Rights, Technology

Error 451: The new HTTP code for censorship

Governments will not always be able to disguise which content they restrict across the Web thanks to a new error code which will warn users of content restricted through censorship.

On Friday, the group responsible for Internet standards, the Internet Engineering Steering Group (IESG), approved a new HTTP code to differentiate between Web pages which cannot be shown for technical reasons and others which are unavailable for non-technical reasons, such as governmental censorship.

Status codes, available within the 100s to 500s, are most commonly encountered when something goes wrong — such as a server downtime, for example, which prevents a user from accessing a Web page. The common 404 error tells users a page has not been found, but now 451 is coming into its own as a way to track other restrictions.

Online censorship is on the rise. Governments in the European bloc force ISPs to restrict access to websites linking to pirated content, China has its ever-famous “Great Firewall” which heavily restricts the Web, and countries including Russia and South Korea are also cracking down on access.

It isn’t always easy to work out whether a Web page is down because of technical reasons or governmental meddling. However, a new Internet protocol could change that.

Mark Nottingham, chair the IETF HTTP Working Group — developers of the Internet’s core HTTP protocol — explained in a blog post while the 403 error status code says “Forbidden,” it does not specify if there are legal reasons for restricting content.

However, status code 451 — a hat tip to Fahrenheit 451 — can now be used to distinguish pages unavailable due to censorship — via redwolf.newsvine.com

History, Rights, World

Britain Prunes Silly Laws on Salmon Handling and Armour Wearing

It is not a great idea to carry a plank of wood down a busy sidewalk. Nor should you ride a horse while drunk, or handle a salmon under suspicious circumstances.

But should such antics be illegal? Still?

Thanks to centuries of legislating by Parliament, which bans the wearing of suits of armor in its chambers, Britain has accumulated many laws that nowadays seem irrelevant, and often absurd.

So voluminous and eccentric is Britain’s collective body of 44,000 pieces of primary legislation that it has a small team of officials whose sole task is to prune it.

Their work is not just a constitutional curiosity, but a bulwark against hundreds of years of lawmaking running out of control.

Over the centuries, rules have piled up to penalize those who fire a cannon within 300 yards of a dwelling and those who beat a carpet in the street — unless the item can be classified as a doormat and it is beaten before 8.00am.

To have a legal situation where there is so much information that you cannot sit down and comprehend it, does seem to me a serious problem, said Andrew Lewis, professor emeritus of comparative legal history at University College London. I think it matters dreadfully that no one can get a handle on the whole of it.

Yet, as Professor Lewis also noted, many old laws have survived because crime and bad behaviour have, too.

One reason is that human nature doesn’t change much, Professor Lewis said, though of course the institutions which we develop to protect, organize, and govern ourselves do change, and then it becomes necessary to adjust the existing law to practice — via redwolf.newsvine.com

Labor’s Tim Watts Smokes Anti-Muslim MPs For ‘Hijacking National Security Debate’

Malcolm Turnbull has dialled down the terror-scare rhetoric since taking the reins from Tony Abbott — and some in his party are not liking it one bit.

A number of MPs have been speaking out with cabinet member Josh Frydenberg and the member for Canning Andrew Hastie leading the charge this weekend, doing their bit for social cohesion by arguing there is an intrinsic link between terror and Islam.

In an interview with Murdoch tabloid the Herald Sun Hastie said modern Islam needs to cohere with the Australian way of life, our values and institutions. In so far as it doesn’t, it needs reform, in an article title ‘Islam must change: War hero MP Andrew Hastie leads radical push’.

Frydenberg reiterated criticisms Australia’s Grand Mufti, while MP Michael Sukkar said Islam had not reformed as Christianity had.

George Christensen, the Nationals MP who appeared at a Reclaim Australia rally earlier this year, moved a motion in Parliament today which, among other things, calls for continued action in countering violent extremism and in particular, radical Islam within Australia in order to prevent further acts of terrorism within our borders.

Somewhere along the way Labor MP Tim Watts — who has previously taken aim at the Reclaim Australia movement — decided enough was enough.

In four minutes and 58 seconds flat the Member for Gellibrand shredded the dissenting Coalition MPs in Parliament — via redwolf.newsvine.com

Business, Politics, Rights, Technology

TPP: ISPs will hand over copyright infringer details

Trans Pacific Partnership (TPP) member states will force internet service providers (ISPs) to give up identification details of alleged copyright infringers so that rights holders can protect and enforce their copyright through criminal and civil means with few limitations, according to the full text of the agreement.

The TPP, the full text of which has been published on the website for the New Zealand Ministry of Foreign Affairs and Trade a month after reaching agreement, will regulate trade between Australia, the United States, New Zealand, Canada, Singapore, Vietnam, Malaysia, Japan, Mexico, Peru, Brunei, and Chile.

Section J of the Intellectual Property chapter [PDF] covers ISPs, with Article 18.82(7) stating that member states must enable copyright holders to access the details of alleged copyright infringers through ISPs.

Each party shall provide procedures, whether judicial or administrative, in accordance with that party’s legal system, and consistent with principles of due process and privacy, that enable a copyright owner that has made a legally sufficient claim of copyright infringement to obtain expeditiously from an internet service provider information in the provider’s possession identifying the alleged infringer, in cases in which that information is sought for the purpose of protecting or enforcing that copyright, the text says.

The full text of the intellectual property chapter ties in with leaks last month from WikiLeaks revealing that ISPs would be forced to give up copyright infringer details — via redwolf.newsvine.com

Politics, Rights, Technology

CISA blowup: Web giants sharing private info isn’t about security

There were sharp words on the floor of the US Senate on Wednesday as lawmakers debated the controversial Cybersecurity Information Sharing Act (CISA) and its amendments.

The bill, proposed by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA), would allow internet giants and other companies to share people’s personal information with the US government so it can be analyzed for signs of lawbreaking – be it computer related or not.

In return, the companies would get legal immunity from angry customers, although legal action is unlikely because the businesses and the government don’t have to reveal what they have shared, even with a freedom of information request.

The proposed legislation has been criticized by internet rights groups, and also by technology firms. Google, Facebook, Microsoft, and others published an open letter calling for the legislation to be rewritten, and since then Apple, Salesforce.com, Yelp, and Wikipedia have joined them in opposing the draft law.

Feinstein said organizations won’t be forced to reveal citizens’ private lives to Uncle Sam: it won’t be mandatory for businesses to hand over people’s private records, she claimed.

If you don’t like the bill, you don’t have to do it, Feinstein said.

So it’s hard for me to understand why we have companies like Apple and Google and Microsoft and others saying they can’t support the bill at this time. You have no reason, because you don’t have to do anything, but there are companies by the hundreds if not thousands that want to participate in this.

Her colleague Burr said on the floor that he couldn’t understand the opposition to CISA. Businesses against the new law will put their users at risk, he said, because by not sharing people’s personal information, they will not be given intelligence and heads up on attacks from the Feds.

When the companies who are against this get hacked, they are going to be begging to cooperate with the federal government, he opined — via redwolf.newsvine.com

Rights

Al Jazeera retrial: Egypt pardons journalists Mohamed Fahmy, Baher Mohamed

Egypt’s president Abdel Fattah al-Sisi has pardoned jailed Al Jazeera journalists Mohamed Fahmy and Baher Mohamed, along with 100 prisoners, the presidency and official media reported.

Presidency spokesman Alaa Youssef said the two Al-Jazeera colleagues were among the pardoned group, which also included women activists Sana Seif and Yara Sallam.

Fahmy, Mohamed and their Australian colleague Peter Greste were sentenced in a retrial last month for broadcasting false news that harmed Egypt and aiding the outlawed Muslim Brotherhood.

Fahmy and Mohamed were released from prison within hours of their presidential pardon being announced.

Greste was deported in February through a presidential decree and his name did not appear on the list of those pardoned. It is not clear whether the pardon will also apply to him.

The pardons came on the eve of the Muslim holidays of Eid, when prisoner releases often take place in Muslim countries — via redwolf.newsvine.com

Politics, Rights, Technology

Government exploit vendor hacked, client data exposed

One of the world’s most notorious providers of offensive information technology to governments has had its internal systems breached and customer documentation dumped on the open internet.

Hacking Team, founded in 2003 and based in Milan, Italy, provides surveillance software and intrusion tools to law enforcement agencies around the world.

On its website it boasts clients across the US, Europe and the Asia Pacific, assisted by more than 50 employees providing all aspects of offensive IT tools.

The company’s primary surveillance tool – dubbed Da Vinci – earned it a spot on the Reporters Without Borders Enemies of the Internet list.

Its products allow governments to monitor online communications, record voice-over-IP (VoIP) sessions, remotely activate microphones and cameras, and break encrypted files and emails.

The company’s Twitter account was today compromised, and around 400GB of internal emails, files and source code were leaked to the internet, and spread via social media.

The attackers also posted screenshots of the compromised data from the leaked file to Twitter, and defaced the company’s logo and biography.

Earlier this afternoon — before his own Twitter account appeared to be hacked — Hacking Team engineer Christian Pozzi confirmed the breach and said the company was notifying affected customers and working with police.

According to the leaked data, Hacking Team counts customers from South Korea, Saudi Arabia, Lebanon, Egypt and Mongolia. The company has long maintained it does not sell to oppressive governments — via redwolf.newsvine.com

Politics, Rights

The sound of silence stifles our freedom

So you think you’re free to speak your mind? Think again. We are, all of us, increasingly bubble-wrapped in the sounds of silence.

Silencing the intelligentsia has always been totalitarianism’s tool of choice. But there’s only so much you can achieve with prisons and pig-farms. Now, as public intelligence shrinks to a hoarse whisper, it seems corporatised culture may succeed where more gun-pointed regimes have failed.

The mindless din that now passes for civil debate is generally attributed to populism of one kind or another — the internet, the market, democracy itself. But perhaps that’s wrong. Perhaps the silence is coming from the top.

It’s not just scholars and academics, increasingly silenced by ludicrous administrative burdens, vanishing tenure, a casualising workforce and despair at the commodification of what we still call higher education. In a way, that’s the least of it. Across journalism, politics, agriculture, medicine, law, human rights and teaching, the gags are growing in size, number and efficacy — via redwolf.newsvine.com

Politics, Rights

The sound of silence stifles our freedom

So you think you’re free to speak your mind? Think again. We are, all of us, increasingly bubble-wrapped in the sounds of silence.

Silencing the intelligentsia has always been totalitarianism’s tool of choice. But there’s only so much you can achieve with prisons and pig-farms. Now, as public intelligence shrinks to a hoarse whisper, it seems corporatised culture may succeed where more gun-pointed regimes have failed.

The mindless din that now passes for civil debate is generally attributed to populism of one kind or another — the internet, the market, democracy itself. But perhaps that’s wrong. Perhaps the silence is coming from the top.

It’s not just scholars and academics, increasingly silenced by ludicrous administrative burdens, vanishing tenure, a casualising workforce and despair at the commodification of what we still call “higher” education. In a way, that’s the least of it. Across journalism, politics, agriculture, medicine, law, human rights and teaching, the gags are growing in size, number and efficacy — via redwolf.newsvine.com

Politics, Rights, Technology

Glenn Greenwald says Australia is ‘one of most aggressive’ in mass surveillance

Australia is one of the most aggressive countries in the world in terms of mass surveillance and its techniques could be the subject of future leaks, journalist Glenn Greenwald, who first reported on the Edward Snowden revelations for the Guardian, has said.

Greenwald, who now works for The Intercept, told ABC’s Lateline program on Thursday night that Australia is probably the country that has gotten away with things the most in terms of the Snowden revelations.

There are interesting documents about what Australia is doing to privacy rights — not just to their own citizens Glenn Greenwald

Australia is one of the most aggressive countries that engage in mass surveillance as a member of the Five Eyes partnership, he said, referring to a security sharing arrangement between the United States, the United Kingdom, Australia, New Zealand and Canada.

There has been less reporting on Australia than the other four countries. We intend to change that.

We are working on the reporting, he continued. We will definitely get that done as soon as we can — via redwolf.newsvine.com

Politics, Rights, Technology

Google slams Australian piracy site-blocking legislation

Google has said that cutting off advertising from piracy sites is much more effective than censoring the sites from access.

The Australian government last month introduced legislation that would allow rights holders to get an injunction placed on internet service providers (ISPs) to force telcos to block specific overseas piracy websites from access by Australian users.

The rights holders would need to demonstrate that the primary purpose of a website is for the infringement of copyright before the Federal Court will order ISPs to block it. Latest Australian news

The move has been welcomed by rights holders, but faces opposition from Google, which told the parliamentary committee looking into the legislation that site blocking is not the most effective means of stopping piracy.

A recent study of the piracy ecosystem­ in which the authors conducted a detailed analysis of the effectiveness of various anti-­piracy measures found that anti­-piracy efforts directed towards blocking access to pirated content have not been successful, Google said in its submission.

Google said that more effective measures include providing legitimate content that is more attractive to consumers than piracy, and cutting off advertising to piracy websites. The introduction of site blocking could have unintended consequences, Google warned.

Site blocking also has the potential to be used in ways that were unintended, included by blocking legitimate content.

Google said that legislation allowing sites that facilitate access to infringing copyright content to be blocked could lead to virtual private network (VPN) services being blocked.

VPNs also have many other legitimate purposes, including privacy and security, Google stated.

The court should be forced to consider the impact on freedom of speech when blocking sites, the company said — via redwolf.newsvine.com

Politics, Rights, Technology

Google slams Australian piracy site-blocking legislation

Google has said that cutting off advertising from piracy sites is much more effective than censoring the sites from access.

The Australian government last month introduced legislation that would allow rights holders to get an injunction placed on internet service providers (ISPs) to force telcos to block specific overseas piracy websites from access by Australian users.

The rights holders would need to demonstrate that the primary purpose of a website is for the infringement of copyright before the Federal Court will order ISPs to block it. Latest Australian news

Dallas Buyers Club wants alleged infringer details by May 6 The censorship end game of the piracy site-blocking Bill Mandatory data-retention funding to be a Budget surprise Google slams Australian piracy site-blocking legislation NBN Co predicts up to 370,000 premises need work on HFC

The move has been welcomed by rights holders, but faces opposition from Google, which told the parliamentary committee looking into the legislation that site blocking “is not the most effective means of stopping piracy”.

A recent study of the piracy ‘ecosystem’­ in which the authors conducted a detailed analysis of the effectiveness of various anti-­piracy measures found that anti­-piracy efforts directed towards blocking access to pirated content have not been successful, Google said in its submission.

Google said that more effective measures include providing legitimate content that is more attractive to consumers than piracy, and cutting off advertising to piracy websites. The introduction of site blocking could have unintended consequences, Google warned.

Site blocking also has the potential to be used in ways that were unintended, included by blocking legitimate content.

Google said that legislation allowing sites that facilitate access to infringing copyright content to be blocked could lead to virtual private network (VPN) services being blocked.

VPNs also have many other legitimate purposes, including privacy and security, Google stated.

The court should be forced to consider the impact on freedom of speech when blocking sites, the company said — via redwolf.newsvine.com

Politics, Rights, Technology

The censorship end game of the piracy site-blocking Bill

Australian Communications Minister Malcolm Turnbull has barely even finished introducing piracy site-blocking legislation into the parliament, and already the Helen Lovejoys of the world are trying to get it expanded into a much larger internet censorship scheme.

The legislation introduced into parliament in March would allow film studios, TV companies, and other copyright holders to apply to the court to get specific sites hosted outside of Australia and alleged to be primarily for the purpose of copyright infringement blocked by Australian internet service providers (ISPs).

The court will ideally examine the sites involved, and ensure that they meet all the conditions before ordering a block, though this is not guaranteed at this point.

If the ISPs are ordered to block a site, they can do so in a number of ways — through DNS, IP address blocking, or URL blocking. The exact method, too, has yet to be determined.

Turnbull has stressed that because the court must approve sites being blocked, it is not an internet filter.

It will be a court, not the government, that will determine which sites are blocked. Moreover, this is not an automatic process, but determined by a court with all of the normal protections of legal due process. In other words, a judge will make the decision, after hearing evidence and argument, not an algorithm in the software operating a router, he said.

The lack of an automated process of filtering types of sites means it is not a filter, according to the minister.

Others seem to disagree, however.

Far be it for me to allow the Australian Christian Lobby (ACL) to define the meaning of anything ever, but it has described the scheme as an internet piracy filter and called on the government to look at implementing a default clean feed to protect children — via redwolf.newsvine.com

Politics, Rights, Technology

What’s Scarier: Terrorism, or Governments Blocking Websites in its Name?

The French Interior Ministry on Monday ordered that five websites be blocked on the grounds that they promote or advocate terrorism. I do not want to see sites that could lead people to take up arms on the Internet, proclaimed Interior Minister Bernard Cazeneuve.

When the block functions properly, visitors to those banned sites, rather than accessing the content of the sites they chose to visit, will be automatically redirected to the Interior Ministry website. There, they will be greeted by a graphic of a large red hand, and text informing them that they were attempting to access a site that causes or promotes terrorism: you are being redirected to this official website since your computer was about to connect with a page that provokes terrorist acts or condones terrorism publicly.

No judge reviews the Interior Ministry’s decisions. The minister first requests that the website owner voluntarily remove the content he deems transgressive; upon disobedience, the minister unilaterally issues the order to Internet service providers for the sites to be blocked. This censorship power is vested pursuant to a law recently enacted in France empowering the interior minister to block websites.

Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to advocate terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that Europe is facing an unprecedented, diverse and serious terrorist threat, and argued that increased state control over the Internet is crucial to combating it — via redwolf.newsvine.com

Politics, Rights, Technology

A Police Insider Says Data Retention Could Be Used To Catch Pirates

Concerned about the scope of the currently proposed data retention legislation currently being considered by Parliament? An ex-police officer says that one day, your metadata could be used to identify whether you’ve been downloading TV shows and movies illegitimately.

A former police officer who has previous experience with metadata and its potential applications has told ABC Radio National’s Download This Show that the oversight that currently exists over even currently retained metadata is minimal, and is ripe for abuse.

Using the example of an officer or other accredited agency user accessing metadata to check up on their ex-girlfriend, the insider told the program that he had never seen a metadata request denied on the basis of its legitimacy, but only cost. He also said that the agency officials talking up the potential of metadata at the moment, and petitioning for more widespread access, have no hands-on experience: …mobiles weren’t invented when they walked the beat.

The extent of even something as basic as smartphone location metadata can be extremely detailed and granular; the huge amount of data that anyone with any kind of online or digital profile generates would be exponentially more useful for any agency with access to the proposed metadata retention regime. Unless there is enough oversight baked into the legislation and restraint exercised in its scope, the potential for abuse is there — via redwolf.newsvine.com

Rights

The Dark Power of Fraternities

One warm spring night in 2011, a young man named Travis Hughes stood on the back deck of the Alpha Tau Omega fraternity house at Marshall University, in West Virginia, and was struck by what seemed to him — under the influence of powerful inebriants, not least among them the clear ether of youth itself — to be an excellent idea: he would shove a bottle rocket up his ass and blast it into the sweet night air. And perhaps it was an excellent idea. What was not an excellent idea, however, was to misjudge the relative tightness of a 20-year-old sphincter and the propulsive reliability of a 20-cent bottle rocket. What followed ignition was not the bright report of a successful blastoff, but the muffled thud of fire in the hole.

Also on the deck, and also in the thrall of the night’s pleasures, was one Louis Helmburg III, an education major and ace benchwarmer for the Thundering Herd baseball team. His response to the proposed launch was the obvious one: he reportedly whipped out his cellphone to record it on video, which would turn out to be yet another of the night’s seemingly excellent but ultimately misguided ideas. When the bottle rocket exploded in Hughes’s rectum, Helmburg was seized by the kind of battlefield panic that has claimed brave men from outfits far more illustrious than even the Thundering Herd. Terrified, he staggered away from the human bomb and fell off the deck.

Fortunately for him, and adding to the Chaplinesque aspect of the night’s miseries, the deck was no more than four feet off the ground, but such was the urgency of his escape that he managed to get himself wedged between the structure and an air-conditioning unit, sustaining injuries that would require medical attention, cut short his baseball season, and—in the fullness of time—pit him against the mighty forces of the Alpha Tau Omega national organization, which had been waiting for him — via redwolf.newsvine.com

Politics, Rights

Australian government blames Snowden for data retention

The Australian Attorney-General’s Department has pushed back at industry and privacy advocate concerns over mandatory data-retention legislation, stating that the leaks on the US National Security Agency’s (NSA) surveillance operations by whistleblower Edward Snowden have hastened the need for the regime.

Under legislation currently before the parliament, Australian telecommunications companies would be required to retain an as-yet-undefined set of customer data for two years, not limited to but including call records, address information, email addresses, and assigned IP addresses.

The legislation is being backed up by Australian law-enforcement agencies, which claim that access to the data without a warrant is vital to almost every criminal investigation. Telecommunications companies and privacy advocates, however, warn that the scheme would be a major intrusion on the lives of every Australian, and that the costs of running the scheme will lead to higher prices for internet and phone services.

Telcos have suggested that existing preservation notices, which agencies can send to carriers, to retain the data for a specific individual under investigation would be much more appropriate than a wide-ranging mandatory data-retention regime.

The Attorney-General’s Department, however, claims in its submission to the parliamentary committee investigating the legislation that there are no practical alternatives to a legislated mandatory data-retention regime — via redwolf.newsvine.com

Politics, Rights, Technology

Secret Malware in European Union Attack Linked to US and British Intelligence

Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by US and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept.

Regin was found on infected internal computer systems and email servers at Belgacom, a partly state-owned Belgian phone and internet provider, following reports last year that the company was targeted in a top-secret surveillance operation carried out by British spy agency Government Communications Headquarters, industry sources told The Intercept.

The malware, which steals data from infected systems and disguises itself as legitimate Microsoft software, has also been identified on the same European Union computer systems that were targeted for surveillance by the National Security Agency.

The hacking operations against Belgacom and the European Union were first revealed last year through documents leaked by NSA whistle-blower Edward Snowden. The specific malware used in the attacks has never been disclosed, however.

The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations.

Ronald Prins, a security expert whose company Fox IT was hired to remove the malware from Belgacom’s networks, told The Intercept that it was “the most sophisticated malware” he had ever studied.

Having analysed this malware and looked at the [previously published] Snowden documents, Prins said, I’m convinced Regin is used by British and American intelligence services — via redwolf.newsvine.com

Rights, Technology, World

Berlin’s digital exiles: where tech activists go to escape the NSA

It’s the not knowing that’s the hardest thing, Laura Poitras tells me. Not knowing whether I’m in a private place or not. Not knowing if someone’s watching or not. Though she’s under surveillance, she knows that. It makes working as a journalist hard but not impossible. It’s on a personal level that it’s harder to process. I try not to let it get inside my head, but… I still am not sure that my home is private. And if I really want to make sure I’m having a private conversation or something, I’ll go outside.

Poitras’s documentary about Edward Snowden, Citizenfour, has just been released in cinemas. She was, for a time, the only person in the world who was in contact with Snowden, the only one who knew of his existence. Before she got Glenn Greenwald and the Guardian on board, it was just her — talking, electronically, to the man she knew only as Citizenfour. Even months on, when I ask her if the memory of that time lives with her still, she hesitates and takes a deep breath: It was really very scary for a number of months. I was very aware that the risks were really high and that something bad could happen. I had this kind of responsibility to not fuck up, in terms of source protection, communication, security and all those things, I really had to be super careful in all sorts of ways.

Bad, not just for Snowden, I say? Not just for him, she agrees. We’re having this conversation in Berlin, her adopted city, where she’d moved to make a film about surveillance before she’d ever even made contact with Snowden. Because, in 2006, after making two films about the US war on terror, she found herself on a watch list. Every time she entered the US — and I travel a lot — she would be questioned. It got to the point where my plane would land and they would do what’s called a hard stand, where they dispatch agents to the plane and make everyone show their passport and then I would be escorted to a room where they would question me and often times take all my electronics, my notes, my credit cards, my computer, my camera, all that stuff. She needed somewhere else to go, somewhere she hoped would be a safe haven. And that somewhere was Berlin.

What’s remarkable is that my conversation with Poitras will be the first of a whole series of conversations I have with people in Berlin who either are under surveillance, or have been under surveillance, or who campaign against it, or are part of the German government’s inquiry into it, or who work to create technology to counter it. Poitras’s experience of understanding the sensation of what it’s like to know you’re being watched, or not to know but feel a prickle on the back of your neck and suspect you might be, is far from unique, it turns out. But then, perhaps more than any other city on earth, Berlin has a radar for surveillance and the dark places it can lead to.

There is just a very real historical awareness of how information can be used against people in really dangerous ways here, Poitras says. There is a sensitivity to it which just doesn’t exist elsewhere. And not just because of the Stasi, the former East German secret police, but also the Nazi era. There’s a book Jake Appelbaum talks a lot about that’s called IBM and the Holocaust and it details how the Nazis used punch-cards to systemise the death camps. We’re not talking about that happening with the NSA [the US National Security Agency], but it shows how this information can be used against populations and how it poses such a danger. — via redwolf.newsvine.com