Vice

The Surprising Impact the 1992 Presidential Election Had on the Modern Internet

Let’s ponder the impact that technology had on the 1992 campaign.

  1. Prodigy, the early online service that directly competed with AOL for a time, launched a 1992 campaign database for users to track candidates.
  2. For his 1992 primary campaign, current Gov Jerry Brown (D-CA) innovated by using a 1-800 number to solicit donations.
  3. Gov Brown also used Compuserve to reach voters
  4. The 1992 campaign was a hot topic on Usenet, the decentralized newsgroup system which is best described to those who never experienced it in person as the Reddit of its day.
  5. In 1992, the Massachusetts Institute of Technology ran a number of email-driven bots on the campaign92.org domain, allowing users to request position papers for any campaign on the ballot in at least half of US states.

Trump vs. Clinton: Who's Better on Cybersecurity?

Comparing Hillary Clinton and Donald Trump on cybersecurity is probably one of the toughest challenges for a journalist writing about the presidential race. Or, perhaps, it’s one of the easiest. Donald Trump has no mention whatsoever of cybersecurity in his official platform. In fact, he doesn’t even mention the word “Internet” once, although he has mentioned the word cyber. Clinton, on the other hand, has a whole section of her platform dedicated to innovation and technology. To be fair, she doesn’t have detailed proposals regarding cybersecurity, but at least she mentions it, saying she intends to promote it “at home and abroad,” and will protect “online privacy and security.” Clinton also specifically says she intends to safeguard “free flow of information between borders,” and update procedures that regulate the sharing of people’s data across borders—a key internet privacy issue.

Trump, for his part, has shown a remarkable ignorance toward cybersecurity even throughout the campaign. Recently, he said “the cyber is so big,” and explained the word cyber didn’t even exist until recently—showing how out of touch he is from anything that involves computers. He also called out Apple for fighting the FBI in the famous San Bernardino (CA) case and said he was going to boycott the tech company, and joked about the DNC hack, calling Russia to hack Clinton’s e-mails.

Trump vs. Clinton: Who's Better On Telecom?

Evaluating Hillary Clinton and Donald Trump on technology and telecommunication policy issues poses an interesting challenge. Clinton has laid out detailed proposals on issues ranging from network neutrality to expanding broadband access to increasing broadband competition. Trump has not, and there is very little material in the public record with which to evaluate his positions. On the issues where Trump has taken a public position, his statements indicate a troubling ignorance of technical facts, and an alarming willingness to peddle blatant falsehoods for political gain.

Clinton has presented a detailed set of policy proposals aimed at ensuring Internet openness and reducing the digital divide by encouraging broadband deployment, including at the community level, and increasing competition in markets often dominated by a dwindling number of corporate giants. Trump has largely ignored issues like the digital divide and broadband competition, and his erroneous statements on issues like net neutrality and the Internet governance transition suggest that he has little grasp of, or interest in, tech and telecom policy.

Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley

At 5:00 pm on April 25, 2015, dozens of cell phone users in Mountain View (CA) were warned of a bizarre road accident. A satellite had crashed to Earth on the busy Moffett Boulevard, three miles from Google’s headquarters, causing gridlock. Half an hour later, things got really weird. First responders to the scene began sickening with an unknown virus. By half past six, the infection had spread to Palo Alto and Menlo Park, traffic was at a standstill for miles, and gunshots had been heard in nearby Sunnyvale. The messages—issued through the Wireless Emergency Alert (WEA) system that normally warns of severe weather and missing children—kept coming. A firestorm in San Jose, mobbed hospitals and widespread civil unrest. By the next afternoon, Gov Jerry Brown (D-CA) had ordered the evacuation of millions of people and the National Institutes of Health had confirmed the virus was extraterrestrial in origin. As darkness fell, the president imposed martial law. But there was no need to panic. This was, of course, just an exercise, a scenario dubbed "Alien Catastrophe" by researchers with funding from the Department of Homeland Security to test new technologies for public alerts. The real battle being fought right now is not between the National Guard and interstellar microbes but between government agencies keen to drag Wireless Emergency Alerts into the digital age and a telecom industry that seems happy with things just the way they are. Because of the way the underlying technology works (more on this later), WEAs are text-only messages limited to just 90 characters. All the information that could rescue a child or save your life today has to squeeze into less than two-thirds of a tweet. And there is currently no way to include a clickable phone number or web link for recipients to report sightings or learn more.

Sen Ted Cruz is Trying to Sabotage the Internet’s Governance Transition

The US government’s plan to relinquish stewardship of key Internet governance functions is under attack from Republicans who are using blatant falsehoods and fear-mongering to obstruct the historic transfer, according to Internet policy experts. Led by Sen Ted Cruz (R-TX), Republicans are working to sabotage the US government’s long-standing plan to transfer oversight of core Internet technical functions, including management of the Domain Name System (DNS), to a nonprofit group of global stakeholders. Sen Cruz and his GOP allies claim that the Oct 1 transfer would undermine global Internet freedom, imperil US national security, and violate federal law—and they’ve pledged to use the federal budget process to block the move. Sen Cruz has even gone so far as to threaten federal employees working on the transition with prosecution and imprisonment. “The Obama administration's proposal to give away control of the Internet poses a significant threat to our freedom,” Sen Cruz said, warning darkly of “the significant, irreparable damage this proposed Internet giveaway could wreak not only on our nation but on free speech across the world.”

Internet policy experts say Sen Cruz’s attempt to delay the transition, which is largely clerical in nature and unlikely to even be noticed by the world’s 3.2 billion internet users, poses serious risks to global Internet governance and could embolden repressive regimes around the world to undermine Internet freedom and seek greater government-led or intergovernmental control of the Internet. "There’s no legitimate way for him to get to that conclusion,” Milton Mueller, a professor at the Georgia Institute of Technology School of Public Policy and a leading authority on global internet governance, told PolitiFact, which rated Sen Cruz’s claims as FALSE. “What he’s doing is fear-mongering and trying to create a bogeyman, which is the United Nations.”

The Library of Congress Was Hacked Because It Hasn’t Joined the Digital Age

With the presidential election taking all the air out of the room, July's IT attack on the Library of Congress barely made the news. But for good governance advocates and policymakers, this denial of service attack, which caused a three day service outage, validated decades of complaints about the Library of Congress’ failure to join the digital age.

Americans are familiar with the Library’s mission to archive the world’s literature and research. But Congress, librarians, and specialized policy wonks are more familiar with the Library’s many other functions, including the intelligence gatherer, legislative tracker, governance think tank, and intellectual property bureaucracy. The library’s dysfunction is bad news for Congressional staff, and the researchers and scholars who defend on the archives of American history and information on the world’s most unstable regions.

The Congressional Bill That Would Save Community Broadband Networks Nationwide

House Communications Subcommittee Ranking Member Anna Eshoo (D-CA) introduced federal legislation to help communities across the country develop locally-controlled communications networks, setting up a fierce battle with anti-municipal broadband Republican Reps in Congress. The Community Broadband Act of 2016 is designed to accompany a similar Senate measure backed by Sens Cory Booker (D-NJ) and Ron Wyden (D-OR), along with several of their colleagues. Ranking Member Eshoo’s legislation comes one month after a federal court ruled that the Federal Communications Commission lacks the authority to preempt Comcast and AT&T-backed state laws that pose barriers to community broadband development.

“I’m disappointed that a recent court ruling blocked the FCC’s efforts to allow local communities to decide for themselves how best to ensure that their residents have broadband access,” Rep Eshoo said. “This legislation clears the way for local communities to make their own decisions instead of powerful special interests in state capitals.” Rep Eshoo’s bill faces steep odds of success as long as Republicans control Congress, but it nevertheless represents an important development in the nationwide movement to help local communities build their own broadband networks in order to lower prices, boost speeds, and increase competition. Rep Eshoo’s legislation would block any state law that prohibits a city, municipality or public utility from providing “advanced telecommunications capability.” Nearly two dozen states have passed such laws, often at the behest of the nation’s largest cable and phone companies, including Comcast, Verizon, and AT&T, as my colleague Jason Koebler has documented.

Is New York City’s Public Wi-Fi Actually Connecting the Poor?

LinkNYC, New York City's newest communications network, includes more than 350 kiosks installed on sidewalks throughout the city and was created to repurpose payphone infrastructure through public kiosks offering free Internet, phone calls, and USB charging ports. The project is a collaboration between the city and a consortium of private technology and media companies including Sidewalk Labs, an Alphabet (read: Google) company, and represents an important innovation in the “smart city” movement integrating information and communication technologies into all aspects of urban life.

I spent nearly four hours of an August afternoon walking down 3rd Avenue—where Links now appear on almost every block—to see what it actually looks like we put our newest and most innovative technology out onto city streets, instead of into our pockets. My small sample of Link users that Saturday afternoon suggests these kiosks are indeed mostly used by the city’s least privileged. Of the 15 people I saw using a Link, only two or three of them would be likely to appear on LinkNYC promotional materials (i.e., one well-dressed woman making a phone call, or one middle aged, casually-dressed tourist waiting for his phone to finish charging). Most users were camped out for the long haul, for hours or even days at a time, surrounded by their possessions and browsing music videos on YouTube, making phone calls, and checking Facebook. These campers often make themselves comfortable on makeshift chairs and couches devised from newspaper stands, milk crates, and furniture pulled from alleys and street corners.

Two Months of Internet Blackouts Have Taken a Toll on Kashmir

Earlier in the summer of 2016, the north Indian state of Kashmir was hit with a new wave of riots when young militant leader Burhan Wani was killed by state police. Wani was the controversial head of Hizbul Mujahideen, a group fighting for the state to separate from India. He was embraced as a freedom fighter by many in Kashmir, and considered a terrorist by Indian officials. Kashmiris have been forced to live with regular curfews and military presence in their daily lives. Their mountain and valley homes have been caught in the crosshairs of border wars between India, Pakistan and China for decades. But in moments of peak violence the law enforcement in Kashmir has started wielding a new means of control: mobile and digital blackouts. In a region already complicated by geography and turbulence, the impact of telecommunication blackouts is significant. “There is no getting around the fact that cutting mobile links [and Internet] affects flow of information, from basic human contact to people facing health issues, to the injured—and there are thousands—not being able to reach families,” said Najeeb Mubarki, a journalist in Kashmir.

Challenge Over UK Bulk Hacking Powers Taken to European Court of Human Rights

Activist group Privacy International and five Internet and communications providers lodged an application before the European Court of Human Rights to challenge the United Kingdom's use of bulk hacking powers abroad. “The European Court of Human Rights has a strong track record of ensuring that intelligence agencies act in compliance with human rights law. We call on the Court to hold GCHQ accountable for its unlawful bulk hacking practices,” said Scarlet Kim, legal officer at Privacy International. The application has been made with UK-based non-profit GreenNet, the Chaos Computer Club from Germany, Jibonet from South Korea, US internet service provider May First, and communications provider Rise Up. Privacy International is challenging whether the UK's interpretation of the Intelligence Service Act for using bulk hacking powers complies with the European Convention of Human Rights (ECHR).

“As currently practiced, GCHQ’s hacking powers are neither in accordance with law nor proportionate, both of which they must be in order to satisfy Articles 8 and 10 [of the ECHR]. Our case focuses on the in accordance with law requirement, which says that if an intrusive surveillance practice like hacking is to be used, it must have an explicit legal basis that makes its use foreseeable and must be accompanied by stringent safeguards,” said Privacy International General Counsel Caroline Wilson Palow.

Why Smartphones Are Now Adding Iris Scanners

For those who value their privacy, Samsung might be making it a little harder for someone to break into your phone. If you’ve ever configured your smartphone to offer up that 6-digit entry code, you’ll be pleased to know that the conglomerate has its eyes set on retinal scanning technology. But as we approach the release of the Galaxy Note 7, it's fitting to wonder exactly how secure this relatively new breed of biometrics might be.

The concept of utilizing iris scanners to unlock phones is not exactly novel. In fact, it’s old news for ZTE, a China-based multinational telecommunications company that released the ZTE Grand S, which featured retinal scanning in the form of the “Eyeprint ID,” last March. Biometrics and consumer technology have long gone hand in hand. Apple has featured fingerprint scanning through “Touch ID” in its iPhone since 2013. While such technology has proven to be reliable, it is not always the safest option. If you’ve ever seen a crime show before, you will know that fingerprints can quite easily be lifted and copied. Iris scanners, along with other biometric applications, are indeed susceptible to foul play. However, this is not to say that retinal scanning is of no use. ZTE allows for various biometrics, fingerprints, Eyeprint ID, and voice recognition, to be used in conjunction with each other. The value of such security measures are best observed in layers. Of course, the more security steps the user installs, the less likely their phone’s data is to be compromised.

Big Telecom Wants a DC Circuit Net Neutrality Review. Here’s Why That’s Unlikely

The nation’s largest cable and telecommunication industry trade groups on July 29 asked a federal court for a rare “en banc” review of June’s decision upholding US rules protecting network neutrality, the principle that all content on the Internet should be equally accessible to consumers. “The likelihood that the full DC Circuit would agree to rehear the case, much less reverse the panel’s decision, is extremely remote,” Andrew Schwartzman, Benton Senior Counselor at the Public Interest Communications Law Project at Georgetown University Law Center's Institute for Public Representation, wrote in a recent article. “The DC Circuit typically agrees to rehear a case only a few times each year, at most, usually where there is a sharp split on an important issue on which other circuits have taken a different stance,” Schwartzman wrote. “This case doesn’t meet those criteria and thus starts out as a particularly poor candidate for rehearing.”

There is no fixed timeline for the DC Circuit to respond to the broadband industry’s petitions. Federal courts typically respond to en banc requests within a few weeks, but given the fact that August is a slow month for the federal bench, the court could wait until September or even October to respond, according to Schwartzman.

WSJ Reporter: Homeland Security Tried to Take My Phones at the Border

On July 21, a Wall Street Journal reporter claimed that the Department of Homeland Security demanded access to her mobile phones when she was crossing the border at the Los Angeles (CA) airport. The case highlights the powers that border agents purport to have, and how vulnerable sensitive information can be when taken through airports in particular.

“I wanted to share a troubling experience I had with the Department of Homeland Security (DHS), in the hopes it may help you protect your private information,” Maria Abi-Habib, a WSJ journalist focused on ISIS and Al Qaeda wrote in a post on Facebook. Abi-Habib says she had arrived in town for a wedding, when an immigration officer approached her, and took her aside from the main queue. This by itself was not unusual, Abi-Habib writes: because of her job, she has reportedly been put on a list that allows her to bypass the usual questioning someone with her travel profile may encounter. But things changed quickly, and Abi-Habib was escorted to another part of the airport. “Another customs agent joined her at that point and they grilled me for an hour—asking me about the years I lived in the US, when I moved to Beirut and why, who lives at my in-laws' house in LA and numbers for the groom and bride whose wedding I was attending. I answered jovially, because I've had enough high-level security experiences to know that being annoyed or hostile will work against you,” she writes.