Google – This Magazine https://this.org Progressive politics, ideas & culture Wed, 11 Oct 2017 17:02:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.4 https://this.org/wp-content/uploads/2017/09/cropped-Screen-Shot-2017-08-31-at-12.28.11-PM-32x32.png Google – This Magazine https://this.org 32 32 Google is finally adding thousands of Indigenous territories to its maps with the help of community members https://this.org/2017/10/11/google-is-finally-adding-thousands-of-indigenous-territories-to-its-maps-with-the-help-of-community-members/ Wed, 11 Oct 2017 17:02:30 +0000 https://this.org/?p=17337 Screen Shot 2017-10-11 at 12.59.31 PM

Chris Kalluk, Nunavut resident, hiking the streets of Iqaluit with the Trekker, a 360-degree camera. Photo by Google.

Until now, most Indigneous territories in Canada have been omitted from Google Maps, but a new initiative from the company has begun to change that. More than 3,000 Indigenous lands and territories have been added to Google Maps and Earth.

Over the past seven years Google Earth Outreach has partnered with Indigenous communities, government-sourced data repositories, and experts such as Steve DeRoy from the Firelight Group to gather information to include in the maps. DeRoy, an Anishinaabe cartographer and member of the Ebb and Flow First Nation in Manitoba, says the project has multiple layers of use, one of which is to address identity. “Most people who explore maps like to see their home on those maps,” he says.

But Indigenous communities aren’t always represented, which led DeRoy to ask himself how he could help get these lands recognized on Google’s base maps so when they do that search they can find where they come from.

The need to officially include these lands on Google Maps became increasingly clear after Google began running Indigenous mapping workshops in 2010, which gave Indigenous peoples the tools and training to map their home territories. Some started asking why these weren’t included on Google platforms so the company set out to fix that, with DeRoy acting as an advisor.

The project follows Google’s recent inclusion of Indigenous territories in the United States and Brazil, and involved a long-term process of dialogue and data collection. All of the added territories are federally recognized First Nations reserves and treaty settlements and are searchable on Google Maps, outlined in red and labelled according to current data. This data is largely from government agencies such as Northern Affairs Canada and Natural Resources Canada, who provided the bulk of the information. “Now when you go to Google Maps and Google Earth you’ll be able to see that data actually as part of the maps,” says DeRoy.

The initiative is an important step in the right direction as the country celebrates its sesquicentennial. “We’re talking about thousands of years of occupation of Indigenous people in North America, and to be recognized on those maps—it’s one step closer towards reconciliation.”

The project is an ongoing process, and those communities who would like to add their lands to the maps or update existing areas are encouraged to reach out to those involved in the project.

For now, DeRoy is hoping to inspire other regions to follow suit: “I would love to see this on a global scale,” he says.

]]>
Terms of service https://this.org/2014/12/15/terms-of-service/ Mon, 15 Dec 2014 20:18:36 +0000 http://this.org/magazine/?p=3865 Illustration by Matt Daley

Illustration by Matt Daley

Are we too apathetic when it comes to social media user experiments?

A few months ago, Facebook got into trouble for experimenting with some of their users. In the name of “science,” the company decided to start tweaking people’s newsfeeds with an excess of either positive or negative status updates from friends. The study showed that exposure to these updates could make people more positive or negative themselves. In short, Facebook made some people sad. On purpose.

Shortly after Facebook published its study, the dating site OK Cupid admitted that it, too, was screwing with its users. The company told people who weren’t matches that they were perfectly compatible. It removed photos from profiles. It tracked conversations between people. Its motive was simple: to see what would happen and maybe improve its own matching algorithm.

Both of these experiments were wildly fascinating. They were also wholly unethical. Neither company had anything even close to informed consent from the people they toyed with. These sites treated their users like guinea pigs, which is weird because I’m not entirely sure it’s even legal to treat guinea pigs like guinea pigs anymore.

The response to these experiments was strange. Some people were outraged, obviously. But most either didn’t notice or didn’t care. Facebook—a site with more than a billion active users—decided to screw with random people’s emotions and the general response was an overwhelming “Meh.” Data collection is bland and uninteresting.

Maybe we just aren’t surprised when this stuff happens anymore. If you use the Internet, you’re experimented on. It isn’t new. In the early 2000s, I worked for a digital agency and one of our clients was a large retail website. For about six weeks, we showed half the site’s visitors yellow “buy” buttons, while the other half saw shiny new green buttons. The green ones showed a marginally higher click rate, which, extrapolated over a year, meant about $50 million. So all the buttons turned green. This is basic A/B testing—an exercise in using data to determine and influence behaviour.

By today’s standard, that kind of experiment is quaint. In the last decade, the Internet has become exceedingly good at tracking and manipulating people. Amazon uses browsing and purchase history to flog products, Google “scans” (but doesn’t “read”) email to try targeting ads, and pretty much every website you visit weighs and measures the actions you take for their own gain. As far as the Internet is concerned, you are the sum total of your clicks, likes and purchases. You are a data profile they can apply an algorithm to and nothing more.

It’s not the worst deal. You get a worldwide network of infinite information and constant communication; they get to sell you stuff. As far as Faustian pacts go, that seems sort of fair. But how far does it go? We get upset when a government starts peeking at our data, but we willingly hand it over to Facebook, Amazon, and Apple and, well, everyone else, assuming that the “Terms of Service” we didn’t actually read are reasonable. (It’s worth noting that Facebook inserted the clause saying they could experiment on you only after their emotion experiment had been conducted, but before they told anyone about it.)

I’m not bringing this up to fear-monger about the evils of modern technology. I like technology, I use Facebook and I shop with Amazon. And I understand that sometimes it brings on big sweeping cultural shifts. But we’re on the cusp of owning Apple Watches that can send our heartbeat to our spouse. Or, theoretically, Facebook. Or a doctor. Or an insurance company. Given where technology is headed, it’s not too much to ask that the companies handling our data be honest about what exactly they’re doing with it (or that we bother to pay attention).

Dave Eggers’ 2013 novel, The Circle, examined people willfully (even gleefully) handing over their information, their privacy and, ultimately, their humanity. People who didn’t like the book criticized that Eggers doesn’t understand technology; that he just doesn’t get it. After seeing the the crowd at Apple’s iPhone and Watch announcement react with almost religious fervour, though, I’m convinced saying Eggers doesn’t understand technology is a lot like reading 1984 and saying George Orwell doesn’t understand government.

]]>
Online freedom will depend on deeper forms of web literacy https://this.org/2012/02/13/online-freedom-will-depend-on-deeper-forms-of-web-literacy/ Mon, 13 Feb 2012 18:01:16 +0000 http://this.org/magazine/?p=3404

Illustration by Matt Daley

Recently, Google ruined my life. I may be exaggerating slightly, given that all they did was redesign and tweak Google Reader, one of their many services that I use daily and for which I pay nothing. But Reader, an admittedly niche product that lets you read articles from many websites in one place, has become my online home. It is the thing that organizes and makes sense of the sprawling, incoherent mass of the internet and collects it on one familiar light-blue page.

So when Google swooped in and changed things, I felt as if someone had rearranged all my furniture like some undergraduate prank. Making matters worse, the ability to share things with other Reader users was now gone—sacrificed to the company’s need to push their new social network, Google+. Not only had they redecorated the place, they had gone and redone all the wiring, too—and I was stranded in this newly alien environment that used to seem like home.

There were, however, those who had the tools and wherewithal to respond. People—people far more tech-savvy than me—used a browser plug-in called Greasemonkey to write pieces of code that magically restored the old Google Reader to me. Greasemonkey, as its auto mechanic-derived name suggests, lets you pop open the hood of your web browser and mess around, and there’s almost no end to what you can do with it.

It isn’t something just anyone can pick up, however. In order to create your own personalized experience of the web, you need to know how to code or, at the very least, wait for someone else to do it for you. And that requirement highlights a simple fact about the online world: if you aren’t literate in the languages of digital technology, your capacity to control your own experience is constrained. From the latest outrageous Facebook redesign that millions of people freak out over, to subtle tweaks to the ways in which Twitter operates, many of us—even those like me who really care about this stuff—find ourselves powerless to suit the web to our own needs.

It’s a problem that will require immensely complex solutions, primarily in how we conceive of education. If today we teach kids language and rhetoric so that one day they might pick apart politician’s speeches or learn to recognize a scam (and let’s face it, we’re not even doing that very well) we may soon have to do something analogous for programming skills. Much as “freedom of the press” was only ever true for those who owned one, protecting our freedoms online is going to require millions more people to better understand just how it works. Even those “digital natives” you hear about—the terrifying Tweeting, texting tweens—seldom have even the foggiest idea of how their favourite websites work. They can update their Facebook status without breaking stride, but could they code even a rudimentary equivalent? Vanishingly few could.

Thankfully, in the meantime there are intermediate bits of software that simplify and automate some aspects of coding so that those of us who can’t tell JavaScript from HTML can still control our digital lives in novel, unexpected ways. Take new service ifttt.com, for example. An acronym for “if this, then that”, ifttt allows you to cobble together dozens of commonly used web services to suit your own needs. Perhaps you want to know when a friend has posted a new picture on Flickr. Hook it up to ifttt and it can send you an email, a text message, even a phone call alerting you that your friend has uploaded their latest cat photo.

It isn’t quite idiot-proof. Yet it’s also a far cry from Greasemonkey and other programming-based tools because it asks you to think in terms you already know, rather than sophisticated new ones you must learn. And in a sense, this is the strange paradox of access and control on the web. On one hand, you are subject to the companies who become the default ways of connecting online, making you subject to their interests. On the other, the freer, less corporate versions of the web offer you tools to tweak how you use those services and to what end. It is—until coding literacy becomes the norm—almost akin to economics of the 1920s or the 2000s: with the tools of power centralized among a tiny few, the public is left at the mercy of those in control.

To get a sense of what is at stake, though, one need only turn to the ambivalent story of Diaspora*. In 2010, a four-person team of young programmers from New York University’s Courant Institute of Mathematical Sciences set out to build an alternative to Facebook that would address privacy worries and protect user data. Their announcement hit, however, amidst heightened concerns over Facebook’s record on privacy, and the team was thrown into a harsh spotlight, especially after a fundraising campaign suddenly netted them $200,000. Their plan was to create a Facebook with none of the drawbacks of Facebook, a task even Google can’t manage to do. Tragically, in late 2011 one of the four founders, 22 year-old Ilya Zhitomirskiy, was found dead, apparently after committing suicide.

No one knows, of course, if the pressure of trying to build an alternative to an all-powerful website contributed to Zhitomirskiy’s decision to take his life. But it’s an unsettling symbol of something—of how difficult it is for even young, brilliant programmers to take control of their and our online experience from multi-billion dollar entities. And, if truth be told, a redesign of a website is but a minor inconvenience. But the capacity of web firms to “rewire” whole swathes of our day-to-day lives is nonetheless ominous. It’s also a sign that, in future, freeing oneself from their grasp will come from seizing their tools and methods as our own, and learning how to code.

]]>
On the internet, you’re not a citizen—you’re a consumer https://this.org/2011/03/31/private-internet/ Thu, 31 Mar 2011 13:38:58 +0000 http://this.org/magazine/?p=2463 You're not a citizen online, just a consumer.

Illustration by Matt Daley

The United States’ decision to invade Afghanistan soon after 9/11 was misguided for many reasons, but one was purely practical: Al Qaeda is a stateless, decentralized network scattered across the globe. The spectral, international scope of the problem was no secret—so why wage a conventional war on one country? It was as if an outmoded way of thinking simply couldn’t react fast enough to a startling new reality.

With the rise of WikiLeaks and its release of thousands of classified military and diplomatic documents, something disturbingly similar is happening again. While the internet and geopolitical struggle were once rarely connected, in the WikiLeaks affair, they are now intertwined in a very real way. Among other things, the cables detailed secret U.S. bombings of Yemen and Chinese cyber-attacks on Google. Their publication drew loud, if somewhat hollow, condemnations from the likes of Hillary Clinton.

Unfortunately, the U.S. response to WikiLeaks seems eerily analogous to its response to 9/11. Another stateless, decentralized network has again attacked the establishments of American power. And America’s response, again, has been an ineffectual, ham-fisted blunder that mostly harms bystanders while the perpetrators vanish into the hills. Worse, corporations are also lining up behind governments to help protect the political status quo.

When WikiLeaks released the first batch of diplomatic cables, the reaction was, unsurprisingly, split. But whether people thought it good or bad, what everyone saw was that the spread of information on networks that do not adhere to traditional ideas of centralization, statehood, or journalism made that information extremely difficult to hide.

That didn’t stop the American government and companies from twisting almost every arm they could grab to try and stem the flow. Amazon, whose servers WikiLeaks were using to hold a copy of the cables, shut down WikiLeaks’ account, in part because its terms of service said its customers must own the rights to documents they publish. (Nobody at Amazon, it seems, caught the irony that the entire point of leaked documents is that you don’t ask for permission to publish them.) When the U.S Department of Justice served Twitter with a subpoena for the accounts of people associated with WikiLeaks—including WikiLeaks head Julian Assange and Icelandic MP Birgitta Jónsdóttir—Twitter had little choice but to comply.

Corporations obviously have to abide by the law. Beyond the business ramifications of legal censure, if they don’t play nice, neither other companies nor their shareholders will trust them.

Even though under most circumstances, law works to keep societies and economies running smoothly, legal protections for expressing dissent are built into truly democratic systems. If you want to demonstrate against powers that affect your life, you can always protest in a public square or on the street in front of a multinational. You are safe doing so because that space belongs to you as a citizen. But unlike a leak in the traditional press or the careful dance between protesters and police at a rally, WikiLeaks highlighted the fact that, on the internet, there is no tradition of public space. Indeed, the stark reality is that virtual world is essentially a private, corporate one.

If technology is increasingly both a tool and a site of resistance—and it unquestionably is—then the ownership of that space is of crucial importance. Centuries of common law underpin our rights to expression in public places; the internet has no equivalent.

We often treat the web like a public space, but the reality is that it is more like a private amusement park. We, the children who have been granted access, must play by the rules posted at its entrance. From the great server farms where data is stored to the pipes running under the sea to the copper wires linking your home to the web, all of it is owned by profit-seeking companies. And when the law knocks on their door—as it does every day with Twitter, Amazon, Google, Facebook, and others—they have to comply. What WikiLeaks so clearly demonstrated is that when companies beholden to the status quo own the virtual ground on which you can resist, it might be pulled from under you without recourse.

None of this succeeded in top-killing the WikiLeaks gusher, of course. The centreless nature of the web ensured that (so did legal protections in Europe).

But it did demonstrate that the authoritarian impulse is alive and well online, and that the rules of dissent, misbehaviour, and resistance are even less settled on the web than they are in the streets. The networks through which we spread information do not belong to us as citizens—only as consumers. Like any business transaction, the use of Twitter or storage on Amazon servers operates under a contract limited by the law. Anything that actually defies legality—as did the suffragettes, the civil rights movement, or anticapitalist anarchism today—is off limits.

Significant historical change often means not following the rules: taking to the streets, gathering with others, and yes, even breaking the odd window. But when the new virtual space of public assembly is owned by those with a vested interest in not rocking the boat, expressing dissent becomes more and more difficult.

So we are left with two competing, incompatible visions: of a technology that promised to upend the status quo; and a set of rules designed to ensure we never dare to try.

]]>
In Google’s spat with China, the legacy of colonialism still echoes https://this.org/2010/08/04/google-china-colonialism/ Wed, 04 Aug 2010 15:43:14 +0000 http://this.org/magazine/?p=1862 Illustration by Matt Daley.

Illustration by Matt Daley.

When Google, citing concerns over security and censorship, pulled their operations out of China in March this year, they were widely praised for taking a stand for democracy. But Google’s move wasn’t the first time a Western entity had taken the moral high road in regard to China.

In fact, almost 200 years ago, the British government also stood up for its beliefs. After they had expended countless resources developing an opium industry, China shut down its borders to the drug, claiming that addiction was taking its toll on Chinese society. The Raj, seeing not only its business threatened, but also its ideals of free trade and capitalism, twice sent its navy to war to force China to open its borders. Britain won, and China had to relent.

Of course, comparing an enforced opium trade with online free speech may slip into exaggeration. But when Google indignantly left China, an important point was lost in the sanctimonious chatter: to many in China, the difference between the Google of today and the Empire of yesterday isn’t as clear as we might like to think. And as the web increasingly becomes a battleground for cultural and political exchange, it’s worth remembering that history is never as far in the past as we might hope.

In the aftermath of Google’s departure, the chorus of satisfied approval was overwhelming. Though Google itself treaded with the kind of care any profit-minded company might, the press was less tactful. When Google launched a chart that tracked which services China had blocked, prominent tech journalist Steven Levy called it an “Evil Meter.” Vanity Fair’s Michael Wolff suggested that China was simply a bully, and that Google had “beat an honourable retreat.” Meanwhile, the National Post and the Globe and Mail did their best to cast the decision in moral rather than economic terms. The complexities of geopolitics and culture were reduced to a tired old approach: “Western values good; China bad.”

One might say “fair enough”: we are talking about a totalitarian regime here. But a few hundred years of Western global domination means there’s just no way to get around the optics of a massive American multinational saying its moral views are the right ones. In light of history, that kind of ideological dogmatism comes off as more than a little paternalistic.

But Google is not a parent and places like China, with their own histories, cultures and practices, are not children. To make matters worse, Google’s business model is essentially a paragon of Western democratic capitalism: disseminate information without restriction and then find a way to make money off the ways people access it. This may seem neutral, but it isn’t. It relies on the idea that spreading knowledge and information is an inherent good because an effective social system empowers individuals to find out things for themselves, and change their lives accordingly. For us, the sovereign individual is everything.

By contrast, even in contemporary Chinese thought, what still reigns is the idea that the community gives people their place in life, and the structures of ritual and authority give life order. The individualism that underpins Google’s business model is frequently seen as both arrogance and selfishness because it seems to prioritize the individual over the knowledge of the state and its rulers. The questions Google raised in China weren’t simply a matter of “repression,” but of how people locate themselves in reality. This fact seemed to be lost on most Western journalists. (About the only dissent in the technology press came from Gizmodo’s Brian Lam, himself the son of immigrants from Hong Kong, who wrote a piece titled “Google Would Remind My Grandpa of the Arrogant White Invaders.”)

Is it a noble goal to try to spread values and ideals that seem to have benefited the societies that have adopted them? Sure. But principles like democracy and freedom of speech don’t simply float down from the sky into open arms below. They are borne out of centuries-long processes rooted in social, material, and intellectual change. To assume their universal good—as Google and the Western press seemed to—is to deny their historical and cultural specificity. And at a certain point, it ceases to matter what is “objectively” right when such presumptuousness and arrogance only serve to galvanize people against you.

For all that, it’s worth noting that when Google did leave China, many there weren’t too affected. They had Baidu—a Chinese search engine, albeit heavily censored, that is the sixth most-visited website in the world and is still growing. And this is the thing, really: a Western navy can no longer force “our” way of thinking on the world, because power is no longer centralized in the West.

But history rattles noisily still, and the values of an open, democratic web aren’t universal or even necessarily right. And some, presented with the image of Google getting up on its moral high horse, find it hard to forget an armada of ships, their holds stocked with opium, barging their way into the Canton harbour.

]]>
Six visionary designers who are planning for our post-oil future https://this.org/2010/04/06/sustainable-design-post-oil-world-architecture/ Tue, 06 Apr 2010 17:09:03 +0000 http://this.org/magazine/?p=1480 A new generation of designers propose products and buildings that are energy efficient and elegant
MIT Professor Sheila Kennedy's solar-energy-producing textiles. Courtesy Sheila Kennedy.

MIT Professor Sheila Kennedy's solar-energy-producing textiles. Courtesy Sheila Kennedy.

Rick Mercer’s quip during the Copenhagen climate conference last December summed it up best: “So [Stephen] Harper flew to Copenhagen to have a club sandwich and hide in his room?”

The post-Copenhagen doldrums were still bringing us down when Thomas Auer, managing director of Transsolar, the German climate-engineering firm assigned to the Manitoba Hydro Place, stepped onto a stage at Toronto’s Interior Design Show in January to explain his vision on designing a world without oil. The future in sustainable architecture is about harnessing daylight and fresh air, he declared.

The theme that came up again and again in presentations from renowned engineers, architects, designers and futurists at IDS was if we are to kick our oil addiction, guilt-tripping us won’t work. But seduction through innovative design just might. As design guru Bruce Mau said, “I don’t believe we can succeed in sustainability without making it more sexy and beautiful.”

So imagine, for example, a beach house with billowing curtains that harvest sunlight and convert it to energy— enough to juice up your laptop or illuminate your bedroom at night. Sheila Kennedy, architect, inventor and MIT prof, has done just that. Her sensuous textiles (including lace) are implanted with ultra-thin photovoltaic strips that produce electricity when exposed to light.

For Fritz Haeg, desirable objects took a backseat to the human condition. A geodesic-dome-dwelling architect based in California, Haeg says the story of oil is one of disconnection. There was a time when we used the resources immediately within our reach and dealt with our waste locally as well, Haeg says, but oil took this away and unintentionally led to our present ignorance about the environment.

One of Fritz Haeg's Edible Estates. Courtesy Fritz Haeg.

One of Fritz Haeg's Edible Estates. Courtesy Fritz Haeg.

Edible Estates, Haeg’s ongoing gardening project, is trying to change that. By turning eight suburban front lawns from spaces you cut and “keep off” into productive gardens, Haeg wants to bring back a reality rendered invisible by oil. He’s not a Slow Food idealist; instead, Haeg says that questioning the front lawn is just the easiest first wedge into unraveling the old structure of our cities. But he acknowledges the idea will face resistance in suburbia. “How far have we come from the core of our humanity that the act of growing our own food might be considered impolite, unseemly, threatening, radical or even hostile?” he asks.

Yello Strom energy metre in use. Courtesy Yello Strom.

Yello Strom energy metre in use. Courtesy Yello Strom.

Like Haeg, Ted Howes of global consultancy IDEO believes that we have to turn energy from an invisible commodity into a tangible experience. And social media can help. The Yello Strom energy meter, which Howes helped develop for the German market, is a small wall-mounted box with a curvy bright yellow shell and a simple-to-read meter that could easily have been plucked from an Apple store window. It sends out tweets about your energy consumption and gives consumers direct access to Google’s energy management tool, PowerMeter. A phone app is sure to follow.

The attitude that we can wean ourselves off oil by finding more attractive alternatives may have ironically been best summed up by the man who was Saudi Arabia’s oil minister during the 1973 oil embargo. “The Stone Age did not end for lack of stone,” sheik Ahmed Zaki Yamani said recently, “and the Oil Age will end long before the world runs out of oil.”

“We know that the greatest obstacles to technological progress are organizational, cultural, sociological,” says Anita McGahan, a professor who teaches “The End of Oil” [PDF] at the University of Toronto. “They’re not technical. We have the technology.”

Now we need the political leadership.

]]>
From a Toronto basement, Citizen Lab fights tyranny online https://this.org/2010/03/22/citizen-lab-internet-web-security/ Mon, 22 Mar 2010 12:44:41 +0000 http://this.org/magazine/?p=1427 As the internet becomes a global battlefield, a clutch of Canadian programmers are subverting oppressive regimes, aiding online dissidents, and mapping the murky new world of digital geopolitics

Users vs governmentsThe Dalai Lama is charged with watching over Buddhist tradition, but on March 29, 2009 The New York Times revealed a shadowy presence was secretly watching him, invisibly sending information about the religious leader to his anonymous attackers. When the story broke, the office of the Dalai Lama believed it was dealing with an ordinary computer virus. It turned out to be something more widespread, organized, and ominous.

Long before The New York Times, Canada’s Citizen Lab was on the case. Based at the University of Toronto, Citizen Lab is a global leader in documenting and analyzing the exercise of political power in cyberspace. The Lab’s 10-month investigation into the virus that had lodged in the Dalai Lama’s desktop revealed it was in fact just one of 1,295 compromised computers in 103 countries, many found in embassies, government agencies, and significantly, Tibetan expatriate organizations. The researchers at Citizen Lab dubbed the network GhostNet, which spread through a malicious software program—“malware,” in technical circles—called Gh0st RAT. Gh0st RAT spread via email to high value targets: diplomats, politicians, the Dalai Lama. Once installed on a target’s computer it provides barrier-free access to an intruder, giving them full control of the system as if it were their own. This allowed the thieves to bring sensitive documents back to four control servers in China. Worse, Gh0st RAT allows its operators to take control of an entire computer in real-time, giving them the unfettered ability to see and hear their targets through the computer’s webcam and microphone.

It’s virtually impossible to determine whether GhostNet was a work of cyber-espionage by the Chinese government or a single hacker who wanted to make it look that way. In January 2010, search giant Google admitted they were one of 30 companies attacked by the latest version of Gh0st RAT and threatened to shut down the Chinese version of its site. Computer security firm Verisign reported it had traced the attacks back to “a single foreign entity consisting either of agents of the Chinese state or proxies thereof.” Beyond China, countries around the world are increasingly using the internet for espionage and intelligence-gathering. Observers report more viruses, more trojan horses, more botnets, more surveillance, more censorship and more denial-of-service attacks. The tactics are being used by governments and independent groups alike for intelligence gathering, terrorism, national security and religious or political propaganda. Most of it happens secretly, obscured by layers of technical complexity. In the early 2000s, China was a leader in cyber-espionage, but it has lately been joined by more players: Saudi Arabia, Russia, North Korea, Iran, the U.S., and Canada.

We are witnessing, the Citizen Lab researchers believe, the weaponization of cyberspace.

“I realized there was a major geopolitical contest going on in the domain of telecommunications,” says Professor Ron Deibert, Citizen Lab’s founder and head researcher. “The information environment today is mediated through telecommunications. So being able to control, access and retain information through those networks are vital sources of intelligence. This was happening, but it wasn’t being talked about.”

Deibert isn’t new to the intelligence game. He worked as policy analyst for satellite reconnaissance in the Canadian Ministry of Foreign Affairs, but it wasn’t until he wrote a book about major technological shifts in history, and started researching his PhD—documenting how rapid technological changes of the information age affected global politics—that he began investigating the war that would set him on the path to being the “M” behind the Citizen Lab.

“Our technological advantage is key to America’s military dominance,” said U.S. President Barack Obama in a May 2009 speech on his administration’s plans for the militarization of the internet. “From now on, our digital infrastructure—the networks and computers we depend on every day—will be treated as they should be: a strategic national asset. Protecting this infrastructure will be a national security priority…. We will deter, prevent, detect and defend against attacks, and recover quickly from any disruptions or damage.” In the same speech he assured the world his security plan would not infringe on internet freedom or personal privacy. The U.S. Department of Justice, however, argues (though far less publically) it can’t be sued for illegally intercepting phone calls or emails—unless they admit what they’re doing is illegal, which they won’t.

It’s this kind of secrecy (in the name of national security or not) that Citizen Lab exposes. The small team of researchers and benevolent hackers, who work in the basement of the Munk Centre for International Studies at Devonshire Place in Toronto, watch the watchers and document the shadow war most are too busy updating their Facebook pages to notice. But more than that, Deibert wants to see Canada put its peacemaking reputation to work to lead the way in drafting a constitution for cyberspace among the nations of the G8. He believes Canada can be a leading guardian of the free and open internet, a valuable global commons worth preserving, on par in importance with land, sea, air and space.

Oppressive regimes get the upper hand

Average internet users—the ones doing their banking, their shopping, or their FarmVille cultivating on the brightly lit thoroughfares of the web—are relatively safe from the cyber-spooks of the world. But if you challenge your government, expose injustice, or work for humanitarian ends in hostile places like China, Iran, Syria, Sudan, and Pakistan, it can become a dark, threatening place pretty quickly.

Deibert wanted to expose these injustices on behalf of citizens everywhere, but quickly discovered there were places he couldn’t go as a political scientist. So, with a research grant from the Ford Foundation, he launched the Citizen Lab in 2001 and began assembling a team dedicated to his two-pronged mission: monitoring and analyzing information warfare, and documenting patterns of internet censorship and surveillance.

The first major partner for the Citizen Lab was the SecDev Group, an Ottawa-based think tank that engages in evidence-based research targeting countries at risk from violence and insecurity. Its CEO, Rafal Rohozinski, was the man originally responsible for connecting all the countries in the former Soviet Union to the internet.

That meant he knew everyone who was anyone when it came to cyber-espionage in a region known for its deep ranks of hackers. This was the beginning of a vast network of agents who would later prove invaluable to all Citizen Lab operations. In those first days together with Rohozinski, Deibert also developed the methodology from which all Citizen Lab missions stem: A combination of technical reconnaissance, interrogation, field investigation, data mining, and analysis. In other words, the very same techniques used by government intelligence agencies like the National Security Agency in the U.S. and its Canadian equivalent, Communications Security Establishment Canada (CSEC). But this time, the expertise would be in the hands of the people.

“We wanted to take that combination of technical and human intelligence to turn it on its head,” Deibert said. “These organizations are using these techniques for national security purposes. They are watching everybody else, no one is watching them, and we wanted to watch them.”

Next, Deibert needed a powerhouse legal team. “We don’t break Canadian laws, but we do break the law in just about every other country,” he says. That’s why he partnered with the Berkman Center for Internet and Society. Based at Harvard Law School, this gives Deibert and his team access to a network of some of the best legal scholars in the country.

None was more vital than the final piece of the puzzle. All wars need soldiers and Citizen Lab needed the very best computer scientists, programmers, software developers and data analysts. All of whom were handpicked by Deibert from an unlikely recruitment pool: his own political science course.

“I came from a country where those in power were willfully blocking access to the net,” says Singapore-born James tay. “I knew Citizen Lab was something i wanted to do.”

The Munk Centre has all the architectural hallmarks of an English boarding school, left over from its days as a men’s university residence at the turn of the century. Few visitors have any idea what goes on beneath their feet in Citizen Lab’s dimly lit basement headquarters, but two of Deibert’s lieutenants have agreed to let me ride along on one of their online patrols.

Born and raised in Singapore, research associate James Tay has a personal stake in Citizen Lab’s mission. “I came from a country where those in power were willfully blocking access to the net. I just thought it wasn’t right, so when I heard about the lab tracking censorship and finally holding these governments accountable, I was like, ‘Okay, yeah, this is something I want to do.’”

That’s why, when riots broke out in Iran following its corrupted June 12, 2009, election, Tay was at Citizen Lab, keeping Iran’s lines of communication open. The Iranian government was blocking opposition leader Mir-Hossein Mousavi Khamenei’s website, along with Western-run sites such as YouTube and Twitter. Opposition supporters needed a way to stay connected online, to share information and coordinate their response to the crackdown.

The battering ram that broke through Iran’s online barriers is called Psiphon. Developed first by Citizen Lab, the software is now its own commercial entity, helping to fund the lab’s academic research. Through small chinks in the Iranian government’s armour, Tay was able to send a short, crucial message to people inside Iran who needed unrestricted access to the web: the snippet of text he was charged with sneaking over the border through TweetDeck—software that communicates through Twitter without requiring an actual visit to its website— was an encrypted link to the Psiphon web server, a tunnel through the blockaded border that allowed users to see the web unhindered by Iran’s online filters. Once connected, Psiphon is simple to use: It appears as a second address bar in the web browser and delivers internet traffic through proxy sites that haven’t been blocked yet. Block one, and the data simply changes its route to the user. During the crisis, Tay was trusted with making sure Psiphon ran without Iranian governmental interference, allowing thousands of people to liberate their internet connections.

“Psiphon is open-source and free to the user, but the BBC and big media pay us money for the right to spread our proxy to their readers and viewers,” says Tay.

Psiphon isn’t for everyone, though. It doesn’t provide anonymity, for one, something that Psiphon users are made aware of before using it. Even so, many Iranians still used the service, often at great personal risk.

“Some of them were trying to organize rallies,” says Tay. “I saw that on Twitter a lot.”

But even more dangerous research is directed by the lab, just collecting the data risks the threat of imprisonment or torture if discovered by the offending country’s oppressive government. The project is known as The OpenNet Initiative.

If you stumble upon a site a sitting government doesn’t agree with, it may simply look like a problem with your internet connection. But that error page could be a fake. “These governments may publicly claim to block sites to protect the morals of their citizens, then use the same technique to block the site of a politician they don’t agree with,” says Jonathan Doda, Citizen Lab’s software developer for OpenNet. “They set up the error page because they don’t want people to know. The good news is they’re pretty easy to spot.”

“What’s most popular these days is proxy based blocking,” Doda says—in which a country’s internet connection is shunted through a single gateway that allows a regime to filter all the web traffic in and out— “or some American filtering software—the same thing you find in libraries and schools or some private businesses.” In every case, the country’s internet service provider intercepts your connection and substitutes an error page.

Sometimes, the error is legitimate. After all, internet connectivity in many parts of the world can be slow and unreliable. That’s why Doda must gather evidence of governments’ intent through extensive testing. His team accesses sites multiple times and compares what happens from within Canada to what happens from inside the suspected country.

Users fight back

Doda’s been programming since he was a kid, making software in BASIC on his PC Jr. It was fairly easy for him to create “rTurtle,” the software that collects the data, looking for anomalies like dummy IP addresses, weird-looking address headers and missing keywords in the returned page. The lab needed a way to test within the offending countries, but the lists of blocked sites are determined by religious or political elites and implemented by centralized internet providers in target countries—closed systems that are virtually impossible to penetrate as an outsider.

But Rafal Rohozinski’s international reach gave Citizen Lab the ability to recruit agents within those ISPs and other high-value positions in repressive countries’ internet hierarchies. “In Central Asia alone, we have a network of about 40 individuals working for us,” says Deibert. Some of them are literally putting their life on the line—guilty of treason for working with Citizen Lab.

“Going to Burma and running the software that Jonathan developed in an internet café—that’s life-threatening research,” says Deibert. “The person doing that would have to be aware of the risks.” Those risks range from arrest, imprisonment, and interrogation, to torture and death. Deibert knows people have been arrested under similar circumstances, so OpenNet’s work requires a delicate protocol.

“Jonathan might not know the names of testers in certain countries. I might not even know their names,” says Deibert. “They’ll have a key and it’ll be used to unlock that data they need to run the software. We don’t know who they are. There will be a person who mediates their communication with us. If Jonathan were sent to Syria and got captured, he wouldn’t be able to give out a tester’s name.” For everything at stake, you’d never know the risks by stepping into the lab. Among the islands of computer terminals and the big red vinyl couch off to one side, the only thing remotely James Bond-ish is a hollow world globe stocked with contraband cigars and bottles of alcohol from the countries they’ve visited. But for all they do for others, the Citizen Lab largely ignores internet censorship and surveillance at home.

“I’m not worried as much about Canada. We have a government that’s largely accountable. Despite all the problems, we still live in a democracy that includes the benefits of humanitarian law and respect for human rights. If I did this research in Uzbekistan, I’d be jailed and tortured within the hour,” says Deibert.

Canada has cyber secrets of its own that often escape public notice. There are two bills before parliament collectively called “lawful access” meant to aid law enforcement in obtaining information needed to make an arrest. (Both bills were put on hold when parliament prorogued in December, but they appear to be Conservative government priorities and are likely to be reintroduced.)

“The approach we’ve taken is to respect civil liberties to the fullest extent possible by recreating in the cyber world the exact same principles that have been applied in the analog world. In order for police to obtain the content of emails, or intercept phone calls over the net, they will require a warrant,” says Peter Van Loan, Canadian Minister of Public Safety.

That isn’t the whole story, says David Fewer, director of the Canadian Internet Policy and Public Interest Clinic, based at the University of Ottawa’s Faculty of Law.

At the moment, police can’t force ISPs to hand over a customer’s name and address without a warrant, but the lawful access legislation will allow them to do just that.

“It’s bad enough that ISPs can give over that information if they want,” says Fewer. “Obviously our view is it shouldn’t be made available.” For now, there’s an unofficial compromise: for child pornography allegations, most ISPs give up the information, but for other crime such as fraud, police still need a warrant. Fewer says the informal understanding isn’t good enough.

“The system should be formalized, so there’s a formal response across the board,” Fewer says. “Police should be obliged to get a warrant except in cases of imminent harm, akin to a search warrant.” But police forces are currently demanding search warrant standards be relaxed. “There are sliding scales they’re demanding on certain search warrants. Ordinarily, police have to give ‘probable cause’ and they want that standard to be replaced with ‘reasonable suspicion.’”

Canada’s democratic laws don’t keep you immune from the government’s roving eye in cyberspace, either. “We have to start with the assumption that everything we do on the internet is public,” says Deibert, “and then work backwards and say, ‘What of my communication is private?’ Since potentially, at every step along the way, you can be monitored.”

In your terms of service agreement with Rogers or Bell they have the right to retain, store or turnover any information they provide you as a service including web history, web addresses, emails, and chat logs to the Canadian government for intelligence gathering and law enforcement purposes. CIPPIC is fighting various court battles around the disclosure of user identity to thirdparties online.

“We need courts to carve out some mechanism for preserving respect for privacy online,” says Fewer, “because privacy is a human right.”

Deibert wants the nations of the world to establish their own formalized treaty for the internet, one that treats cyberspace as a public commons and halts the aggressive arms race that threatens to further erode our basic rights. But drafting such an agreement will prove difficult, as security concerns continue to override basic rights.

Citizen Lab's agents are often unknown, even to Deibert himself. “going to burma and running our software in an internet café—that’s life-threatening research,” he says.

Incidents like GhostNet demonstrate that even when all signs point to a massive national espionage plot, online attacks are difficult to trace, and governments nearly always enjoy plausible deniability.

“Even when we have lots of evidence that indicates a country may be behind it, the government denies any association,” says Van Loan. “Attacks are extremely hard to trace. What would likely happen is wholesome, good players would follow it, but the bad operators would continue to operate outside of it.”

And such a treaty could abuse as much as protect. “Anonymity is viewed [by governments] as a tool of terrorists and hate-mongers and—in the negative sense— whistle-blowers,” says Fewer. He fears any such treaty would inevitably morph into a cyberspace trade agreement, further tightening abusive intellectual property laws and scaling back civil liberties at an accelerated pace. “You need a tragedy for anything good to come out of a treaty like that. The International Declaration of Human Rights was the result of the First World War.”

With six billion people on the planet facing global problems, Deibert says the real tragedy is losing the open and unfettered ability to communicate globally, but Van Loan sees no other choice. “It is really the new arms race. Every time we erect new barriers and protections some smart, tech-savvy individual comes along and finds ways around those defenses.”

For the moment, it will have to be enough to know that Citizen Lab will be watching the watchers. James Tay admits he takes his work a little too seriously. “I don’t sleep,” he says. “This isn’t your typical 9-5 job. I regularly find myself responding to emails in the middle of the night. Ron wants us to sleep, but this isn’t a job for me. It’s something I live and breathe.”

]]>
Wednesday WTF: We watched the PM on YouTube so you don't have to https://this.org/2010/03/17/stephen-harper-youtube/ Wed, 17 Mar 2010 12:10:29 +0000 http://this.org/?p=4204 Stephen Harper on YouTube

Most videos on YouTube are total fiascos, but at least they’re entertaining fiascos. Prime Minister Stephen Harper’s debut on YouTube—in which he responded with carefully prepared talking points to carefully screened video questions in a carefully pre-taped appearance—was dull because there was nothing at stake. It was like watching a man walk a tightrope across his own bathtub. But at This Magazine, we bravely suffer so you don’t have to. Here are the semi-notable bits you missed, even though you knew exactly what was going to be asked and what the answers would be. Behold!

Afghan detainees!

Q: Why is the government not more open about the Afghan detainee issue?

A: Yeah, well, first of all it’s important to say I don’t agree with the premise of the question.  First of all, this, you know, this issue has been bandied around now for nearly four years.  And yet we have no evidence that Canadian soldiers have done anything wrong. […] I think our men and women in uniform and other public servants have been doing a, you know, a good job in Afghanistan under extremely difficult conditions.  I think they do deserve our support.

Climate change!

Q: Climate change is obviously affecting the weather here in Canada.  Is your government willing to take the strong measures necessary to adequately deal with climate change?

A: [W]e said we needed a treaty that covers all emissions, and that’s the agreement we got at Copenhagen.  Now, it’s not perfect, but at least for the first time, we have virtually every country in the world saying they will be part of an effort that will include their emissions.  So we’re obviously making commitments under that agreement, and further negotiation will go forward internationally in the next year or so to try and hammer out some more details and that. […] This is, you know, this is not an easy area.  I think what all your viewers should realize is what causes emissions is economic activity.  You know, all emissions virtually are caused by either people heating themselves or moving around or engaged in economic activity of some kind.  So to change our energy use carbon footprint over time requires the development and adaptation of a new generation of technology, and that’s what we’re trying to do.

Childcare!

Q: Offering families $1200 a year for childcare doesn’t even make a dent in the actual cost of childcare, and that plan, to be quite frank, is an insult to any family that actually relies on it.

A: First of all, Canadians want to make their own childcare decisions.  I think probably my own family was not a typical…we used a combination.  You know, sometimes we looked after the kids at home, sometimes we used, or part of the time we used a daycare.  We also used family members or we paid babysitters, so…and I think you’ll actually see that a lot of Canadians have a lot of different childcare needs. […] [W]e had a previous government that promised to create a national childcare system for many years.  They spent billions of dollars.  Canadian parents never saw any of that.

The Demon Weed!

Q: A majority of Canadians, when polled, say they believe marijuana should be legal for adults, just like alcohol. Why don’t you end the war on drugs and focus on violent criminals?

A: I know some people say if you just legalized it, you know, you’d get the money and all would be well.  But I think that rests on the assumption that somehow drugs are bad because they’re illegal. […] The reason drugs are illegal is because they are bad.  And even if these things were legalized, I can predict with a lot of confidence that these would never be respectable businesses run by respectable people.

Here’s the video in full if you’re interested.

]]>
"Bloom Box" promises cheap, clean energy. Too good to be true? https://this.org/2010/02/22/bloom-box/ Mon, 22 Feb 2010 16:47:25 +0000 http://this.org/?p=3912

K.R. Sridhar of Bloom Energy shows off a component of his "Bloom Box" to 60 Minutes' Leslie Stahl.

K.R. Sridhar of Bloom Energy shows off a component of his "Bloom Box" to 60 Minutes' Leslie Stahl.

60 Minutes aired this report last night on Bloom Energy, a California company officially launching this week that says it has perfected a fuel-cell technology that is capable of making the conventional energy grid obsolete and producing clean(er), cheap(er) power. I get the strong whiff of bullshit off this whole story, and yet there’s something still irresistible about it: the idea of putting a refrigerator-sized box in your basement that’s capable of powering your whole house is just so enticing.

The thing that appears to set the “Bloom Box” apart from run-of-the-mill cold-fusion swindlers is that the technology is already in use, powering a Google datacentre with natural gas and the headquarters of eBay with landfill biogas. So actual people have paid actual money for these boxes and use the electricity they produce—and are willing to show them off to a CBS camera crew. So, with the usual caveat that when something seems too good to be true, it usually is, and also that highly choreographed public relations campaigns by self-proclaimed “revolutionary” companies make me want to puke, this is still totally worth a few minutes of viewing time.

]]>
An open source project to map one of the world's biggest slums https://this.org/2009/11/10/map-kibera-nairobi-slum/ Tue, 10 Nov 2009 17:43:37 +0000 http://this.org/?p=3160 Google Map's incomplete data for Kibera, the world's largest slum. An open source mapping project aims to provide a clearer picture.

Google Map's incomplete data for Kibera, among the world's largest slums. An open source mapping project aims to provide a clearer picture.

Kibera, one of the world’s biggest slums, is a “glaring omission” on Google Maps, says Erica Hagen, member of the Map Kibera team. Indeed, Kibera remains a blank spot in relatively well-mapped and densely populated Nairobi, the economic hub of East Africa.

When I first heard of this project, my first thought was of the potential harm that mapping this area could do. Would the government highjack the data, mapping and labeling households by ethnicity? Of course, all technology has pitfalls. Remember the use of cell phones during the Kenyan election crisis to spread hate? It would serve Map Kibera well to monitor how the government and local political groups use this new information and for what means.

Regardless, mapping Kibera does have some expected benefits. As Hagen points out, community groups are willing to participate because they think having a geographical marker might make service claims to the government easier. There would be a visual representation of where schools, clinics and water delivery services, for example, are missing.

In a community saturated with development organizations, mapping might also better situate who is working where and potentially help avoid overlaps between groups. For Westerners, it is a practical matter of being able to navigate the complex community they do not belong to, but so desperately want to volunteer in.

Google Maps brings us visual representations of the nooks and crannies of the world we would probably never have time or money to visit. This points to another advantage of mapping Kibera. Hagen is working with a group of youth who produce short clips of their community and upload to YouTube. By linking these clips to different areas of Kibera on a map there is the potential to better educate and situate Kibera for the aid-giving Westerners who see the region as in need of saving.

Kibera has been mapped before, says Hagen, who met with volunteers who had mapped the whole district for another non-governmental organization. However, they never saw the results. This time, Map Kibera wants to do things differently. Hosting the map on Open Street Map (an open-source software which the public can edit) allows others to contribute to the mapping of Kibera.

Map Kibera has also hired twelve local youth, most having just finished their high school degrees, to walk through the community with GPS devices and identify the streets, alleys, clinics, schools and so on in the area. She hopes that after this training, they will be able to spread the word (both through printed maps and the off-chance of Internet access) and ensure community engagement. “Sustainability is always difficult,” says Hagen, but she assures me that Map Kibera is working with local organizations like Ushahidi.

Stay updated for further initiatives after the initial mapping to be completed in three weeks on their website.

]]>