Changes between Version 2 and Version 3 of projects/server-seizure/statement


Ignore:
Timestamp:
Apr 19, 2012, 7:19:30 PM (8 years ago)
Author:
Jamie McClelland
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • projects/server-seizure/statement

    v2 v3  
    11= Proposed statement =
    22
    3 In an attack on our servers, our movement and on the use of the Internet for progressive purposes, the FBI yesterday seized a server from our server rack at a colocation facility we use. 
     3In an attack on our servers, our movement and on the use of the Internet for
     4progressive purposes, the FBI yesterday seized a server from our server rack at
     5a colocation facility we use. 
    46
    5 We were not informed before the seizure and were not informed by the FBI after it took place. We believe the seizure amounted to nothing more than theft of our machine.
     7We were not informed before the seizure and were not informed by the FBI after
     8it took place. We believe the seizure amounted to nothing more than theft of
     9our machine.
    610 
    7 The server is owned by our sister organization, Riseup, and is managed by ECN, a progressive provider in Italy.
     11The server is owned by our sister organization, Riseup, and is managed by ECN,
     12a progressive provider in Italy.
    813 
    9 While the seizure by the government of any equipment is pernicious and damaging, the reason the FBI has given for this seizure actually makes it extraordinarily dangerous. The FBI is investigating bomb threats being made to facilities and people at the University of Pittsburgh and believes that one of the servers used to email these threats was an anonymous email server operated by ECN. These servers have no logs or traces of who used them and so the FBI will not get any useful information from them; there is no useful purpose to the seizure.
     14While the seizure by the government of any equipment is pernicious and
     15damaging, the reason the FBI has given for this seizure actually makes it
     16extraordinarily dangerous. The FBI is investigating bomb threats being made to
     17facilities and people at the University of Pittsburgh and believes that one of
     18the servers used to email these threats was an anonymous email server operated
     19by ECN. These servers have no logs or traces of who used them and so the FBI
     20will not get any useful information from them; there is no useful purpose to
     21the seizure.
    1022 
    11 But a lot of harm could be done. Anonymous email is one of the most important parts of the Internet. One of the benefits of Internet technology is the ability to communicate world-wide: communication that is fundamental to the struggles of the world's people and the continued existence of the human race. In a period in which we have made massive compromises in our privacy -- and in which just about everything we do on-line can be tracked, logged, studied and used for all kinds of purposes -- there is one oasis from the glaring sunlight of intrusion: anonymous email and communication.
     23But a lot of harm could be done. Anonymous email is one of the most important
     24parts of the Internet. One of the benefits of Internet technology is the
     25ability to communicate world-wide: communication that is fundamental to the
     26struggles of the world's people and the continued existence of the human race.
     27In a period in which we have made massive compromises in our privacy -- and in
     28which just about everything we do on-line can be tracked, logged, studied and
     29used for all kinds of purposes -- there is one oasis from the glaring sunlight
     30of intrusion: anonymous email and communication.
    1231
    13 Government information revealers, whistleblowers, critics within institutions, organizers who fear police repression -- they all use anonymous email. In fact, anonymous email is one of the primary tools of the democracy movement unfolding worldwide (particularly in the Middle East). Without it, such movements would have had much greater difficulty organizing and would face much greater danger and repression. Without it, our already too limited knowledge of what government and corporations actually do in our name and against our interests would be even more limited. Without it, the Internet becomes little more than a caricature of its true potentical and purpose.
     32Government information revealers, whistleblowers, critics within institutions,
     33organizers who fear police repression -- they all use anonymous email. In fact,
     34anonymous email is one of the primary tools of the democracy movement unfolding
     35worldwide (particularly in the Middle East). Without it, such movements would
     36have had much greater difficulty organizing and would face much greater danger
     37and repression. Without it, our already too limited knowledge of what
     38government and corporations actually do in our name and against our interests
     39would be even more limited. Without it, the Internet becomes little more than a
     40caricature of its true potentical and purpose.
    1441 
    15 Anytime an anonymous computer is removed from the anonymous communications network, it weakens that network and sets a precedent for attack on the entire technology. If we lose anonymous email, we effectively lose the Internet as a tool for organizing and change. 
     42Anytime an anonymous computer is removed from the anonymous communications
     43network, it weakens that network and sets a precedent for attack on the entire
     44technology. If we lose anonymous email, we effectively lose the Internet as a
     45tool for organizing and change. 
    1646
    17 Obviously, the use of the technology made by this author of threats is horrible. We at MF/PL have never condoned threats of violence, terroristic activities or the use of Internet technology to frighten people and disrupt their lives. This runs counter to our vision of the reason the Internet exists and its proper use. And we are deeply troubled by the pain caused so many people by these sociopathic activities. 
     47Obviously, the use of the technology made by this author of threats is
     48horrible. We at MF/PL have never condoned threats of violence, terroristic
     49activities or the use of Internet technology to frighten people and disrupt
     50their lives. This runs counter to our vision of the reason the Internet exists
     51and its proper use. And we are deeply troubled by the pain caused so many
     52people by these sociopathic activities. 
    1853
    19 But this type of anonymous email use is very infrequent, almost microscopic, when compared to the legitimate, lawful and progressive use the great majority of users make of anonymous email. There is no positive outcome to this type of action by the FBI.
     54But this type of anonymous email use is very infrequent, almost microscopic,
     55when compared to the legitimate, lawful and progressive use the great majority
     56of users make of anonymous email. There is no positive outcome to this type of
     57action by the FBI.
    2058 
    21 As we have said in the past, we will never give up information about our members. We will also aggressively seek the return of the computer the FBI stole from us and other legal rememedies against those who collaborated in the trouncing of our rights. And, in that context, we will assertively defend the use and protection of the anonymous email system world-wide and resist any actions that might harm it.
     59As we have said in the past, we will never give up information about our
     60members. We will also aggressively seek the return of the computer the FBI
     61stole from us and other legal rememedies against those who collaborated in the
     62trouncing of our rights. And, in that context, we will assertively defend the
     63use and protection of the anonymous email system world-wide and resist any
     64actions that might harm it.
    2265