{{Header}} {{Title|title= The Importance of Anonymity }} {{#seo: |description=Why do you need anonymity? |image=Invisible-13955-640.jpg }} {{about_mininav}} [[File:Invisible-13955-640.jpg|100px|thumb]] {{intro| Why do you need anonymity? }} == Introduction == On 10 December 1948, the United Nations General Assembly proclaimed ''The Universal Declaration of Human Rights''. Fundamental human rights and freedoms championed in this document include: https://www.un.org/en/about-us/universal-declaration-of-human-rights {{Quotation |quote= No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. |context= Article 12. }} {{Quotation |quote= Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. |context= Article 19. }} As the reader is probably aware, modern nation states are eroding our freedoms at an accelerated rate. The privacy of all global citizens is being grossly invaded with an extensive, mass surveillance network which has contributed to repressive activities (see this report from Privacy International]). Untold billions are under the constant scrutiny of domestic authoritative regimes and law enforcement; the hallmark features of a police state. Unless precautions are taken, the Internet Service Provider and global surveillance systems like [https://en.wikipedia.org/wiki/ECHELON ECHELON] and [https://en.wikipedia.org/wiki/PRISM PRISM] can record everything done online: what the user reads, writes, and with whom they communicate. Only the ill-informed continue to believe this is a conspiracy theory, see [https://irp.fas.org/program/process/rapport_echelon_en.pdf this report from the European Parliament], quote: {{Quotation |quote=REPORT on the existence of a global system for the interception of private and commercial communications |context=ECHELON interception system }} == The Clearnet Risk == === Tracking and Profiling === Intimate tracking and profiling of the majority of Internet users is possible, because all messages and data that are sent contain the [[Data_Collection_Techniques#IP_Address|IP addresses]] of both the sender and receiver. Only a small minority consistently use Virtual Private Networks (VPNs), the Tor network, I2P and other tools in an attempt to disguise their network traffic. A suitable analogy for the "clearnet" risk is ordinary mail sent through the postal system which contains addresses of both the sender and receiver for two-way communication. IP addresses can be easily traced back to the physical location of the computers and their owners, ultimately identifying specific users. Moreover, just like with a postcard, any information traveling on the Internet can be read by the many computers that relay them. Notably, tracking and profiling is conducted by both government (see below) and corporate entities, with cooperation becoming the norm. For instance, government has [[Surveillance_Capabilities#Internet_Backbone_Surveillance|engaged the services of ISPs]] to fine-tune their collection efforts over decades. By either stealing from, legally compelling, or colluding with corporate data harvesters such as [[The_World_Wide_Web_And_Your_Privacy|ISPs, Facebook, Google and Amazon]], far more detailed dossiers have been compiled on every internet-connected individual. Showing utter contempt for the public, authorities have allowed [https://en.wikipedia.org/wiki/Surveillance_capitalism surveillance capitalism] to flourish in pursuance of their goals. === Government Interference === Tracking and profiling are not the only clearnet risks. In oppressive states, government actors frequently disrupt access to information sources that pose a reputational risk or which expose malfeasance - [https://wikileaks.org/ Wikileaks] is a classic example falling into this category. Similarly, unbiased Internet resources and forums may be routinely censored, with users redirected to sites that constitute disinformation when viewed through an objective lens. One obvious government goal is to convince the populace of a preferred reality Modern history students will note this usually includes notions of supreme governance, the infallible nature of the leadership, supposed threats posed by external actors or foreign nations, and the catastrophic risks of changing the political status quo. so the formation of an adversarial mindset is hindered. Specific techniques include [https://en.wikipedia.org/wiki/Internet_censorship Internet filtering] (including "search bubbling"), [https://en.wikipedia.org/wiki/Shadow_banning shadow banning], [https://fortune.com/2016/05/20/chinese-social-manipulation/ active propaganda efforts] and [https://web.archive.org/web/20200224171035/https://www.neilsandersmindcontrol.com/index.php/neils-blog/cambridge-analytica-jtrig-and-other-internet-manipulation-campaigns mood manipulation]. If successful, control is exerted over the population without expending significant effort; resorting to traditionally violent and repressive measures is not required. By defining permissible thoughts and actions amidst widespread surveillance, an early warning system exists for dissent or seditious acts. The efficiency of propaganda is monitored in real time, as well as the communications of all citizens. This enables 'dangerous' individuals or groups to be repressed before a critical mass unites in opposition to existing political structures, policies, laws, agencies or abuses. The strength of the government response is generally proportionate to the predicted threat; sometimes only token reforms of the system are necessary to appease people, or the firing of petty officials subject to complaints. The People's Republic of China (PRC) is a typical example. Pro/anti-regime speech is tolerated so long as it does not call for street demonstrations. If deliberate plans of action are discovered, government can sabotage efforts before they materialize into a movement. For instance, agents may infiltrate groups and cause disunity, or forge messages between members to cause infighting and arguments. For example, The Guardian reported that, an environmental activist was deceived into a two-year intimate relationship by an undercover police officer which was later ruled to be a human rights violation. https://www.theguardian.com/uk-news/2022/jan/25/activist-deceived-relationship-met-police-officer-wins-compensation-kate-wilson On a macro-level, similar techniques are applied to prevent alliances that would compete for influence or resources. Ultimately, authoritarian states will not hesitate to locate and assassinate people who pose a realistic threat to the regime. If committed recklessly, the killing of activists or agitators can spark mass movements if most assess there is nothing left to lose. == Privacy as an Inherent Right == Human beings have a fundamental need for private spaces to communicate their innermost thoughts, feelings, fears and desires. When their private sanctums are threatened by the prospect of unceasing and omnipresent surveillance by government and private entities, the effects are malign. Free speech and expression is chilled, distrust in authorities is heightened, and independent thought counter to the prevailing wisdom is suppressed via self-censorship. It is not hyperbole to suggest that surveillance has molded the behavior of entire populations. Without the consent or foreknowledge of the public, an electronic form of [https://en.wikipedia.org/wiki/Panopticon Jeremy Bentham's panopticon] has been rapidly constructed over the past few decades. Today's Internet user is like an inmate in a prison, where unseen guards could be watching at any time. Over time, subtle changes occur in behavior as a consequence of the "observer effect"; a new method of social control. Quote The Yale Law Journal: https://www.yalelawjournal.org/forum/why-rely-on-the-fourth-amendment-to-do-the-work-of-the-first
Modern surveillance threatens not only individual privacy but also the freedom to dissent.
The most insidious threat that expansive surveillance poses reaches even earlier into the lifecycle of dissent. For a thought to be birthed in a Miltonian sense, it must first be conceived, and here pervasive surveillance has a contraceptive effect. Those watched change not only their behavior; they change their thinking, too, so that they do not even conceive the thoughts that would become their “intellectual offspring.” This is what Neil Richards calls the “normalizing gaze of surveillance,” and it is perhaps analogous to the “observer effect” in physics. Unobserved, a citizen’s thoughts - like particles - follow their own path. But the more closely watched they become, the more their possible paths are determined by the very act of observation.Many readers would challenge this assertion with the retort, "Nothing to hide, nothing to fear." Unfortunately, with almost everyone having a skeleton in their closet, this argument seems glib. Security and encryption expert Bruce Schneier may give the unconcerned reader some further cause for doubt: https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html {{Quotation |quote=The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and other wholesale surveillance measures -- is this line: "If you aren't doing anything wrong, what do you have to hide?"