The press review catalogues press articles related to la Quadrature's issues, compiled by its volunteers.
See also our French press review.
With the Federal Communications Commission’s (FCC) decision to move forward with a controversial proposal that threatens net neutrality and the open Internet, lobbying activity looks like it has reached a fevered pitch. But for the companies involved—especially the telecom companies that are eager to be allowed to charge more for a “fast lane” of Internet service—lobbying has been at a fevered pitch for almost a decade.
To better understand the lobbying dynamics around net neutrality, we took the long view and tallied up the 20 lobbying organizations that mentioned “net neutrality” or “network neutrality” most often in their lobbying reports between 2005 and 2013. [...] The top pro-neutrality organizations filed 176 lobbying reports mentioning net neutrality. But the top anti-neutrality organizations far outpaced them, filing 472 reports that mentioned net neutrality. That’s a 2.7-to-1 ratio. [...]
The five most active organizations on the issue since 2005—Verizon, AT&T, Comcast, the National Cable and Telecommunications Association and the National Music Publishers Association—are all opposed to neutrality. Verizon and AT&T are heads and shoulders above everyone else, each with an estimated 119 reports mentioning net neutrality. [...]
[…] Disclosures by former NSA contractor Edward Snowden about the agency’s vast capability for spying on Americans’ electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law. […]
The challenge facing government and industry was to enhance security without compromising privacy, Granick said. The emails between Alexander and Google executives, she said, show “how informal information sharing has been happening within this vacuum where there hasn’t been a known, transparent, concrete, established methodology for getting security information into the right hands.” […]
When telcos zero-rate data used by their apps and their partners’ apps, they are engaging in price discrimination and threatening net neutrality. The practice should be banned in U.S. and Europe. […]
Zero-rated mobile traffic is blunt anti-competitive price discrimination designed to favor telcos’ own or their partners’ apps while placing competing apps at a disadvantage. A zero-rated app is an offer consumers can’t refuse. If consumers choose a third-party app like Dropbox or Netflix, they will either need to use it only over Wi-Fi use or pay telcos hundreds of dollars to use data over 4G networks on their smartphones or tablets. […]
[…] “Canadians willingly put onto social media all sorts of information, so it should not be a surprise that corporations, individuals, good guys, bad guys, and governments are collecting the freely available information they put on social media sites,” Clement said. […] “This is all publicly available information. People freely make that choice.” […]
Privacy lawyer David Fraser said the information Canadians offer online could be used in a variety of ways by a variety of authorities. One of the problems for Fraser is that, in the absence of an explanation from authorities, Canadians are left with hypothetical scenarios. […]
While the debate over net neutrality continues to rage in the United States, the British government is planning to block European Union legislation on the matter.
It’s a surprising turn of events. Just last month, the European Parliament voted to place the principles of net neutrality into law. However, before it becomes law throughout Europe, each member country must also pass the legislation. On Thursday, the British government indicated it may veto it instead.
At issue is a new provision that critics argue would restrict the British government’s “ability to block illegal material.” The amendment made it so that only a court order would allow for the banning of content, and not a legislative provision, as originally proposed, according to RT. [...]
The major record labels continue their efforts to drive The Pirate Bay underground with France being the next in line. A local music industry group has informed several ISPs that it has requested a court blocking injunction against the popular torrent site. In addition, more than a hundred Pirate Bay proxies are also being targeted. […]
Whether the French blockade, if granted, will be successful remains to be seen. There are still plenty of alternatives and circumvention tools available. This includes TPB’s own PirateBrowser which has been downloaded millions of times since its release last summer.
Google could be forced to remove links to news stories about individuals from its search results, following a ruling today (13 May) by the European Court of Justice, backing the EU's drive to introduce a "right to be forgotten" on the Internet. [...]
Joe McNamee of European Digitial Rights (EDRi) said, "In the recent Telekabel case, the ECJ ruled that ISPs can have non-specific injunctions placed on them, and they have to work out the balance between a resonable effort to implement the injunction and the ISPs' responsibilities to defend citizens' fundamental rights. There are, however, no such legal responsibilities."
"In this case, the ECJ ruled that Google can be held liable for failing to remove content, taking into account 'the information in question and its sensitivity for the data subject’s private life and on the interest of the public.' When Google has an obligation on one side - delete to avoid a breach of the law - but no obligation regarding the interest of the public, there is clearly an imbalance that needs to be addressed."
"So, we now have two cases from the ECJ where private companies are asked to find a balance between legal obligations on the one hand and freedom of communication on the other." [...]
Future versions of the open-source Firefox browser will include closed-source digital rights management (DRM) from Adobe, the Mozilla project’s chief technology officer, Andreas Gal, announced on Wednesday. [...]
The plug-in architecture is a security nightmare, and a source of numerous breaches through which buggy or malicious code was able to reach into users’ computers and compromise them. Now that browsers run in computers that we carry around in our pockets, connected to microphones and video cameras, and manage everything from our finance to our thermostats, abolishing plug-ins was an inevitable and welcome step. [...]
Still, Mozilla has taken some admirable pains to minimise the harms from its DRM. The open sandbox in which Adobe’s software operates very strictly limits the DRM’s access to the computer’s other processes and systems. This is crucial, because the Adobe module is not only closed source, it is also protected by controversial global laws that threaten security researchers who publish information about its security flaws. [...]
Trade watchers are worried that pushback over European Union trade negotiations with the United States could be spilling over into the EU’s trade talks with Canada. [...]
But as EU-US talks got into full swing, the European public “woke up” to the possible inclusion of an investor-state dispute settlement section, which was already included in CETA. That part lets companies seek compensation from states if government policies hurt their business interests.
There has been growing opposition to having such a section in the EU-US trade deal. The European Commission launched a public consultation on the issue, set to remain open until June.
The investment-related text the Commission released as part of that consultation comes from the approach Canada and the EU took in their agreement. [...]
“The fact that the EU-US talks started...put some of the decisions that they made within [CETA] in a different light and then delayed the finalization of that process a bit more,” said Amy Verdun, a University of Victoria political science professor who focuses on the EU. [...]
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide [...]
But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.
The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)". [...]