EU seeks more privacy pressure on Google, Facebook
RT | January 10, 2013
European Union lawmakers are hoping to pressure internet giants such as Facebook and Google, to boost personal security controls and limit the collection of data without users consent.
A German MEP has proposed modifications to the 1995 Data Protection Act, suggesting legislation that would limit corporations’ ability to use and sell data, such as browsing habits, especially when users are unaware of the practice.
“Users must be informed about what happens with their data,” said Jan Philipp Albrecht, a German Green Party MEP. “And they must be able to consciously agree to data processing – or reject it.”
EU justice commissioner Viviane Reding noted that she is “glad to see that the European Parliament rapporteurs are supporting the Commission’s aim to strengthen Europe’s data protection rules, which currently date back to 1995 – pre-Internet age.”
“A strong, clear and uniform legal framework will help unleashing the potential of the Digital Single Market and foster economic growth, innovation and job creation in Europe,” she added.
The report by the German MEP adds to a proposal for tougher data protection announced by the European Commission last January. The European Parliament, the European Commission and the bloc’s 27 nations say they will seek an agreement on the rules in the coming months.
Google and Facebook – who were among the first corporations to profit from user data – have been lobbying against any such moves in the European Union. The Internet goliaths have warned legislators that such laws may hamper innovation and harm business.
“We are concerned that some aspects of the report do not support a flourishing European digital single market and the reality of innovation on the Internet,” Erika Mann, head of EU policy for Facebook, said.
Meanwhile, the Industry Coalition for Data Protection, an ICT lobby group, stated that Albrecht had “missed an opportunity to reconcile effective privacy safeguards with rules protecting the conduct of business — both fundamental rights under the EU charter.”
The European Union frequently raises the issue of privacy controls, causing standoffs with major American corporations.
In September, in another standoff over privacy issues, Facebook was forced to remove its facial recognition software from the social network in Europe in order to comply with European data protection laws. This followed an investigation by the Office of the Data Protection Commissioner in Ireland.
Related articles
- Facebook, Google May Face More Data-Use Limits, EU Lawmaker Says (bloomberg.com)
- EU Seeks More Privacy Pressure On Google, Facebook (eurasiareview.com)
- Facebook and Google may be forced to ask permission to use personal data (guardian.co.uk)
2012 in Review: State Surveillance Around the Globe
By Katitza Rodriguez | EFF | December 31, 2012
All things considered, 2012 was a terrible year for online privacy against government surveillance. How bad was it? States around the world are demanding private data in ever-greater volumes—and getting it. They are recognizing the treasure troves of personal information created by modern communications technologies of all sorts, and pursuing ever easier, quicker, and more comprehensive access to our data. They are obtaining detailed logs of our entire lives online, and they are doing so under weaker legal standards than ever before. Several laws and proposals now afford many states warrantless snooping powers and nearly limitless data collection capabilities. These practices remain shrouded in secrecy, despite some private companies’ attempts to shine a light on the alarming measures states are taking around the world to obtain information about users.
To challenge the sweeping invasions into individuals’ personal lives, we’re calling on governments to ensure their surveillance policies and practices are consistent with international human rights standards. We’re also demanding that governments and companies become more transparent about their use of the Internet in state surveillance.
Signs of Growing International Surveillance in 2012
A new law in Brazil allows police and public prosecutors to demand user registration data from ISPs directly, via a simple request, with no court order, in criminal investigations involving money laundering. And, a new bill seeks to allow the Federal Police to demand registration data of Internet users in cases of crimes without the need of a court order nor judicial oversight.
Colombia adopted a new decree that compels ISPs to create backdoors that would make it easier for law enforcement to spy on Colombians. The law also forces ISPs and telecom providers to continuously collect and store for five years the location and subscriber information of millions of ordinary Colombian users.
Leaked documents revealed that the Mexican government shelled out $355 million to expand Mexican domestic surveillance equipment over the past year.
The Canadian government put proposed online surveillance legislation temporarily “on pause” following sustained public outrage generated by the bill. The bill introduces new police powers that would allow authorities easy access to Canadians’ online activities, including the power to force ISPs to hand over private customer data without a warrant.
The EU’s overarching data retention directive has become a dangerous model for other countries, despite the fact that several European Courts have declared several national data retention laws unconstitutional.
Romania went ahead with adopting a new data retention mandate law without any real evidence or debate over the right to privacy, despite the 2009 Constitutional Court ruling declaring the previous data retention law unconstitutional.
The German government is proposing a new law that would allow law enforcement and intelligence agencies to extensively identify Internet users, without any court order or reasonable suspicion of a crime. This year, more details were found on German State Trojan Program to spy on and monitor Skype, Gmail, Hotmail, Facebook and other online communications.
The UK government is considering a bill that would extend the police’s access to individuals’ email and social media traffic data. The UK ISPs will be compelled to gather the data and allow the UK police and security services to scrutinize it.
A Dutch proposal seeks to allow the police to break into foreign computers and search and delete data. If the location of a particular computer cannot be determined, the Dutch police would be able to break into it without ever contacting foreign authorities. Another Dutch proposal seeks to allow the police to force a suspect to decrypt information that is under investigation in a case of terrorism or sexual abuse of children.
In Russia, several new legal frameworks or proposed bills enable increased state surveillance of the Internet.
Australian law enforcement and intelligence agencies have continued to advance the false idea of the need for data retention mandates, mandatory backdoors for cloud computing services and the creation of a new crime for refusing to aid law enforcement in the decryption of communications.
A controversy arose in Lebanon over revelations that the country’s Internal Security Forces (ISF) demanded the content of all SMS text messages sent between September 13 and November 10 of this year, as well as usernames and passwords for services like Blackberry Messenger and Facebook.
The Rwandan Parliament is discussing a bill that will grant sanctions the police, army and intelligence services the power to listen to and read private communications in order to protect “public security”, the keyword often invoked to justify unnecessary human rights violations.
Pakistan adopted a Fair Trial Bill authorizing the state to intercept private communications to thwart acts of terrorism. No legal safeguards have been built in to prevent abuse of power and the word “terrorism” has been poorly defined (a word that’s often invoked to justify unnecessary human rights violations).
RIM announced that they had provided the Indian Government with a solution to intercept messages and emails exchanged via BlackBerry handsets. The encrypted communications will now be available to Indian intelligence agencies.
The Indian government approved the purchase of technological equipment to kickstart the National Intelligence Grid (NATGRID)—a project that seeks to link databases for ready access by intelligence agencies. The project is expected to facilitate “robust information sharing” by security and law enforcement agencies to combat terror threats.
Moving Forward
EFF’s international team and a coalition of civil society organizations around the world have drafted a set of principles that can be used by civil society, governments and industry to evaluate whether state surveillance laws and practices are consistent with human rights. In 2013, we will continue demanding that states adopt stronger legal protections if they want to track our cell phones, or see what web sites we’ve visited, or rummage through our Hotmail, or read our private messages on Facebook, or otherwise invade our electronic privacy. EFF will keep working collaboratively with advocates, lawyers, journalists, bloggers and security experts on the ground to fight overbroad surveillance laws. Our work will involve existing legislative initiatives, international fora, and other regional venues where we can have a meaningful impact on establishing stronger legal protections against government access to people’s electronic communications and data.
Related articles
- Colombia Adopts Mandatory Backdoor and Data Retention Mandates (informationliberation.com)
- Do we need the Snooper’s Charter to save lives? (pcpro.co.uk)
- ISP Walks Out of Piracy Talks: “We’re Not The Internet Police” (torrentfreak.com)
CISPA passes House in unexpected last-minute vote
RT | 27 April, 2012
The House of Representatives has approved Cyber Intelligence Sharing and Protection Act with a vote count of 248-168. The bill is now headed for the Senate. President Barack Obama will be able to sign or cancel it pending Senate approval.
Initially slated to vote on the bill Friday, the House of Representatives decided to pass Cyber Intelligence Sharing and Protection Act (CISPA) Thursday after approving a number of amendments.
Apart from cyber and national security purposes, the bill would now allow the government to use private information obtained through CISPA for the investigation and prosecution of “cybersecurity crime,” protection of individuals and the protection of children. The new clauses define “cybersecurity crime” as any crime involving network disruption or hacking.
“Basically this means CISPA can no longer be called a cyber security bill at all. The government would be able to search information it collects under CISPA for the purposes of investigating American citizens with complete immunity from all privacy protections as long as they can claim someone committed a ‘cybersecurity crime.’ Basically it says the Fourth Amendment does not apply online, at all,” Techdirt’s Leigh Beadon said.
Declan McCullagh, correspondent from CNET News, says CISPA will cause more trouble than is immediately apparent.
“The most controversial section of CISPA is the language – that notwithstanding any other portion the of law, companies can share what they want as long as it’s for what they call a ‘cyber security purpose,'” he told RT.
CISPA was introduced in the House last November. Critics chided the bill, saying its broad wording could allow the government to spy on individual Internet users and block websites that publish vaguely defined ‘sensitive’ data.
“[CISPA] doesn’t really have any protections against cyber threats, all it does is make people share their information. But that’s not going to solve the problem. What’s going to solve the problem is actual security measures, protecting the service in the first place, not spying on people after the fact,” Internet activist Aaron Swartz told RT.
The White House issued a statement Wednesday saying President Barack Obama would be advised to veto the bill if he receives it. The Obama administration denounces the proposed law for potentially giving the government cyber-sleuthing powers that would allow both federal authorities and private businesses to sneak into inboxes and online activities in the name of combating Internet terrorism tactics.
Earlier, the House of Representatives and Senate also considered adopting the Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA). These bills sought to entitle the US government to curb access to “rogue websites” that illegally hosted intellectual property. The bills could effectively force search engines to remove these websites from search results, an action many private companies considered intrusive.
PIPA and SOPA were opposed by many Internet giants including Google, Mozilla, Facebook, Yahoo!, Wikipedia and Reddit. Google organized a petition against the legislation, while Wikipedia held a 24-hour blackout to protest the bill in January. As a result, SOPA was recalled while PIPA was postponed indefinitely.
However, CISPA was actually backed by Facebook, despite its opposition to SOPA and PIPA. In a blog post on April 13, Joel Kaplan, Vice President of US Public Policy at Facebook, argued that if enacted into law, the bill would “give companies like ours the tools we need to protect our systems and the security of our users’ information, while also providing those users confidence that adequate privacy safeguards are in place.”
A number of big companies, including AT&T, Microsoft, Boeing, Verizon and Oracle have also supported CISPA.
Israeli Authorities or Cyber Police? Ola Haniyeh Arrested with no Charges
By Dylan Collins | Palestine Monitor | April 17, 2012
In the early morning hours of Monday March 26th, a large force of Israeli soldiers surrounded the Haniyeh house in Al-Bireh, located in the heart of the West Bank’s capital city of Ramallah. After setting up a perimeter around the house, 12 well-armed soldiers kicked down the Haniyeh’s door and entered the home.
“They broke the door. They didn’t knock. They didn’t ring. They broke the door and we found them in the middle of our bedroom,” says 26 year-old Dima Haniyeh.
After confining Dima’s parents to their bedroom, the soldiers proceeded on to the next bedroom shared by Dima and her 22 year-old sister, Ola.
Right off the bat, Dima recalls, it was clear the soldiers had an apparent interest in her young sister. “They wanted to search us both and they wanted Ola’s mobile phone and laptop.”
A female soldier was brought in to search them both.
Coincidentally, Ola’s phone had been lost several days before but the soldiers didn’t believe her.
“If you don’t give us your phone we are going to destroy the room. We will destroy every room until we find it,” Dima remembers one of the soldiers having said.
They did just that—, emptying every drawer onto the floor, flipping the beds, and clearing the shelves. Eventually, they told Ola to get dressed. They wanted to take her with them for questioning.
Ola remembers her father saying, “Why don’t you ask her here?! You’ve been here an hour and a half and haven’t asked a single question!”
Brushing aside her father’s supplications, and in violation of Fourth Geneva Convention, the soldiers took Ola with them and brought her directly to Israel’s Askalan prison in the Naqab Desert.
Another Detainee Without Charges
Ola has been held in Askalan ever since. Although no charges have been officially filed against her, a review trial held at the Askalan military court on Thursday April 5th ruled in favor of a 7-day extension of Ola’s detention. Ola was given another trial on Wednesday April 4th which resulted in yet another detention extension for the second time, as the prosecutors and Israeli judge did not carry out an investigation as they were on a vacation. Ola’s third court extension date was given this week, with her due to appear in court on Thursday, April 19.
“She is being interrogated daily regarding internet activity. The suspicion is that the internet pages are connected to ‘security activities’”, says Amal Husein of Addameer.
Ola’s detention was up for review on Tuesday April 17th. Her family and friends are confident that she will be released, as she hasn’t been accused or charged of anything as of yet. However, given the Israeli authorities’ administrative detention track record, anything is possible.
“People have said that the Israeli authorities have taken many people because of Facebook,” says Dima. “But everyone has a Facebook. Everyone puts his or her opinion on Facebook. There is nothing serious about it… it is freedom of speech.”
Ola recently graduated with a degree in Media and Political Science from Birzeit University last Fall. “She might go to protests sometimes, as all of us do, to speak out against the occupation and to support people- nothing extraordinary,” says Dima. “All of us participate—its part of being in Palestine and living under occupation.”
“She’s a quiet girl,” continues Dima. “She is a genuine and passionate person. She has friends and is lively, but she is much more the quiet type.”
Ola’s sister Dima says that Ola had perhaps had made comments on Facebook in support of Palestinian prisoners in general and against Israel’s policy of administrative detention but had done nothing out of the ordinary. “She is a journalist. This is her job. She should be able to do that,” argues Dima.
Ola’s sister and friends are quite confident that she was arrested simply because she voiced her opinions—a scary thought in the Facebook age.
“When you don’t have charges against someone—why… how can you keep them detained?” asks Dima. “When you don’t have any serious charges, how can you break down someone’s door in the middle of the night and take them? What happens when they have a serious case? What will they do then? Its scary.”
Related articles
- 1,600 Palestinian prisoners begin open-ended hunger strike in Israeli jails (alethonews.wordpress.com)
- Israeli forces shut down media launch in Jerusalem (alethonews.wordpress.com)
- Israel – Israeli troops force two Palestinian TV stations to close (en.rsf.org)
- Report: 201 Palestinians Died in Israeli Jails (and more…) (occupiedpalestine.wordpress.com)
The Disturbing Privacy Dangers in CISPA
By Trevor Timm | EFF | April 15, 2012
This week, EFF – along with a host of other civil liberties groups – are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting:
What is “CISPA”?
CISPA stands for The Cyber Intelligence Sharing and Protection Act, a cybersecurity bill written by Rep. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) (H.R. 3523). The bill purports to allow companies and the federal government to share information to prevent or defend from cyberattacks. However, the bill expressly authorizes monitoring of our private communications, and is written so broadly that it allows companies to hand over large swaths of personal information to the government with no judicial oversight—effectively creating a “cybersecurity” loophole in all existing privacy laws. Because the bill is so hotly debated now, unofficial proposed amendments are also being circulated [link] and the actual bill language is in flux.
Under CISPA, can a private company read my emails?
Yes. Under CISPA, any company can “use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property” of the company. This phrase is being interpreted to mean monitoring your communications—including the contents of email or private messages on Facebook.
Right now, well-established laws, like the Wiretap Act and the Electronic Communications Privacy Act, prevent companies from routinely monitoring your private communications. Communications service providers may only engage in reasonable monitoring that balances the providers’ needs to protect their rights and property with their subscribers’ right to privacy in their communications. And these laws expressly allow lawsuits against companies that go too far. CISPA destroys these protections by declaring that any provision in CISPA is effective “notwithstanding any other law” and by creating a broad immunity for companies against both civil and criminal liability. This means companies can bypass all existing laws, as long as they claim a vague “cybersecurity” purpose.
What would allow a company to read my emails?
CISPA has such an expansive definition of “cybersecurity threat information” that many ordinary activities could qualify. CISPA is not specific, but similar definitions in two Senate bills provide clues as to what these activities could be. Basic privacy practices that EFF recommends—like using an anonymizing service like Tor or even encrypting your emails—could be considered an indicator of a “threat” under the Senate bills. As we have stated previously, the bills’ definitions “implicate far more than what security experts would reasonably consider to be cybersecurity threat indicators—things like port scans, DDoS traffic, and the like.”
A more detailed explanation about what could constitute a “cybersecurity purpose” or “cyber security threat indicator” in the various cybersecurity bills can be read here.
Under CISPA, can a company hand my communications over to the government without a warrant?
Yes. After collecting your communications, companies can then voluntarily hand them over to the government with no warrant or judicial oversight whatsoever as long is the communications have what the companies interpret to be “cyber threat information” in them. Once the government has your communications, they can read them too.
Under CISPA, what can I do if a company improperly hands over private information to the government?
Almost nothing. CISPA would affirmatively prevent users from suing a company if they hand over their private information to the government in virtually all cases. A broad immunity provision in the proposed amendments gives companies complete protection from user lawsuits unless information was given to the government:
(I) intentionally to achieve a wrongful purpose;
(II) knowingly without legal or factual justification; and
(III) in disregard of a known or obvious risk that is so great as to make it highly probably that the harm of the act or omission will outweigh the benefit.
As Techdirt concluded, “no matter how you slice it, this is an insanely onerous definition of willful misconduct that makes it essentially impossible to ever sue a company for wrongly sharing data under CISPA.” This proposed immunity provision is actually worse than the prior version of the bill, under which companies could be sued if they acted in “bad faith.”
What government agencies can look at my private information?
Under CISPA, companies are directed to hand “cyber threat information” to the Department of Homeland Security (DHS). Once it’s in DHS’s hands, the bill says that DHS can then hand the information to other intelligence agencies, including the National Security Agency, at its discretion.
Can the government use my private information for other purposes besides “cybersecurity” once they have it?
Yes. When the bill was originally drafted, information could be used for all other law enforcement purposes besides “regulatory purposes.” A new amendment narrows this slightly. Now—even though the information was passed along to the government for only cybersecurity purposes—the government can use your personal information for either cybersecurity or national security investigations. And as long as it can be used for one of those purposes, it can be used for any other purpose as well.
Can the government use my private information to go after alleged copyright infringers and whistleblower websites?
Up until last Friday the answer was yes, and now it’s changed to maybe. In response to the overwhelming protest from the Internet community that this bill would become a backdoor for SOPA 2, the bill authors have proposed an amendment that rids the bill of any reference to “intellectual property.”
The bill previously defined “cyber threat intelligence” and “cybersecurity purpose” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.” Now the text reads:
(B) efforts to gain unauthorized access to a system or network, including efforts to gain such unauthorized access to steal or misappropriate private or government information
But it is important to remember that this proposed amendment is just that: proposed. The House has not voted it into the bill yet, so they still must follow through and remove it completely.
A more detailed explanation of how this provision could be used for copyright enforcement and censoring whistleblower sites like WikiLeaks can be read here.
What can I do to stop the government from misusing my private information?
CISPA does allow users to sue the government if they intentionally or willfully use their information for purposes other than what is described above. But any such lawsuit will be difficult to bring. For instance, the statute of limitations for such a lawsuit is two years from the date of the actual violation. It’s not at all clear how an individual would know of such misuse if it were kept inside the government.
Moreover, suing the government where classified information or the “state secrets privilege” is involved is difficult, expensive, and time consuming. EFF has been involved for years in a lawsuit over Fourth Amendment and statutory violations stemming from the warrantless wiretapping program run by the NSA—a likely recipient of “cyber threat information.” Despite six years of litigation, the government continues to maintain that the “state secrets” privilege prevents the lawsuit from being heard.
Given that DHS is notorious for classifying everything—even including their budget and number of employees—they may attempt to prevent users from finding out exactly how this information was ever used. And if the information is in the hands of the NSA and they claim “national security,” then it would get even harder.
In addition, while CISPA does mandate an Inspector General should issue a report to Congress over the government’s use of this information, its recommendations or remedies do not have to be followed.
Why are Facebook and other companies supporting this legislation?
Facebook and other companies have endorsed this legislation because they want to be able to receive information about network security threats from the government. This is a fine goal, but unfortunately CISPA would do far more than that—it would eviscerate existing privacy laws by allowing companies to voluntarily share users’ private information with the government.
Facebook released a statement Friday saying that they are concerned about users’ privacy rights and that the provision allowing them to hand user information to the government “is unrelated to the things we liked about HR 3523 in the first place.” As we explained in our analysis of Facebook’s response: the “stated goal of Facebook—namely, for companies to receive data about cybersecurity threats from the government—does not necessitate any of the CISPA provisions that allow companies to routinely monitor private communications and share personal user data gleaned from those communications with the government.” Read more about why Facebook should withdraw support from CISPA until privacy safeguards are in place here.
What can I do to stop this bill?
It’s vital that concerned Internet users tell Congress to stop this bill. Use EFF’s action center to send an email to your Congress member urging them to oppose this bill.
Related articles
- Worse than SOPA? CISPA to censor Web in name of cybersecurity (alethonews.wordpress.com)
- Facebook defends CISPA support, completely misses the point (digitaltrends.com)
- What You Need to Know About CISPA (readwriteweb.com)
- What Facebook Wants in Cybersecurity Doesn’t Require Trampling On Our Privacy Rights (eff.org)
- Say ‘hello’ to CISPA, it will remind you of SOPA (news.cnet.com)
UK to spy on all online communications
Press TV – February 19, 2012
The British government is to exert more control over the public by storing the details of British people’s communications including every phone call, text message and email.
The British government will order phone companies and broadband providers to record the details of all phone calls, text messages, and emails and restore the data for one year, reported the Telegraph on Saturday.
Britain’s new spy plans will also target social networking websites such as Facebook and Twitter as the details of direct messages communicated between the users are to be recorded.
The change in the social media has been a concern for the British government at times of crisis such as the unprecedented unrest which swept across the country in August last year.
Exerting more control over British public’s communication via social media is a preventative measure taken by the British government to spy on people and limit their access to the means of communication.
The Telegraph revealed that Britain’s Home Office has been engaged in negotiations with internet providers for two months.
The spy plans have been drawn up by the country’s intelligence agencies MI5 and MI6 in collaboration with the GCHQ, Britain’s secretive agency of intelligence experts.
Big Brother Watch, a campaign group defending individual privacy and civil liberties, described the British government’s decision as “shameful” saying, “Britain is already one of the most spied on countries off-line,” online spying on the British public would be another invasion on their privacy.
The Right to Anonymity is a Matter of Privacy
By Jillian C. York | EFF | January 28, 2012
This January 28 marks International Privacy Day. Different countries around the world are celebrating this day with their own events.
Throughout history, there have been a number of reasons why individuals have taken to writing or producing art under a pseudonym. In the 18th century, James Madison, Alexander Hamilton, and John Jay took on the pseudonym Publius to publish The Federalist Papers. In 19th century England, pseudonyms allowed women–like the Brontë sisters, who initially published under Currer, Ellis, and Acton Bell–to be taken seriously as writers.
Today, pseudonyms continue to serve a range of individuals, and for a variety of reasons. At EFF, we view anonymity as both a matter of free speech and privacy, but in light of International Privacy Day, January 28, this piece will focus mainly on the latter, looking at the ways in which the right to anonymity–or pseudonymity–is truly a matter of privacy.
Privacy from employers
Human beings are complex creatures with multiple interests. As such, many professionals use pseudonyms online to keep their employment separate from their personal life. One example of this is the Guardian columnist GrrlScientist who, upon discovering her Google+ account had been deleted for violating their “common name” policy, penned a piece explaining her need for privacy. Another example is prominent Moroccan blogger Hisham Khribchi, who has explained his use of a pseudonym, stating:
When I first started blogging I wanted my identity to remain secret because I didn’t want my online activity to interfere with my professional life. I wanted to keep both as separate as possible. I also wanted to use a fake name because I wrote about politics and I was critical of my own government. A pseudonym would shield me and my family from personal attacks. I wanted to have a comfortable space to express myself freely without having to worry about the police when I visit my family back in Morocco.
Though Khribchi’s reasoning is two-fold, his primary concern–even stronger than his need for protection from his government–was keeping his online life separate from his employment.
Privacy from the political scene
In 2008, an Alaskan blogger known as “Alaska Muckraker” (or AKM) rose to fame for her vocal criticism of fellow Alaskan and then-McCain-running-mate Sarah Palin. Later, after inveighing against a rude email sent to constituents by Alaska State Representative Mike Doogan, AKM was outed–by Doogan–who wrote that his “own theory about the public process is you can say what you want, as long as you are willing to stand behind it using your real name.”
AKM, a blogger decidedly committing an act of journalism, could have had any number of reasons to remain anonymous. As she later wrote:
I might be a state employee. I might not want my children to get grief at school. I might be fleeing from an ex-partner who was abusive and would rather he not know where I am. My family might not want to talk to me anymore. I might alienate my best friend. Maybe I don’t feel like having a brick thrown through my window. My spouse might work for the Palin administration. Maybe I’d just rather people not know where I live or where I work. Or none of those things may be true. None of my readers, nor Mike Doogan had any idea what my personal circumstances might be.
Though Doogan claimed that AKM gave up her right to anonymity when her blog began influencing public policy, he’s wrong. In the United States, the right to anonymity is protected by the First Amendment and must remain so, to ensure both the free expression and privacy rights of citizens.
Similarly, in 2009, Ed Whelans, a former official with the Department of Justice, outed anonymous blogger John Blevins–a professor at the South Texas College of Law–in the National Review, calling him “irresponsible”, and a “coward.” Blevins took the fall gracefully, later explaining why he had chosen to blog under a pseudonym. Like Khribchi, Blevins’ reasons were numerous: He feared losing tenure and legal clients, but he also feared putting the jobs of family members in the political space at risk.
Privacy from the public eye
A friend of mine–let’s call him Joe–is the sibling of a famous celebrity. But while he’s very proud of his sibling, Joe learned early on that not everyone has his best interests at heart. Therefore, Joe devised a pseudonym to use online in order to protect the privacy of himself and his family.
In Joe’s case, the threat is very real: celebrities are regularly stalked, their houses broken into. His pseudonym keeps him feeling “normal” in his online interactions, while simultaneously protecting his sibling and the rest of his family from invasions of privacy.
Achieving anonymity online
Anonymity and pseudonymity may seem increasingly difficult to achieve online. Not only do companies like Facebook restrict your right to use a pseudonym, but even when you do think you’re anonymous, you might not be–as blogger Rosemary Port found out in 2009 after Google turned over her name in response to a court order.
While we should continue to fight for our privacy under the law, the best thing we can do as users to who value our right to anonymity is to use tools like Tor. Anonymous bloggers can use Global Voices Advocacy’s online guide to blogging anonymously with WordPress and Tor. And all Internet users should educate themselves about what is–and isn’t–private on their online accounts and profiles.
Related articles
- International Privacy Day: Fighting Data Retention Mandates Around the World (alethonews.wordpress.com)
- Google And Privacy: Nothing To See Here, Move On (informationweek.com)
- Google shifts stance on Google+ anonymity, will support pseudonyms (arstechnica.com)
- Google Says Bye Bye to User Privacy (forbes.com)
- Google+ relaxes real-name policy, allows pseudonyms (plus.google.com)

