Document:Review of "Freedom and the Future of the Internet"

From Wikispooks
Revision as of 13:30, 25 June 2014 by Robin (talk | contribs) (Text replacement - "|Date" to "|publication_date")
Jump to navigation Jump to search

Template:CryptomeBadge

Disclaimer (#3)Document.png book review of unknown authorship dated 2012-11-30
Source: Cryptome


Wikispooks Comment

John Young's insights into the Wikileaks phenomenon and the issues explored in this book are exceptional. He was a participant in the Cypherpunks mailing list from its inception and was the original registrant of the Wikileaks domain name. Through his Cryptome web site he has followed the fortunes of both Wikileaks and Julian Assange closely. In this review he casts a jaundiced but expert and experienced eye on the issues it addresses.
See Also


★ Start a Discussion about this document



Review

Cypherpunks: Freedom and the Future of the Internet

Cypherpunks [1] :Freedom and the Future of the Internet, by Julian Assange with Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. OR Books, New York, 2012, 186 pages, Paper. Buy online

This is a highly informative book, perhaps the best published on the substance of WikiLeaks, its technology, philosophy, origin and purpose, rooted in the Cypherpunks resistance to authority through encryption and anonymizing technology. The trenchant and salient, wide-ranging discussion among Assange, Appelbaum, Müller-Maguhn and Zimmermann, is derived from a four-part RT series with additional editorial material and a summarizing prologue by Assange, "A Call to Cryptographic Arms."

It is an excellent introduction to the struggle for control of digital communications, economics and governance. A prime candidate for inclusion of reading lists of the enemies of authoritarian institutions, corporations and governments heavily invested in the Internet and aiming to control it by secret collusion for their purposes -- at the global public's expense, loss of privacy and reduced democracy. It claims to be a "watchman's warning" against the threat posed by the Internet and cellphone technology.

The panel asserts:

  1. The internet is a threat to human civilization because of its panoptic surveillance and profiling of users.
  2. "Strategic surveillance" gathers all online and cellphone data as distinguished from tactical surveillance with is specifically targeted.
  3. Internet and cellphones allow surveillance more efficiently and pervasively than in the physical world.
  4. Individuals can be surveilled more easily if they remain mesmerized by computers, cellphones and social media.
  5. Encryption prevents access to private secrets by official and commercial online surveillance and by cellphones.
  6. Protestors in Arab Spring went to the streets when cellphone and online systems were disabled and thereby escaped digital surveillance.
  7. General purpose computers avoid the built-in controls of special purpose computers and devices.
  8. Free software avoids the control of restrictive governmental and commercial software.
  9. Free encryption and anonymizing technologies can protect against authoritarian aggression embedded in the equipment and operating systems of computers, cellphones, networks, internet service providers, financial institutions and governments.
  10. Younger generations will need to invent and distribute ideas, critiques, code and technology against the legacy controls of older generations indoctrinated in submissive acceptance of authority.
  11. Diverse, heterogenic concepts and technology will be required to oppose centralizing, homogenizing intents of the government- and commerce-dominated Internet and cellphones.

Evgeny Morozov and other net-negativists may scowl at the blind faith in encryption and anonymizing technology to save the Internet for its all too gullible users. Some cypherpunks are appalled at what WikiLeaks and Assange have become through excessive publicity and promotion by supporters and opponents. [2] The book could be seen as a compendium of what not to do about communications security, privacy, secrecy and authoritarianism -- for that it is to be studied carefully.

For me, the greatest virtue of this book is its description of what comes after the lessons learned of Cypherpunks and WikiLeaks -- from the diverse initiatives nobody yet knows about due to deliberate avoidance of preening, crippling publicity. [3]

Read between the book's lines, there are undisclosed means and methods inside them to panic decrypting and surveilling authoritarians and their opponents into attacking each other. [4]

Admire the book's critique of those obsessed with being in the vanguard of protecting the public, covert authoritarians in power-seeking, monetizing cahoots.

Lesson one: Protect yourself by keeping quiet, offline and sans cell, avoiding vanguards.

These comments will change, provoked by this book.

Notes