherlands. Peter Vlemmix made an excellent film. Do take your time to watch it below or directly on Vimeo:

[vimeo http://vimeo.com/52165457]

Vlemmix deftly shows that many people in the Netherlands think they have “nothing to hide”, while living in a society which is increasing the level of control and eroding their privacy. Even though I follow this topic actively, the film still managed to upset me. I didn’t know that the trams in Rotterdam do facial recognition or that psychiatrists have to list the diagnosis of their patients in a centralized repository (see this Dutch article, and these Dutch sites of psychiatrists battling this DBC).

Watching the film made me angry and worried. How much further before the police will start pro-actively arresting people for what they might do even before they do it, the infamous pre-crime?. The technology is already capable.

It was interesting to see how Germany, with its Nazi and Stasi history, has much more awareness of the dangers of storing too much data. They refuse to implement the EU’s data retention policy for example.

As you can see, there is ample need for a strong Dutch voice protecting your privacy. Bits of Freedom is doing a great job defending your digital rights.

Wie monitort jou?

They could really use your donation.

Do Your Bit!