EFF Fights to Protect Electronic Reserves at College Libraries
By Corynne McSherry | EFF | April 25, 2013
When college professors want students to read a small part of a book, they put that book on reserve at the library, so everyone can get access to the bit of information they need without having to buy the entire expensive work. Advances in technology have made this even easier for students: librarians have created electronic reserves, allowing online access to a digital version of the excerpt. But the publishing world has come down hard on these electronic reserves in a lawsuit aimed at Georgia State University (GSU), insisting that libraries must pay fees for excerpts they make available digitally to students. In an amicus brief filed on behalf of several national library associations today, EFF argues that electronic reserves must be protected to serve the public interest and preserve librarians’ and students’ fair-use rights.
This case started back in 2008, when the Association of American Publishers (AAP) recruited three plaintiffs to sue GSU for copyright infringement in their electronic reserves. GSU promptly updated its procedures to conform to fair use guidelines the AAP itself had helped draft for other universities. But instead of declaring victory, the plaintiffs continued to pursue this case, even taking it up on appeal when their claims were rejected by a federal district court.
In the amicus brief filed today, EFF urges the appeals court to see what the district court saw: the vast majority of uses at issue were protected fair uses. Moreover, as a practical matter, the licensing market the publishers say they want to create for e-reserves will never emerge—not least because libraries can’t afford to participate in it. Even assuming that libraries could pay such fees, requiring this would thwart the purpose of copyright by undermining the overall market for scholarship. Given libraries’ stagnant or shrinking budgets, any new spending for licenses must be reallocated from existing expenditures, and the most likely source of reallocated funds is the budget for collections. An excerpt license requirement thus will harm the market for new scholarly works, as the works assigned for student reading are likely to be more established pieces written by well-known academics. Libraries’ total investment in scholarship will be the same but resources will be diverted away from new works to redundant payments for existing ones, in direct contradiction of copyright’s purpose of “promot[ing] progress.”
A win for the publishers here would be a Pyrrhic victory at best for them, and a significant loss for the public interest. We hope the appellate court agrees that copyright law does not require forcing libraries to make reading a handful of pages either extraordinarily expensive or inordinately difficult for college students.
Files
georgiastateamicibriefconformed.pdf
Related articles
- EFF To Represent Bloggers Against Copyright Troll (eff.org)
- LCA Files Brief on Behalf of Georgia State (districtdispatch.org)
Obama administration bypasses CISPA by secretly allowing Internet surveillance
RT | April 24, 2013
Scared that CISPA might pass? The federal government is already using a secretive cybersecurity program to monitor online traffic and enforce CISPA-like data sharing between Internet service providers and the Department of Defense.
The Electronic Privacy Information Center has obtained over 1,000 pages of documents pertaining to the United States government’s use of a cybersecurity program after filing a Freedom of Information Act request, and CNET reporter Declan McCullagh says those pages show how the Pentagon has secretly helped push for increased Internet surveillance.
“Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws,” McCullagh writes.
That practice, McCullagh recalls, was first revealed when Deputy Secretary of Defense William Lynn disclosed the existence of the Defense Industrial Base (DIB) Cyber Pilot in June 2011. At the time, the Pentagon said the program would allow the government to help the defense industry safeguard the information on their computer systems by sharing classified threat information between the Department of Defense, the Department of Homeland Security and the Internet service providers (ISP) that keep government contractors online.
“Our defense industrial base is critical to our military effectiveness. Their networks hold valuable information about our weapons systems and their capabilities,” Lynn said. “The theft of design data and engineering information from within these networks greatly undermines the technological edge we hold over potential adversaries.”
Just last week the US House of Representatives voted in favor of the Cyber Intelligence Sharing and Protection Act, or CISPA — a legislation that would allow ISPs and private Internet companies across the country like Facebook and Google to share similar threat data with the federal government without being held liable for violating their customers’ privacy. As it turns out, however, the DIB Cyber Pilot has expanded exponentially in recent months, suggesting that a significant chunk of Internet traffic is already subjected to governmental monitoring.
In May 2012 less than a year after the pilot was first unveiled, the Defense Department announced the expansion of the DIB program. Then this past January, McCullagh says it was renamed the Enhanced Cybersecurity Services (ECS) and opened up to a larger number of companies — not just DoD contractors. An executive order signed by US President Barack Obama earlier this year will let all critical infrastructure companies to sign-on to ECS this June, likely in turn bringing on board entities in energy, healthcare, communication and finance.
Although the 1,000-plus pages obtained in the FOIA request haven’t been posted in full on the Web just yet, a sampling of that trove published by EPIC on Wednesday starts to show just exactly how severe the Pentagon’s efforts to eavesdrop on Web traffic has been.
In one document, a December 2011 slideshow on the legal policies and practices regarding the monitoring of Web traffic on DIB-linked systems, the Pentagon instructs the administrators of those third-party computer networks on how to implement the program and, as a result, erode their customers’ expectation of privacy.
In one slide, the Pentagon explains to ISPs and other system administrators how to be clear in letting their customers know that their traffic was being fed to the government. Key elements to keep in mind, wrote the Defense Department, was that DIB “expressly covers monitoring of data and communications in transit rather than just accessing data at rest.”
“[T]hat information transiting or stored on the system may be disclosed for any purpose, including to the government,” it continued. Companies participating in the pilot program were told to let users know that monitoring would exist “for any purpose,” and that users have no expectation of privacy regarding communications or data stored on the system.
According to the 2011 press released on the DIB Cyber Pilot, “the government will not monitor, intercept or store any private-sector communications through the program.” In a privacy impact assessment of the ECS program that was published in January by the DHS though, it’s revealed that not only is information monitored, but among the data collected by investigators could be personally identifiable information, including the header info from suspicious emails. That would mean the government sees and stores who you communicate with and what kind of subject lines are used during correspondence.
The DHS says that personally identifiable information could be retained if “analytically relevant to understanding the cyber threat” in question.
Meanwhile, the lawmakers in Congress that overwhelmingly approved CISPA just last week could arguably use a refresher in what constitutes a cyberthreat. Rep. Michael McCaul (R-Texas) told his colleagues on the Hill that “Recent events in Boston demonstrate that we have to come together as Republicans and Democrats to get this done,” and Rep. Dan Maffei (D-New York) made unfounded claims during Thursday’s debate that the whistleblowing website WikiLeaks is pursuing efforts to “hack into our nation’s power grid.”
Should CISPA be signed into law, telecommunication companies will be encouraged to share Internet data with the DHS and Department of Justice for so-called national security purposes. But even if the president pursues a veto as his advisers have suggested, McCullagh says few will be safe from this secretive cybersecurity operation already in place.
The tome of FOIA pages, McCullagh says, shows that the Justice Department has actively assisted telecoms as of late by letting them off the hook for Wiretap Act violations. Since the sharing of data between ISPs and the government under the DIB program and now ECS violates federal statute, the Justice Department has reportedly issued an undeterminable number of “2511 letters” to telecoms: essentially written approval to ignore provisions of the Wiretap Act in exchange for immunity.
“The Justice Department is helping private companies evade federal wiretap laws,” EPIC Executive Director Marc Rotenberg tells CNET. “Alarm bells should be going off.”
In an internal Justice Department email cited by McCullagh, Associate Deputy Attorney General James Baker is alleged to write that ISPs will likely request 2511 letters and the ECS-participating companies “would be required to change their banners to reference government monitoring.”
“These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks,” EPIC staff attorney Amie Stepanovich adds to CNET. “If this program was broadly deployed, it would raise serious questions about government cybersecurity practices.”
Related articles
- To Ease Internet Snooping, Feds Promise To Ignore Privacy Violations (reason.com)
- Congressman evokes Boston bombings as reason to pass CISPA (rt.com)
- U.S. gives big, secret push to Internet surveillance (philosophers-stone.co.uk)
Britons’ phone calls spied on routinely by UK police: Report
Press TV – April 20, 2013
British police forces are making as many as 250,000 requests to snoop on people’s email and phone call details every year, a new report reveals.
According to a survey, which was carried out by civil liberties and privacy campaign group Big Brother Watch, 25 police forces across Britain made 506,720 requests for people’s “communications data” over the past three years, The Telegraph reported.
The survey released under the freedom of information laws found that the number of requests for Britons’ phone or email records has risen from 158,677 in 2009-10 to 178,985 in 2011-12. However, the figure could be increased to up to 250,000 including estimates for the forces that failed to reply to the research.
This comes as the UK government is seeking more snooping powers through the controversial Communications Data Bill, which is due to be published in the summer.
The draft bill is dubbed as the Snooper’s Charter, because it is considered as a significant threat to British citizens’ privacy.
The measures mark a serious increase in the powers the British government has to order any communications provider to collect, store and provide access to information about emails, online conversations and texts.
Former British shadow home secretary David Davis said, “It is frankly not good enough that the government is considering introducing a snoopers’ charter without even being able to tell us what they have used communications data for in the past.”
Israeli police head to US to aid in Boston Marathon bombing investigation
RT | April 17, 2013
The investigation into Monday’s deadly bombing at the Boston Marathon has officially gone international: law enforcement officials from Israel have been sent to the United States to assist in the probe.
Israel Police Chief Yohanan Danino says he has dispatched officials to Boston, Massachusetts, where they will meet with Federal Bureau of Investigation agents and other authorities, the Times of Israel reports.
Citing an earlier report published by the newspaper Maariv, Times of Israel writes that Danino has dispatched police officers to participate in discussions that “will center on the Boston Marathon bombings and deepening professional cooperation between the law enforcement agencies of both countries.”
The paper reports that Israeli law enforcement planned the trip before the deadly pair of bombings on Monday that has so far claimed three lives, but the discussions will now shift focus in order to see how help from abroad can expand the investigation.
In an address made Tuesday, Israel President Shimon Peres said that tragedies such as this week’s incident in Boston, sadly, bring people together from across the world.
“When it comes to events like this, all of us are one family. We feel a part of the people who paid such a high price. God bless them,” Peres said. “Today the real problem is terror, and terror is not an extension of policy: Their policy is terror, their policy is to threaten. Terrorists divide people, they kill innocent people.”
Around 20 hours after two bombs detonated near the finish line of the annual race, United States President Barack Obama went on record to condemn the tragedy as a terrorist attack.
“This was a heinous and cowardly act,” said Obama from the White House, “and given what we now know the FBI is investigating it as an act of terrorism.”
But even as officials come to assist from as far away as Israel, authorities are still in the dark as far as finding any leads in the case. Pres. Obama has directed the FBI and US Department of Homeland Security to assist in the investigation, but no agencies have identified suspects or motives at this time.
Pres. Obama has also said that his administration has been directed to implement “appropriate security measures to protect the American people,” but details as to what that could mean remain scarce. Meanwhile, at least one leading lawmaker is asking for the US to respond to the terrorist attack by increasing the scope of the ever-expanding surveillance program already growing across the United States.
“I do think we need more cameras,” Rep. Peter King (R-New York) told MSNBC after Monday’s attacks. “We have to stay ahead of the terrorists and I do know in New York, the Manhattan Security Initiative, which is based on cameras, the outstanding work that results from that. So yes, I do favor more cameras. They’re a great law enforcement device. And again, it keeps us ahead of the terrorists, who are constantly trying to kill us.”
New York Mayor Michael Bloomberg has also confirmed that he has dispatched law enforcement officers from the Big Apple to assist in the investigation by meeting with agents at a Boston fusion center, one of the DHS-funded data facilities that collects surveillance camera footage and other evidence in order to analyze events like Monday’s attack.
“We are certainly engaged in the information flow with the FBI through our Joint Terrorism Task Force. We have two New York City police officers, police sergeants, who are in the Boston Regional Intelligence Center,” Bloomberg said on Tuesday. “They’re up there, they’ve been up there since last evening.”
But in a study conducted last year by the Senate’s bipartisan Permanent Subcommittee on Investigations, lawmakers found that those fusion centers have been more or less unhelpful in assisting with terrorism probes.
The Department of Homeland Security’s work with state and local fusion centers, the subcommittee wrote, “has not produced useful intelligence to support federal counterterrorism efforts.” Instead, they added, so-called “intelligence” shared between facilities consisted of tidbits of shoddy quality that was often outdated and “sometimes endangering [to] citizen‘s civil liberties and Privacy Act protections.”
“More often than not,” the panel added, information collected and shared at DHS fusion centers was “unrelated to terrorism.”
Related video
Related articles
EPIC Appeals FOIA Decisions Concerning Body Scanner Information
Electronic Privacy Information Center – April 16, 2013
EPIC has filed appeals in two Freedom of Information Act cases seeking documents related to airport body scanners from the Department of Homeland Security and the Transportation Security Administration.
EPIC filed FOIA requests with the agencies seeking records related to radiation risks from body scanners and the threat detection software the machines use.
The TSA is currently developing formal rules for the use of body scanners in response to a court order in one of EPIC’s previous cases.
Body scanners allow routine digital strip searches of individuals who are not suspected of any crime.
For more information, see EPIC: Radiation Risks lawsuit and EPIC: ATR lawsuit, and EPIC: Suspension of Body Scanner Program.
Related articles
- Judge: DHS Must Release Body Scanner Safety Reports (reason.com)
- Letter From a Screener: So We Found a Suicide Bomber With The Full Body Scanner: Now What? (takingsenseaway.wordpress.com)
IRS Says It Will Respect 4th Amendment With Regard to Email, But Questions Remain
By Nathan Freed Wessler | ACLU | April 16, 2013
With tax day behind us, taxpayers may soon have something else to celebrate from the IRS. In testimony before the Senate Finance Committee today, IRS Acting Commissioner Steven Miller was questioned aggressively about documents released by the ACLU last week that indicate that the IRS does not think it needs a warrant to read all emails and other electronic communications during criminal investigations. Under pressure from senators, Miller agreed to update IRS policy documents within 30 days to state that a warrant is required for access to all emails, regardless of their age.
Two senators from opposite sides of the aisle, Senator Grassley (R-IA) and Senator Wyden (D-OR), pressed Miller about whether the IRS has sought or obtained emails without a warrant since a federal appeals court ruled in 2010 that a warrant is required for all emails. (You can watch the hearing here. Sen. Grassley’s questions start at 1:25:00 and Sen. Wyden’s questions start at 1:31:10.) They asked why the IRS seems to be ignoring that 2010 decision—United States v. Warshak—in most of the country, and advising its criminal investigative agents that emails stored on a server for more than 180 days can be obtained without a warrant. Surprisingly, Miller answered that the IRS follows Warshak across the country. That’s not what internal IRS documents and its public policy manual show, but if true it is welcome news. Importantly, Miller committed to clarify written IRS policy within 30 days to state that a warrant is always required.
Miller’s testimony leaves several important questions unanswered, however:
- Although Miller stated that the IRS Criminal Investigation unit obtains warrants for all emails, he did not discuss other forms of electronic communication such as text messages, instant messages, and direct messages on social media. Under the Fourth Amendment, a warrant should be required for those private communications as well.
- Miller stated that, to his knowledge, the IRS has not obtained electronic communications without a warrant in the past. But an internal IRS Chief Counsel Advice memorandum from 2011 reveals that, months after Warshak, IRS investigative agents requested emails from an internet service provider without a warrant at least once. The IRS should explain when it started following Warshak nationally, and whether it has sought or obtained emails without a warrant in the past.
We applaud Senators Grassley and Wyden for quickly taking up this important issue and getting an answer from the IRS, less than a week after the ACLU released the IRS documents. But while the IRS’s apparent change of policy is a step in the right direction, there is more for Congress to do. The current IRS policy manual relies on the outdated Electronic Communications Privacy Act (ECPA), which only requires a warrant for some emails and other electronic communications. In order to uniformly protect the privacy of Americans’ private communications, lawmakers must update ECPA to require a warrant for the contents of all electronic communications, regardless of age or other factors. Strong reform legislation has been introduced by a bipartisan group of sponsors, and is starting to make its way through the legislative process. Follow this link to urge Congress to modernize our electronic privacy law and close the loophole that’s letting the government access email and other electronic communications without a warrant.
Related article
- New Documents Suggest IRS Reads Emails Without a Warrant (alethonews.wordpress.com)
Trans-Pacific Partnership: Free Trade vs. Democracy
By Cliff DuRand | Americas Program | April 12, 2013
As closed-door negotiations concluded in Singapore on the Trans-Pacific Partnership, opposition begins to build in many countries. At the urging of the United States, Canada and Mexico have joined the nine countries in the talks and now Japan has announced it too wants to be part of this new free trade pact of Pacific rim countries, described by its critics as “NAFTA on steroids”.
Going into its 17th round of negotiations, the Obama administration aims to wrap up an agreement by October, hoping to push ratification through the Senate on a fast- track basis. Called Trade Promotion Authority, fast track would mean an up or down vote without amendments or even hearings on the agreement presented to it. It is a profoundly anti-democratic procedure because it shuts down debate.
But from start to end, TPP has been thoroughly anti-democratic. On the first day of the Singapore talks a broad range of civil society organizations issued an open letter to Congress calling for greater transparency in the proceedings. The agreement is being hammered out in secret discussions among trade ministers. Even Senators have been denied a look at its draft provisions.
However, some 600 transnational corporations are in the inner circle. They are writing the rules for trade in their own interests without any democratic input from the people whose lives will be profoundly affected. If adopted, TPP will deny citizens their democratic rights to shape public policies on a host of domestic issues, conceding those decisions to the large corporations.
Some sections have been leaked. They reveal “an agreement that actually formalizes the priority of corporate power over government,” according to Lori Wallach of Public Citizen’s Global Trade Watch. Only 5 of the 29 chapters have to do with trade. Wallach says the rest of the draft “include[s] new rights for the big pharmaceutical companies to expand, to raise medical prices, expand monopoly patents, limits on Internet freedom, penalties for inadvertent noncommercial copying, sending something to a friend. There are the same rules that promote off-shoring of jobs that were in NAFTA that are more robust that literally give privileges and protections if you leave. There is a ban on ‘buy American’ and ‘buy local’ or ‘green’ or sweat-free procurement. There are limits on domestic financial stability regulations. There are limits on imported food safety standards and product standards. There are limits on how we can regulate energy towards a more green future – all of these things are what they call ‘Behind the Borders’ agenda. And the operating clause of TPP is: ‘Each country shall ensure the conformity of its domestic laws, regulations and administrative procedures with these agreements.’”
Global Class War
Free trade is about more than trade. It is about favoring corporations over the democratic rights of citizens and the sovereignty of nations. As the former Director-General of the WTO, Renato Ruggiero, said in 1995, “We are no longer writing the rules of interaction among separate national economies. We are writing the constitution of a single global economy.”# What is being created is a global governance order in which corporations are the citizens, not flesh and blood humans like you and me. With free trade, corporations are making an end run around democracy.
TPP is the latest offensive in a global class war. For nearly 40 years now, since the mid 1970s, corporations have been rolling back the popular gains of the New Deal era and the 1960s. Democracy has been the target of a class war to restore the class power of capital. And there has been weak resistance, at best, by the popular classes. But the stakes have become increasingly clear to more and more. Indeed, on the issue of free trade, there is now a broad public sentiment against this aspect of the corporate offensive.
The US has become the world advocate of “free trade,” promoting it through trade agreements like NAFTA and other bi-lateral agreements as well as through global governance institutions it has sponsored such as IMF, World Bank and WTO. The US has promoted free trade for much the same reason Great Britain promoted it in the 19th century, viz. the economically strongest country in the world benefits from free trade. It is the weaker countries that seek tariff protection for their infant industries, protection from competition with cheaper and higher quality imports. That protection is what enabled the US to industrialize in the last half of the 19th century. But then when the US became economically strong enough to compete regionally and eventually globally, it became an advocate of free trade and demanded that others abandon protectionism.
The justification for free trade rests on the theory of comparative advantage. This is the view that if countries trade free of government impediments, the market will tend to direct each to export that which they can produce most efficiently and import what can be produced more efficiently and thus more cheaply elsewhere. The invisible hand of the market will guide each to specialize in producing what they have a comparative advantage in. Thus a rational production and trading system will emerge that maximizes efficiency.
Free trade agreements like NAFTA were sold to the US public by appealing to consumer’s interest in having access to cheaper goods imported from Mexico. What was deliberately soft-pedaled was their interest as workers in having jobs. Organized labor opposed NAFTA, fearing it would pit US workers in competition with low wage Mexican workers. Independent presidential candidate Ross Perot warned of “a giant sucking sound” as jobs would be off-shored to Mexico.
But the Clinton administration said US exports to Mexico would create new jobs. And so, ignoring opposition from its traditional base in the unions, new Democrat Clinton pushed ratification of NAFTA through the Senate as his first priority. Perot proved to be correct as US companies shifted production to low wage Mexico – until even lower wage Chinese workers were brought into play when China joined WTO. But Clinton was also right as cheaper consumer goods from abroad filled the shelves of Wal-Mart with bargains welcomed by US workers who found their wages reduced. Free trade proved to be a mixed blessing.
Capital Becomes Global
One important point about free trade that is often overlooked is that it is not only about the free, frictionless movement of goods and services across borders, unrestricted by tariffs, quotas and regulations. It assures the free movement of capital, as corporations are freed to invest abroad. The mobility of investment capital is of utmost importance, with profound economic consequences and consequences for democracy.
Unable to find sufficiently profitable venues for investment in the overdeveloped US economy, large corporations have increasingly moved abroad. They sought not just new outlets to sell their commodities, but low wage workforces that would decrease their production costs and thus boost their profits. Frequently that would involve locating different stages of the productive process in different countries so as to take optimal advantage of local conditions. The assembly lines of US industry were disaggregated and disbursed across the globe.
Global assembly lines emerged. These global production chains have become a signature feature of contemporary capitalism. Components may be manufactured in Singapore, transported to China for subassembly and then shipped to Mexico for final assembly before sale in the United States. Although global assembly lines are geographically dispersed, they overcome the limitations of the fixed assembly lines of the Fordist era in that they no longer have to rely on a fixed labor force that can organize itself to effectively claim a share of the surplus they create.
Instead, the global assembly line gives capital the flexibility to seek out the lowest wage workforce and friendliest business environment available anywhere in the world. This has been made possible by the development of a global computerized network of instant communications via satellite. That and the computerization of banking have made money transfers and the movement of capital both easy and instantaneous. The communications network also allows the decentralization of technological development and design. Technicians can work at points distant from the processes of production to which they address themselves. And the entire process can be coordinated by management located anywhere on the globe. The limitations of space and time have been overcome by digital communications and cheap energy for transporting goods to their ultimate consumers.
For such globalized production to be possible, capital must be able to flow freely across national borders and products have to be able to move with minimum friction across those borders, unhampered by tariffs or quotas or non-uniform standards. In other words, there must be free trade for transnational capital to optimize accumulation.#
But transnational corporations also need legal protection of their investments. They need protection from expropriation of their assets, laws and governments that can ensure their property is secure. A crucial part of free trade agreements is protection of what are called investor rights. This involves more than just protection from expropriation, as happens with revolutions. It also involves protection from governmental actions that might reduce the value of their property or potential profits by environmental and health regulations, labor laws or other such measures even though they might be for the public good. What in US law is called “regulatory takings” are seen as tantamount to expropriation.
When such governmental actions do occur, free trade treaties give the foreign corporation the recourse to sue. The suit is not adjudicated in a national court, but by a transnational body of experts operating in secret. States are expected to enforce its decisions on their own nation’s taxpayers and consumers. This favors investor rights (i.e. the interests of transnational corporations) over the democratic rights of a nation.
Super NAFTA
As corporations have globalized, morphing into transnational corporations, they have promoted free trade agreements to get national governments to assist them. But when “investor rights” trump the democratic rights of citizens, the transnational corporations become the real citizens of the emerging global order. TPP is a further step in this direction, making an end run around a number of important issues –banking regulation, extension of patent protection, food inspection, environmental protection, food sovereignty, internet freedom, health care, job creation policies, and more, denying voters the opportunity to decide such matters when they impinge on corporate profit making.
Here are a few of the issues around which opposition to TPP is beginning to emerge.
* Doctors Without Borders (Medecins Sans Frontieres, MSF) is concerned that TPP would “enhance patent and data protections for pharmaceutical companies, dismantle public health safeguards enshrined in international law and obstruct price-lowering generic competition for medicines.” The intellectual property provisions would give pharmaceutical companies prolonged monopoly protection for medicines and delay access to cheaper generic versions. This would have disastrous consequences in poorer countries.
* Internet freedom is also in danger. The Council of Canadians and OpenMedia have warned that the TPP would “criminalize some everyday uses of the Internet,” including music downloads, making no distinction between commercial and non-commercial copyright infringement. The TPP imposes a “three strikes” system for copyright infringement, where three violations would result in the termination of a household’s Internet access.
* Japanese farmers are concerned that TPP will force removal of protections from Japan’s agriculture needed to maintain food sovereignty for the country. They are protesting Japan’s decision to enter into TPP negotiations at all.
* Guaranteed compensation for loss of “expected future profits” from health, labor or environmental regulations.
* Corporate performance requirements are banned.
* Capital mobility is to be guaranteed, preventing capital controls in event of a financial crisis. TPP will require countries to let capital flow in and out without restriction, not allow the banning or regulation of risky investments like derivatives and credit-default swaps and will prevent the formation of much-needed public banks
Democratic sovereignty
Most fundamentally what is at stake with TPP and existing free trade treaties is the sovereignty of nations and the ability of their peoples to make democratic decisions. This is a concern on both the Left and the Right, suggesting the possibility of a broad coalition opposing TPP, bridging our otherwise polarized politics.
A major NBC News-Wall Street Journal poll from September of 2010 revealed that “the impact of trade and outsourcing is one of the only issues on which Americans of different classes, occupations and political persuasions agree,” with 86% saying that outsourcing jobs by U.S. companies to poor countries was “a top cause of our economic woes,” with 69% thinking that “free trade agreements between the United States and other countries cost the U.S. jobs.” Only 17% of Americans in 2010 felt that “free trade agreements” benefit the U.S., compared to 28% in 2007.
Arthur Stamoulis, executive director of Citizen Trade Campaign said: “If they were to negotiate an agreement that put human rights ahead of corporate profit, creating more just and sustainable social policy, the TPP could be a tool for incredible good. But if you look at who has a seat at the table, with the public shut out and more than 600 corporate lobbyists included, there is nothing to indicate that’s the deal we’re going to get.”
The developing opposition to the corporate coup that the TPP represents has the potential to win. It’s about time for the people to win one victory in the corporate class war. Our first chance in this campaign will be over granting fast track Trade Promotion Authority. And that battle will be followed by the fight over Senate approval of TPP itself. This is one that we can win. The stakes are high. The alternatives are democracy or plutocracy.
******
Cliff DuRand is a Research Associate at the Center for Global Justice and a contributor to the CIP Americas Program http://www.cipamericas.org. He is co-author and co-editor of Recreating Democracy in a Globalized State (Clarity Press, 2012). Contact him at global.justice.cliff@gmail.com
For More Information:
Public Citizen’s Global Trade Watch http://www.citizen.org/trade
on TPP http://www.citizen.org/TPP
Citizens Trade Campaign www.citizenstrade.org
A coalition of labor, environmental, religious, family farm, and consumer organizations united in the pursuit of socially and environmentally just trade policies.
It’s Our Economy www.itsoureconomy.us
It’s Our Economy seeks to educate, organize and mobilize Americans to shift the power from concentrated capital to the people. http://itsoureconomy.us/occupy-the-tpp-stop-the-global-corporate-coup/
Related article
- NAFTA at 20: The New Spin (alethonews.wordpress.com)
How Europe’s Fight with Google Over Privacy Ignores Real Privacy
By Alfredo Lopez | This Can’t Be Happening | April 10, 2013
Last week the governments of France, Germany, Italy, the Netherlands, Spain, and the United Kingdom fired a warning shot at Google and it appears they’re reloading the gun with real ammunition.
This past December, about a year after the Internet behemoth announced a new privacy policy, a working group of representatives from these countries called the policy grossly abusive of people’s privacy and said Google had four months to bring itself into compliance with European law. Google dismissed the ultimatum: “Our privacy policy,” it said, “respects European law and allows us to create simpler, more effective services.” The European countries response was that they will take actions, based on their national laws and in coodination with each other, by the Fall.
These government/corporation tiffs are frequent and their rhetorical fire normally turns into quickly dissipated smoke. This one could be different. It comes at a time when the world’s powerful are trying to decide how much privacy we people will have and what the term privacy actually means, and this squabble’s outcome will affect that and, of course, our freedom. That alone makes it worth watching.
But there’s something deeper here that transcends this conflict. Privacy is, in fact, a core component of democracy and any infringement on complete privacy is an obscene attack on the possibility of having a free and democratic society. As important as the outcome of this show-down might be, the most important and frightening development is that it’s taking place at all.
The political shoot-out began a year ago when Google announced that it was unifying about 60 privacy policy agreements, covering its myriad services, into one big one. The company explained that lumping together these “agreements” (the things you’re asked to read before pressing the “I Accept” button on a website) was a matter of efficiency and transparency. There’s a logic to that: how many privacy policies have you read on the Internet? One would assume that if you don’t read one, you can hardly be expected to read 60.
That, however, is a corporate shell game. Google made this move not to make our reading easier but to make gathering information about us more efficient. Google is a marketing company and nothing makes a marketing company more powerful and valuable to advertisers than having pertinent information on hundreds of millions of people all over the world. Its privacy policy is fitted to that purpose. It says that, once you sign up and begin using these services as an identified user, you give up that right of refusal. So, because people don’t read that privacy policy, they don’t realize that it effectively eliminates their privacy.
For a very long time, Google has known who uses each of its services and how, but now it knows which combination of services you use and how they interact with each other in your daily life. It also knows cities or towns of residence (and, in many cases, addresses) of its registered users, the IP addresses of their computers, their names (and often the names of their family members and friends), what they do on the Internet every day, what they buy and consider buying and, for those using Gmail, who they write to and what they write. It can hone in a your specific physical location with Goodgle Maps and will store that info if you map it. In fact, all this info is stored on Google’s databases with members’ tacit approval and Google’s complete understanding of what all this means.
“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place,” Google CEO Eric Schmidt said in 2009. “If you really need that kind of privacy, the reality is that search engines — including Google — do retain this information for some time and it’s important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities.”
The information Google holds rivals and in some cases surpasses the information most governments have on their own citizens. So when Google released this new policy which permits it to combine that information and use it for evaluation, marketing and advertising, these governments commissioned France’s CNIL to investigate.
That selection, in itself, is striking. The CNIL is an independent, government-supported authority that specializes in data privacy law enforcement. France has among the strongest data collection restrictions in the world and, while CNIL has often been criticized by advocates for being too sheepish in its advocacy, data protection “sheepishness” in France would be considered ferocity in many other countries.
Like a trained bulldog, CNIL investigated all the Google data policies for nine months and then presented its report. It was devastating, accusing Google of policies and mechanisms that effectively violate privacy laws in most European countries. Based on that report, 24 of the EU’s 27 data regulators wrote Google a letter last December proposing about a dozen changes: among them that Google shouldn’t collect information on users without their consent, combine information from different services without additional consent or use the data it collects for advertising.
The four months passed. “Google did not provide any precise and effective answers,” CNIL said last week. “In this context, the EU data protection authorities are committed to act and continue their investigations. Therefore, they propose to set up a working group, led by the CNIL, in order to coordinate their reaction, which should take place before summer.”
In the diplomatic jargon of international regulation, those are fighting words. “Coordinate their reaction” is something the European Union’s countries seldom do (witness their financial crisis) and they almost never make threats around technology. Action against Google in Europe could affect the company’s relationship with one of its largest markets and a critical marketing link in the world-wide chain that is the Internet. Google could be crippled. That’s what that statement threatens.
But let’s not kid ourselves. A capitalist government, like those in Europe, has a system to protect and, to do the protecting, its police agencies routinely use data collected on the Internet about its citizens. As Google’s Schmidt put it in 2010: “In a world of asynchronous threats it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.”
So the issue here isn’t really how to protect people’s privacy; it’s how to balance the various approaches to impinging on it. Google says it needs information about you to match its marketing to what you buy; governments say they need information about you to monitor and control what you do the rest of the time. They’re trying to work out how these two approaches to information gathering can co-exist and not conflict with each other.
If, for example, a particular policy draws too much public attention to this issue or provokes a large lawsuit or gets people asking why their government isn’t — or is — doing something, that’s a problem. The government will then find its own privacy policies in the spotlight. That’s only one way this balance can become unbalanced, but in any case balance is the issue being disputed. There is really no debate about whether or not you have a right to privacy on the Internet. As far as both sides are concerned, you don’t, and both sides are most pleased if you’re not paying much attention to that fact.
It’s persistently perplexing how little most people care about this issue. Even many of the most politically conscious will often just shrug and say “there’s nothing that can be done about it”. After decades of increasing surveillance (oiled by a government-encouraged paranoia about terrorism) we expect the powerful of our society to know everything about us and, apparently, most of us can live with that. Some of us appear to think we can’t live without it.
But that battering of our democratic consciousness has not only lowered our guard against violations of our privacy; it has actually fostered a distorted understanding of what privacy actually is. Or better put: it’s convinced many of us that a small part of the privacy debate is the entire debate.
For purposes of the Internet, privacy is your ability to communicate with other people excluding anyone you want from that conversation and your ability to say what you want to those people (and listen to what they have to say) excluding people you don’t want listening.
Sure, what you say to your family or which websites you visit or what you consider buying on the Internet should, in a sane society, be your business and taking a snapshot of all this is a horrible personal violation. But the more dangerous violation is that, in establishing the means to eavesdrop on your life and honing the ability to store and analyze that information, powerful forces are systematically limiting what the Internet can be about.
What humanity created as a tool of freedom and, in many cases, struggle has been taken over by corporations and governments wielding lawsuits, imprisonment and largely unnoticed anti-freedom laws to pervert its original intent.
“When the Internet began… it was seen largely as a non-commercial oasis,” free-speech advocate and writer Robert McChesney told Democracy Now in a recent interview. “It was a place where people could go and be equal and be empowered as citizens to take on concentrated economic and political power, to battle propaganda… And there was no surveillance. People could do what they wanted and not be tracked.
“What’s been taking place… is that on a number of different fronts, extraordinarily large, monopolistic corporations have emerged: AT&T, Verizon, Comcast, at the access level; Google, Facebook, Apple, Amazon, at the application and use level. And these firms have changed the nature of the Internet dramatically… (and) they work closely with the government and the national security state and the military. They really walk hand in hand collecting this information, monitoring people, in ways that by all democratic theory are inimical to a free society.”
“Privacy” isn’t primarily individual and privacy laws aren’t in place only to address individual activities. In fact, you can’t be individually private on the Internet because then you wouldn’t be using the Internet. The privacy laws are there to make sure people can function in our exercise of free speech, exchange of information and association. They are, and always have been, a way to protect us from government inquiry and inquisition. Those laws that say a cop can’t just walk into your house and search it without a warrant or question you and those with you or keep close tabs on everything you do and who you do it with — those are privacy laws. They protect our collaborative activity from
government repression.
That collaborative activity is what the Internet has deepened and broadened. It lets us communicate with people all over the world involved in activities emanating from issues and concerns similar to ours. It lets people who are fighting for their rights in a country where such activity can get you jailed or killed talk to people world-wide who can support them. It permits coordination of struggles going on in vastly different environments in far-away countries. It cuts through our media’s lies about other countries with solid truth we learn from people in those countries. It helps unify us and helps us support each other in a rapid, almost immediate, way.
It’s what humanity needs and it’s the reason why the Internet now reaches two billion people.
But if the privacy is taken away, if a government or a corporation can read your email or follow you around as you visit and use websites, your use of the Internet for its most important political purpose becomes stored information that can be used to oppose and repress you.
Privacy, viewed that way, is the litmus test of a free environment. In that context, Google is a monster and the governments that are challenging it on such restricted grounds aren’t much better.
Yes, the progressive response to the European initiative on Google privacy should be to encourage it but with an understanding of its pitfalls and a loud outcry about them. Even if Europe has its way, the outcome will still be an erosion of our privacy and a further empowerment of those who would, in some situations, repress our movements for change.
So right now, those of us who are truly concerned about the future of this society and the world, need to place Internet privacy among our most prominent issues.
