November 18, 2012

Apple Rejects App That Tracks U.S. Drone Strikes

Originally posted by Christina Bonnington and Spencer Ackerman on Wired.com, August 30, 2012

It seemed like a simple enough idea for an iPhone app: Send users a pop-up notice whenever a flying robots kills someone in one of America’s many undeclared wars. But Apple keeps blocking the Drones+ program from its App Store — and therefore, from iPhones everywhere. The Cupertino company says the content is “objectionable and crude,” according to Apple’s latest rejection letter.

A mockup of developer Josh Begley’s drone-strike app for iOS. Wired.com

It’s the third time in a month that Apple has turned Drones+ away, says Josh Begley, the program’s New York-based developer. The company’s reasons for keeping the program out of the App Store keep shifting. First, Apple called the bare-bones application that aggregates news of U.S. drone strikes in Pakistan, Yemen and Somalia “not useful.” Then there was an issue with hiding a corporate logo. And now, there’s this crude content problem.

Begley is confused. Drones+ doesn’t present grisly images of corpses left in the aftermath of the strikes. It just tells users when a strike has occurred, going off a publicly available database of strikes compiled by the U.K.’s Bureau of Investigative Journalism, which compiles media accounts of the strikes.

iOS developers have a strict set of guidelines that must be adhered to in order to gain acceptance into the App Store. Apps are judged on technical, content and design criteria. As Apple does not comment on the app reviews process, it can be difficult to ascertain exactly why an app got rejected. But Apple’s team of reviewers is small, sifts through up to 10,000 apps a week, and necessarily errs on the side of caution when it comes to potentially questionable apps.

Apple’s original objections to Drones+ regarded the functionality in Begley’s app, not its content. Now he’s wondering if it’s worth redesigning and submitting it a fourth time.

“If the content is found to be objectionable, and it’s literally just an aggregation of news, I don’t know how to change that,” Begley says.

Begley’s app is unlikely to be the next Angry Birds or Draw Something. It’s deliberately threadbare. When a drone strike occurs, Drones+ catalogs it, and presents a map of the area where the strike took place, marked by a pushpin. You can click through to media reports of a given strike that the Bureau of Investigative Reporting compiles, as well as some basic facts about whom the media thinks the strike targeted. As the demo video above shows, that’s about it.

It works best, Begley thinks, when users enable push notifications for Drones+. “I wanted to play with this idea of push notifications and push button technology — essentially asking a question about what we choose to get notified about in real time,” he says. “I thought reaching into the pockets of U.S. smartphone users and annoying them into drone-consciousness could be an interesting way to surface the conversation a bit more.”

But that conversation may not end up occurring. Begley, a student at Clay Shirky’s lab at NYU’s Interactive Telecommunications Program, submitted a threadbare version of Drones+ to Apple in July. About two weeks later, on July 23, Apple told him was just too blah. “The features and/or content of your app were not useful or entertaining enough,” read an e-mail from Apple Begley shared with Wired, “or your app did not appeal to a broad enough audience.”

Finally, on Aug. 27, Apple gave him yet another thumbs down. But this time the company’s reasons were different from the fairly clear-cut functionality concerns it previously cited. “We found that your app contains content that many audiences would find objectionable, which is not in compliance with the App Store Review Guidelines,” the company e-mailed him.

It was the first time the App Store told him that his content was the real problem, even though the content hadn’t changed much from Begley’s initial July submission. It’s a curious choice: The App Store carries remote-control apps for a drone quadricopter, although not one actually being used in a war zone. And of course, the App Store houses innumerable applications for news publications and aggregators that deliver much of the same content provided by Begley’s app.

Wired reached out to Apple on the perplexing rejection of the app, but Apple was unable to comment.

Begley is about at his wits end over the iOS version of Drones+. “I’m kind of back at the drawing board about what exactly I’m supposed to do,” Begley said. The basic idea was to see if he could get App Store denizens a bit more interested in the U.S.’ secretive, robotic wars, with information on those wars popping up on their phones the same way an Instagram comment or retweet might. Instead, Begley’s thinking about whether he’d have a better shot making the same point in the Android Market.

Drones+ iPhone App from Josh Begley on Vimeo.

Source: https://www.wired.com/dangerroom/2012/08/drone-app/

Darpa Looks to Make Cyberwar Routine With Secret ‘Plan X’

Col. Todd Wood (right), commander of 1st Stryker Brigade Combat Team, 25th Infantry Division, briefs National Security Agency director Gen. Keith Alexander at Forward Operating Base Masum Ghar in Kandahar Province, Afghanistan. Photo: Sgt. Michael Blalack/U.S. Army

Originally posted by Noah Shachtman on wired.com on August 21, 2012

The Pentagon’s top research arm is unveiling a new, classified cyberwarfare project. But it’s not about building the next Stuxnet, Darpa swears. Instead, the just-introduced “Plan X” is designed to make online strikes a more routine part of U.S. military operations. That will make the son of Stuxnet easier to pull off — to, as Darpa puts it, “dominate the cyber battlespace.”

Darpa spent years backing research that could shore up the nation’s cyberdefenses. “Plan X” is part of a growing and fairly recent push into offensive online operations by the Pentagon agency largely responsible for the internet’s creation. In recent months, everyone from the director of Darpa on down has pushed the need to improve — and normalize — America’s ability to unleash cyberattacks against its foes.

That means building tools to help warplanners assemble and launch online strikes in a hurry. It means, under Plan X, figuring out ways to assess the damage caused by a new piece of friendly military malware before it’s unleashed. And it means putting together a sort of digital battlefield map that allows the generals to watch the fighting unfold, as former Darpa acting director Ken Gabriel told the Washington Post: “a rapid, high-order look of what the Internet looks like — of what the cyberspace looks like at any one point in time.”

It’s not quite the same as building the weapons themselves, as Darpa notes in its introduction to the five-year, $100 million effort, issued on Monday: “The Plan X program is explicitly not funding research and development efforts in vulnerability analysis or cyberweapon generation.” (Emphasis in the original.)

But it is certainly a complementary campaign. A classified kick-off meeting for interested researchers in scheduled for Sept. 20.

The American defense and intelligence establishment has been reluctant at times to authorize network attacks, for fear that their effects could spread far beyond the target computers. On the eve of the Iraq invasion of 2003, for instance, the Bush administration made plans for a massive online strike on Baghdad’s financial system before discarding the idea out of collateral damage concerns.

It’s not the only factor holding back such operations. U.S. military chiefs like National Security Agency director Gen. Keith Alexander have publicly expressed concern that America may not be able to properly respond to a national-level attack unless they’re given pre-defined battle plans and “standing rules of engagement” that would allow them to launch a counterstrike “at net speed.” Waiting more than a few moments might hurt the American ability to respond at all, these officers say.

“Plan X” aims to solve both problems simultaneously, by automatically constructing mission plans that are as easy to execute as “the auto-pilot function in modern aircraft,” but contain “formal methods to provably quantify the potential battle damage from each synthesized mission plan.”

Then, once the plan is launched, Darpa would like to have machines running on operating systems that can withstand the rigors of a full-blown online conflict: “hardened ‘battle units’ that can perform cyberwarfare functions such as battle damage monitoring, communication relay, weapon deployment, and adaptive defense.”

The ability to operate in dangerous areas, pull potential missions off-the-shelf, and assess the impact of attacks — these are all commonplace for air, sea, and land forces today. The goal of Plan X is to give network-warfare troops the same tools. “To get it to the point where it’s a part of routine military operations,” explains Jim Lewis, a long-time analyst of online operations at the Center for Strategic and International Studies.

Of course, many critics of U.S. policy believe the deployment of cyberweapons is already too routine. America’s online espionage campaign against Iran has been deeply controversial, both at home and abroad. The Russian government and its allies believe that cyberweapons ought to be banned by international treaty. Here in the U.S., there’s a fear that, by unleashing Stuxnet and other military-grade malware, the Obama administration legitimized such attacks as a tool of statecraft — and invited other nations to strike our fragile infrastructure.

The Darpa effort is being lead, fittingly, by a former hacker and defense contractor. Daniel Roelker helped start the intrusion detection company Sourcefire and the DC Black Ops unit of Raytheon SI Government Solutions. In a November 2011 presentation (.pdf), Roelker decried the current, “hacker vs. hacker” approach to online combat. It doesn’t scale well — there are only so many technically skilled people — and it’s limited in how fast it can be executed. “We don’t win wars by out-hiring an adversary, we win through technology,” he added.

Instead, Roelker continued, the U.S. needs a suite of tools to analyze the network, automate the execution of cyberattacks, and be sure of the results. At the time, he called these the “Pillars of Foundational Cyberwarfare.” Now, it’s simply known as Plan X.

Source: https://www.wired.com/dangerroom/2012/08/plan-x

FBI Agents Take Virginia Resident for Facebook Posts, Roommate says,“he goes before a judge at the hospital from what we have been told.”

by Ezra Van Auken of www.SpreadLibertyNews.com on Aug 20, 2012

Chesterfield Police, the FBI and Secret Service agents have detained Brandon Raub of Richmond, Virginia who spent tours in Iraq and Afghanistan, known as a “respected” Marine and squad leader. On August 16th, at around seven in the afternoon, law enforcement agencies arrived and unlawfully arrested Raub at his house, alone at the time while his roommates were doing other things.

Despite not having any actual reasoning as to why Brandon was arrested, law enforcement did question the 26-year-old about his recent Facebook posts, which overall criticize the nature of what the United States government is today. Making the arrest a very suspicious one.

After calling the Chesterfield police station, an officer noted that their department is not involved with the case; FBI officials are undergoing the investigation.

According to Kati Wood, Raub’s close friend and roommate, “he was taken, the local police said they were charging him with resisting arrest and assaulting a police officer,” although Wood believes Raub never countered the agents entering the house with any force. Just the next morning, Raub’s family and loved ones called the Chesterfield PD to learn that he wasn’t even booked at the jail, showing the lack of transparency.

Kati explained, “When we called the morning of 8/17 they told us he had never been booked. We had to contact FBI agent to find out where he was.” Which led the family to discovering Brandon was at John Randolph Medical Center in Hopewell, VA. Today around 10:00-10:30AM, “he goes before a judge at the hospital from what we have been told. We believe this is going to take place early in the morning.”

The mother, brother and girlfriend of Brandon Raub have all commented on his state of mind, which Kati described as, “sound minded, level headed and logical,” and in an interview done by WTPN Brandon’s mom said his mind was, “completely healthy” when discussing the situation on Saturday.

When visiting the hospital, Brandon told his girlfriend; “I love the American people with all my heart.” Showing his persistence to remain peaceful through what is going on, although struck by the power grab US government officials have taken. While visiting, Raub also reminded Wood that he was never read his Miranda rights nor did officers present a warrant during the arrest.

“The land of the free and the home of the brave where good men triumph and bad men fall. Come, you brave men and women. Let your hearts guide you. It is time to stand. If there ever was a time to stand for what you believe in. Now is that time. Love and Peace. Prayers for Brandon” - Kati Wood, close friend and roommate to Brandon Raub

Original post: https://spreadlibertynews.com/fbi-agents-take-virginia-resident-for-facebook-posts-roommate-sayshe-goes-before-a-judge-at-the-hospital-from-what-we-have-been-told/

Facebook court ruling: What you share on Facebook is admissible as evidence

Originally posted by tecca.com on August 15, 2012

Author: Fox Van Allen

Did you know that what you say on Facebook can be used against you in a court of law? If you’re sharing something with your friends, you may as well be sharing directly with the judge and jury: A recent ruling in a U.S. federal court says that if you post something on Facebook, your friend can share that information with the police — it’s not a violation of your privacy.

Accused gang member Melvin Colon had argued in court that investigators violated his constitutional right to privacy when they viewed his Facebook profile via one of his friends’ accounts. But US District Judge William Pauley III ruled that Colon’s messaged threats and posts about violent acts he committed were not private, and indeed fair game for prosecutors. To some extent, the ruling makes logical sense: When you say something publicly on Facebook, you’re often sharing a thought with hundreds, maybe even thousands of people. There’s not much that’s private about that.

Courts have settled a number of questions pertaining to Facebook and our legal system this year. Courts have ruled that it is improper to deliver a court summons via Facebook, even when it’s the best method of reaching someone. A court has also ruled that a Like on Facebook isn’t constitutionally protected free speech — something Facebook is vigorously appealing.

Source: https://www.tecca.com/news/2012/08/16/facebook-privacy-court-ruling/

Facebook, CNN, and the rise of Social Voting

CNN and Facebook have joined forces to make the “I’m Voting”

(Credit: ElectNext)

Facebook app, which enables Facebook users to endorse candidates and issues, and to commit to voting.

If you use the app and commit to voting for someone, that information appears in your timeline, news feed, and real-time ticker.

During CNN’s political coverage this fall, CNN personalities will use the app to poll users on issues.

“We fundamentally changed the way people consume live event coverage, setting a record for the most-watched live video event in Internet history, when we teamed up with Facebook for the 2009 Inauguration of President Obama,” CNN’s KC Estenson said.

“By again harnessing the power of the Facebook platform and coupling it with the best of our journalism, we will redefine how people engage in the democratic process and advance the way a news organization covers a national election.”

Is this the rise of social voting? During the midterm elections, Foursquare dipped a toe into the idea that voting could be made “more fun and social.” Foursquare launched a special elections page, reported ReadWriteWeb, awarded badges to those who checked in at polling places, and promoted an #IVoted hashtag. And Facebook had a Facebook Polling Place Locator live during the 2010 midterms.

ElectNext takes the principle of a dating website and applies it to politics. Tell ElectNext how you feel about certain issues, and it will “match” you with candidates that fit your political beliefs. The Sean Parker-funded Votizen lets you publicly endorse certain candidates to your friends, turning your social networks into a digital soapbox of sorts. And once you’ve put your candidates in office, PopVox helps you keep them accountable, by giving you tools to track legislation and tell your representative just how you feel about it.

Pirate Bay to be blocked in the UK, court rules

End of the line for PB?

By Marc Chacksfield on April 30th, 2012

The Pirate Bay is set to be blocked by five of the main ISPs in the UK, after a High Court ruled the site is in massive breach of copyright.

According to the BBC, the Swedish website is set to be blocked by Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media.

So far only Virgin has spoken out about the blocking saying it is set to comply with the High Court’s ruling, but believed that it shouldn’t set a precedent for policing the web in the future.

“As a responsible ISP, Virgin Media complies with court orders addressed to the company but strongly believes that changing consumer behaviour to tackle copyright infringement also needs compelling legal alternatives, such as our agreement with Spotify, to give consumers access to great content at the right price,” explained A Virgin Media spokesperson.

Infringing copyright

The British Phonographic Industry (BPI) is obviously pleased with the ruling, with its chief executive Geoff Taylor explaining: “The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale.

“Its operators line their pockets by commercially exploiting music and other creative works without paying a penny to the people who created them.

“This is wrong - musicians, sound engineers and video editors deserve to be paid for their work just like everyone else.”

“TalkTalk have always maintained that we are not in principle against blocking provided there is a court order.”

One person who is critical of the ruling is Jim Killock, executive director of the Open Rights Group. He said about the situation: “Blocking the Pirate Bay is pointless and dangerous. It will fuel calls for further, wider and even more drastic calls for Internet censorship of many kinds, from pornography to extremism.

“Internet censorship is growing in scope and becoming easier. Yet it never has the effect desired. It simply turns criminals into heroes.”

The Pirate Bay has been under pressure for some time now to close, but its owners have been finding inventive ways to evade closure.

The latest plan was to send its servers into space, but this sounded more like a pipe dream than something that would actually happen.

It was back in February that the High Court originally ruled that the Pirate Bay’s operators “incite or persuade” copyright infringement.

The judge presiding over the case was the same on that forced BT to block Newzbin2 back in October 201 - which is interesting as BT doesn’t seem to be on list of ISPs which have to block the site.

According to PC Pro, BT has asked for a few more weeks to ‘consider its position’ about whether or not to block the site.

Sources:

https://www.techradar.com/news/internet/pirate-bay-to-be-blocked-in-the-uk-court-rules-1078186

https://www.bbc.com/news/technology-17894176

The end of Internet privacy (with petition)

Dear friends,

Right now, the US is poised to pass a new law that would permit US agents to spy on almost everything we do online. But we can stop them before the final vote.

Companies that we trust with our personal information, like Microsoft and Facebook, are key supporters of this bill that lets corporations share all user activity and content with US government agents without needing a warrant in the name of cyber-security — nullifying privacy guarantees for almost everyone around the world, no matter where we live and surf online.

If enough of us speak out, we can stop companies that profit from our business from supporting cyber-spying. Sign the petition to these key net corporations now:

https://www.avaaz.org/en/stop_cispa_corporate_global/?vl

The Cyber Intelligence Sharing and Protection Act (CISPA) would allow companies doing business in the US to collect exact records of all of our online activities and hand them over to the US government, without ever notifying us that we are being watched. No warrant, no legal cause and no due process required. To make matters worse, the bill provides the government and corporations with blanket immunity to protect them from being sued for violation of privacy and other illegal actions.

The bill’s supporters claim that consumer information will be protected, but the reality is that huge loopholes would make everything we do online fair game — and nowadays, from banking to shopping, our private information is all stored on the Internet.

CISPA is being moved forward in Congress and will be voted upon in days. Let’s raise a massive outcry to stop corporations from giving the US a blank check to monitor our every move. Click below to take action:

https://www.avaaz.org/en/stop_cispa_corporate_global/?vl

This year, we helped stop SOPA, PIPA and ACTA — all dire threats to the Internet. Now, let’s block CISPA and end the US government attack on our Internet.

WIth hope and determination,

Dalia, Allison, Emma, Ricken, Rewan, Andrew, Wen-Hua, and the rest of the Avaaz team

More information:

CISPA: The internet finds a new enemy (Global Post)
https://www.globalpost.com/dispatches/globalpost-blogs/the-grid/cispa-the-internet-finds-new-enemy-sopa

CISPA protests begin amid key changes to legislation (Los Angeles Times)
https://www.latimes.com/news/politics/la-pn-cispa-protests-begin-amid-key-changes-to-legislation-20120416,0,5314596.story

Cybersecurity Bill FAQ: The Disturbing Privacy Dangers in CISPA and How To Stop It (Electronic Frontier Foundation)
https://www.eff.org/deeplinks/2012/04/cybersecurity-bill-faq-disturbing-privacy-dangers-cispa-and-how-you-stop-it

New CISPA Draft Narrows Cybersecurity Language as Protests Loom (Mashable)
https://news.yahoo.com/cispa-draft-narrows-cybersecurity-language-protests-loom-134202431.html

Source: avaaz.org email, April 18, 2012

Kim Dotcom: US Military Had 15,634 Megaupload Accounts

By enigmax for TorrentFreak on March 26, 2012

In recent weeks the battle has continued to save the data stored at the now-defunct site Megaupload. Contrary to the image painted by the entertainment industries, untold numbers of people used the file-hosting service for completely legitimate sharing. Today we can reveal that not only did people at the Senate, Department of Homeland Security, FBI and NASA hold Megaupload accounts, so did more than 15,600 members of the US Military.

Ever since Megaupload was dismantled in January there have been concerns about data being held on the site’s servers.

While the MPAA and RIAA insist that the site was simply a huge piracy hub, the facts point to a much bigger picture of people using the site for countless legitimate transfers of files simply too big to email.

As mentioned earlier this month, Megaupload’s legal team is working hard to reunite site users with their data, an aim also shared by the Electronic Frontier Foundation (EFF) with their MegaRetrieval campaign.

As part of this process, Megaupload discovered that a large number of Mega accounts are held by US government officials. Today, thanks to fresh information provided to TorrentFreak by Kim Dotcom, we can reveal more details.

From domains including dhs.gov, doe.gov, fbi.gov, hhs.gov, nasa.gov, senate.gov, treas.gov and uscourts.gov, the number of accounts held at Megaupload total 1058. Of these, 344 users went the extra mile and paid for premium access. Between them they uploaded 15,242 files – a total of 1,851,791 MB.

While a couple of million megabytes of lost data is bad enough, another group – the ladies and gentlemen of the US Military – stands to lose much, much more.

From domains including af.mil, army.mil, centcom.mil, navy.mil and osd.mil etc, a total of 15,634 are registered with Megaupload. Of these an impressive 10,223 people paid to upgrade to a premium Megaupload account and between them they uploaded 340,983 files – a total of 96,507,779 MB.

There is no suggestion that any of these military operatives or government employees were using Megaupload for infringing uses but it is almost guaranteed that documents, photographs and videos are now at serious risk of deletion.

More on Kim Dotcom’s response to the US indictment is published in our feature article.

Source: https://torrentfreak.com/kim-dotcom-us-military-had-15634-megaupload-accounts-120326

Could CISPA Be the Next SOPA?

By Alex Fitzpatrick for Mashable on April 8, 2012

A bill introduced to the House of Representatives late last year could become the centerpiece of the next SOPA-style struggle between the tech community and Washington, D.C.

The bill already has over 100 co-sponsors and the backing of some of Silicon Valley’s most prominent companies, including Microsoft and Facebook — support which SOPAnever enjoyed.

It’s called the Cyber Intelligence Sharing and Protection Act (or CISPA, for short). CISPA would alter the existing National Security Act of 1947 to allow private businesses and the government to share information about cyberthreats — including “efforts to degrade, disrupt or destroy” vital networks or “threat or misappropriation” of information owned by the government or private businesses, such as intellectual property.

To ensure that business-government information sharing happens on a two-way basis, CISPA requires the Director of National Intelligence to set up ways for the intelligence community to pass along threat information to private companies and make sure they actually go ahead and do that. To prevent sensitive information from being shared willy-nilly, CISPA requires that any recipient of such threat reports have a security clearance and a valid need for the information.

Finally, CISPA allows third-party cybersecurity firms (which provide cyber protection to the government and private businesses) to “use cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property” of their clients. They’re also allowed to share that information with any other business or government department, provided their client gives them permission to do so.

SEE ALSO: SOPA 2.0: Why the Fight for Internet Freedom Is Far From Over
 

CISPA prevents these private firms from using shared cybersecurity information to gain an advantage, and if they share information with the federal government, they don’t have to disclose it to the public. Meaning, if Company X is hacked, they can tell the government about it without alerting employees, shareholders or the public at large.

As long as a cybersecurity firm acts in “good faith” according to these stipulations, it’s immune to civil or criminal lawsuits regarding information sharing.

Rep. Mike Rodgers (R-Mich.), who introduced the bill along with Rep. Dutch Ruppersberger (D-Md.), has framed CISPA as a bill to protect American intellectual property from state-sponsored digital theft of intellectual property.

“Every day U.S. businesses are targeted by nation-state actors like China for cyber exploitation and theft,” said Rodgers in a statement. “This consistent and extensive cyber looting results in huge losses of valuable intellectual property, sensitive information, and American jobs. The broad base of support for this bill shows that Congress recognizes the urgent need to help our private sector better defend itself from these insidious attacks,” he said.

Facebook called CISPA a “thoughtful, bipartisan” bill in a letter of support written in February.

“Effective security requires private and public sector cooperation, and successful cooperation necessitates information sharing,” wrote Joel Kaplan, vice president of U.S. Public Policy at Facebook. “Your legislation removes burdensome rules that currently can inhibit protection of the cyber ecosystem, and helps provide a more established structure for sharing within the cyber community while still respecting the privacy rights and exceptions of our users.”

The Electronic Frontier Foundation, a digital rights advocacy group, feels differently.

According to the EFF, the language in CISPA is worded so broadly that it could be interpreted to allow Internet Service Providers (ISPs) and companies such as Google and Facebook to intercept your messages and transmit them to the government.

They also warn that CISPA could be used as a blunt instrument against copyright infringement, similar to concerns about SOPA. Finally, they’d rather not see the Director of National Intelligence in charge of information sharing — they feel a civilian position would provide for more transparency and accountability.

“The idea is to facilitate detection of and defense against a serious cyber threat, but the definitions in the bill go well beyond that,” said the EFF in a blog post. “The language is so broad it could be used as a blunt instrument to attack websites like The Pirate Bay or WikiLeaks.”

You can read the full text of CISPA for yourself at the Library of Congress.

Do you think CISPA is a welcome tool to ward off cyberattacks, or are you concerned it will be used to clamp down on Internet freedom? Sound off in the comments below.

Image courtesy of iStockphoto, PashaIgnatov

Source: https://mashable.com/2012/04/08/could-cispa-be-the-next-sopa

ACTA is worse than SOPA, here’s what you need to know

By J. D. Heyes for Natural News on January 29, 2012

(NaturalNews) As a warrior for Internet freedom, you helped defeat the Stop Online Piracy Act, or SOPA by supporting Web black outs by sites like Wikipedia and by contacting your lawmaker to voice your displeasure. So loud was your voice that even the president of the United States sided with you in opposing it.

But don’t take a deep sigh of relief because, after all, we’re talking about a merger of Washington, D.C., and Hollywood here, as well as global interests. After the motion picture industry, its subsidiaries and all “interested parties” have spent nearly $150 million lobbying for some sort of Internet-centric “anti-piracy” bill, you should have known the powers that be would return.

And they have, only this time they are pushing something far more onerous: ACTA, or the Anti-Counterfeiting Trade Agreement.

“Although the proposed treaty’s title might suggest that the agreement deals only with counterfeit physical goods (such as medicines) what little information has been made available publicly by negotiating governments about the content of the treaty makes it clear that it will have a far broader scope and in particular will deal with new tools targeting ‘Internet distribution and information technology’”, says an assessment of ACTA by the watchdogs at the Electronic Freedom Foundation.

“ACTA has several features that raise significant potential concerns for consumers’ privacy and civil liberties for innovation and the free flow of information on the Internet [regarding] legitimate commerce and for developing countries’ ability to choose policy options that best suit their domestic priorities and level of economic development,” says EFF’s assessment.

As is usually the case with dubious, rights-stripping legislation, ACTA - which Forbes.com reports was signed by the U.S. in 2011 and has already been sanctioned as well by Japan, Switzerland and many European Union nations - has largely been negotiated in the shadows and, thus, has largely been devoid of scrutiny… until now.

While the Obama administration was shying away from SOPA, it has been aggressively pursuing ACTA (full disclosure: the process was started under the Bush administration). Critics say it is much more far-reaching than SOPA, bypassing “the sovereign laws of participating nations” and “forcing ISP’s across the globe to act as internet police,” Forbes said.

But ACTA isn’t limited just to the Internet. In fact, the agreement would crack down things like generic drugs and would make food patents more difficult to obtain “by enforcing a global standard on seed patents that threatens local farmers and food independence across the developed world,” Forbes says.

The good thing is, there is not universal acceptance of ACTA and its onerous, liberty-stealing provisions. Emerging nations like Brazil and India are adamantly opposed to it for rightfully fearing its provisions would harm their economies.

But Internet freedom is also under attack from other quarters as well. The EFF also notes that the Trans-Pacific Partnership Agreement, which is a separate measure, would “rewrite the global rules on IP enforcement”.

“All signatory countries will be required to conform their domestic laws and policies to the provisions of the Agreement,” said the EFF assessment. “In the U.S. this is likely to further entrench controversial aspects of U.S. copyright law. The recently leaked U.S. IP chapter also includes provisions that appear to go beyond current U.S. law. This raises significant concerns for citizens’ due process, privacy and freedom of expression rights.”

SOPA may be history but that doesn’t mean Internet freedom does not remain under assault. Tyrants never stop trying to enforce tyranny.

Sources for this article include:

https://www.forbes.com/sites/erikkain/2012/01/23/if-you-thought-sopa-was-bad-just-wait-until-you-meet-acta

https://www.eff.org/pages/trans-pacific-partnership-agreement

https://www.forbes.com/sites/johngaudiosi/2012/01/16/obama-says-so-long-sopa-killing-controversial-internet-piracy-legislation/

Learn more: https://www.naturalnews.com/034802_ACTA_counterfeiting_piracy.html#ixzz1kskK7UHG

Image source: https://www.geekosystem.com/acta-primer