Why Is New York City Planning to Sell and Shrink Its Libraries?

Defend our libraries, don't defund them. . . . . fund 'em, don't plunder 'em

Mayor Bloomberg defunded New York libraries at a time of increasing public use, population growth and increased city wealth, shrinking our library system to create real estate deals for wealthy real estate developers at a time of cutbacks in education and escalating disparities in opportunity. It’s an unjust and shortsighted plan that will ultimately hurt New York City’s economy and competitiveness.

It should NOT be adopted by those we have now elected to pursue better policies.

Showing posts with label Snowden. Show all posts
Showing posts with label Snowden. Show all posts

Monday, August 13, 2018

Self Proclaimed As Fighting Surveillance, Library Freedom Project Is Tied to Tor Service With Its Deep Ongoing Connections, Including Financing, To The U.S. Government

Two WNYC On The Media segments, both about surveillance, clash because of what connects them: What you might learn from each of them about the relationship of the Tor Service to our federal government and its surveillance efforts.  For libraries this means. . . keep reading.
We first heard about the Library Freedom Project on what we thought was an excellent WNYC On The Media segment about United States government surveillance of patrons in American libraries aired on June 5, 2015: Librarians Vs. The Patriot Act.  Our library defending interest was already piqued and attuned to the issue.  The On the Media segment aired just a few months after a National Notice article about surveillance in libraries: Snowden Revelations Considered: Is Your Library, Once Intended To Be A Protected Haven of Privacy, Spying on You?

In that On The Media segment an interview with Alison Macrina was used to supply and put much of the information in context and it informed us that Ms. Macrina is the founder of the Library Freedom Project, and that with “help from the Knight Foundation, she and an ACLU attorney have created workshops on how to maintain privacy online.” 

The Library Freedom Project Twitter page (with a crossed-out surveillance eye symbol as its logo) promises that “We fight for privacy rights” and that the Library Freedom Project is:
Fighting for intellectual freedom and against authoritarianism. Coming to a library near you.
On the Library Freedom Project website we learn more about Alison Macrina and her connection to the Tor Project (emphasis supplied):
Alison Macrina
Founder & Executive Director

Along with founding the Library Freedom Project, Alison is a librarian, internet activist, and a core contributor to The Tor Project. Passionate about surveillance and it’s connection to global injustice, Alison works to demystify privacy and security topics for ordinary users.
On the Library Freedom Project “Resources” page (which includes a tweeted compliment from Edward Snowden) their website has more about TOR touting it as "beneficial to libraries":
All About Tor

What is Tor, and why is it beneficial to libraries? How does it work? How can it help my library patrons? In this course, we discuss the need for anonymous browsing, give a crash course on using Tor, and walk librarians through the process of adding it to their library labs.
That links to a “Curriculum for teaching all about Tor” page including a link to download Tor.

On another page of the site the Library Freedom Project announces “We are excited to partner with The Tor Project to bring Tor exit relays into libraries!”  What this means is a little complicated, but it means using the libraries to help Tor.  In fact, it's interesting how much of the Library Freedom Project website involves efforts to make Tor available and get it used.

What is all this about “Tor”?  Does Tor provide privacy?. . .

. . . If you listened to another relatively recent On The Media segment (May 25, 2018), this time about Yasha Levine’s book “Surveillance Valley- The Secret Military History of the Internet,” you learn that Tor does NOT provide privacy as advertised and that it is heavily funded by the United States government, thus raising questions about what the government is accomplishing through that funding.
Yasha Levine’s “Surveillance Valley- The Secret Military History of the Internet.”
Here is some of the transcript of Yasha Levine being interviewed by OTM's Bob Garfield:
    YASHA LEVINE: So the Tor browser, it’s a separate browser that you download and that you use, and it promises to protect your anonymity on the internet. So the websites that you go to don't know who you are. . . .

    BOB GARFIELD: So that’s great. These apps have delivered us from the prying eyes of the state, whether it's the Iranian state or the US government. We can navigate around the net without fear because these civilian heroes have given us the tools to do so.

    YASHA LEVINE: Except not. [LAUGHS] And one thing that I outline in my book is just how dependent both Signal and Tor are on government contracts. So Tor, anywhere from 90 to 98 percent of its budget depends on government contracts. . . .. And the origins of Tor are very interesting. The origins of Tor are not to protect human rights, are not to protect dissidents in Iran or China. Tor originated in a US Naval laboratory as a way of protecting spies from surveillance. So imagine if you're conducting an investigation for the FBI and you’re trying to infiltrate, let’s say, an animal rights group on the internet, if you are sitting in an FBI office and you go and register with this forum, the administrator will see your IP address and, if they take the time to trace that, they’ll be like, wait a second, this guy is the Fed. And so, you needed a technology that could hide your information. But the problem was if it's only American agents using this system, it defeats its purpose because it’s like, oh, they’re using Tor, another Fed. So the only way that that system could work was if it's used by as broad a range of people as possible.

    BOB GARFIELD: Aha, make it ubiquitous so that we’re not dimed out by the very fact of being on the platform.

    YASHA LEVINE: Exactly. And that’s what Tor has become. . . .  And to me, what’s interesting about the Tor project is that it shows that the military is so involved in every part of the network that it even controls and develops parts of the network that are supposed to be opposed to it.

    BOB GARFIELD: But that doesn't necessarily mean the government has backdoors to subvert the encryption or the IP address masking, does it?

    YASHA LEVINE: No, not necessarily. . . .
Citizens Defending Libraries just put up an article about Levine’s book: Reading on the Internet vs. Reading a Book You Picked Up Browsing In Your Library: Yasha Levine’s “Surveillance Valley- The Secret Military History of the Internet.”  There we described how Levine, pointing out the oddity of the connection between Tor and the federal government, went into the likelihood of (not very necessary) government backdoors to allow the Tor service to surveil its users, and how TOR may serve “as a `honeypot’ to attract and concentrate more accessibly for evaluation all the communicators who really do want hide significant things from the U.S. government.”

On his own website Yasha Levine wrote about his OTM interview
Yasha Levine himself wrote more about his On The Media interview (quoting from it) and specifically about Tor.
        "My problem with tools like Tor and Signal is that they distract from a bigger problem that exists on the Internet. It is in Google's interest. It is in Facebook's interest to promote Tor and to promote Signal. Because these tools do no threaten their business models. When you use Tor and you log into your Google account or if you log into your Facebook account, Tor does not protect you. Google knows who you are. You just logged into their service. Facebook knows who you are. You just logged into their service. Tor does not protect you from surveillance that happens on the Internet as a matter of routine. It does not protect you from Facebook giving away or selling your data like we've seen with Cambridge Analytica. These tools give people a false sense of privacy. And we don't have any privacy."

        "Tor narrowly protects you when you're browsing the internet, and it's sometimes useful. Signal protects a narrow band of communication — your text messages. It does not protect anything else that happens on your Android phone that siphons up everything it can collect and sends it to Google. What can you do if you want to protect yourself from Google? There is nothing you can do."

        "The NSA does not run its own social media platform. That social media platform is run by Facebook. So we have to focus not just on government surveillance, but on the private telecommunication systems and platforms that make that surveillance possible. And so as a privacy movement, we have to move away from simplistic technological solutions and figure out political solutions because that's the only way we are going to guarantee our privacy."
As our previous post about Mr. Levine’s book noted, his book never mentions by name the concept of a “limited hangout” by the intelligence agencies, but he supplies enough information about people involved with promoting Tor to give cause to wonder who those people may actually be working for when they promote Tor or, alternatively, whether they know they are being used by the Big Brother forces they say they are providing protection against.  In this regard, Levine provides intriguing background stories and details about Jacob Appelbaum, Laura Poitras and Edward Snowden (all of whom are also connected one way or another to Julian Assange).

Whether or not some people might be working as agents of the federal government and intelligence community or are simply being used as tools by them while they, duped, in good faith believe in the benefits of Tor, if Yasha Levine’s various suspicions about Tor are valid, as it appears that they almost certainly are, then it is important to bell this cat for the otherwise unwary.

In June of 2015, right after the On The Media segment featuring them, we contacted the Library Freedom Project and wound up exchanging emails with Alison Macrina because we wanted to exchange information and dig deeper into the subject of library surveillance in general.  We didn’t actually talk with Ms. Macrina, because Ms. Macrina wanted communications to be by email.  Although there were over a dozen emails exchanged back and forth between us the information exchanged was mostly an outflow of what we sent the Library Freedom Project.  We also worked to engage with them via Twitter.

When we sent Ms. Macrina the National Notice article (by Michael D. D. White) about the Snowden revelations and surveillance in the libraries saying that we were interested in “what is  happening in New York City libraries, and why it may be happening” and what besides real estate deals may “also factor into driving what is happening as books are disappearing from our libraries” Ms. Macrina responded that she was “in agreement about all this stuff of course.”   Despite all our ensuing emails we really never got deeper into things than that.

Maybe Ms. Macrina didn’t view our Citizens Defending Libraries interests as truly extending to the same concerns about surveillance the Library Freedom Project said it was addressing, instead of expecting that we'd only take issue with library sell-offs, library contractions and the elimination of books.  (As our post about Yasha Levine’s book makes clear, those contractions and elimination of books are definitely interrelated with surveillance concerns.)

Talking about the way Citizens Defending Libraries addressed and wanted to prevent “closures” Ms. Macrina referred us to Urban Librarians Unite as being similarly interested, but while we said that we didn’t want to get off on the wrong foot with her, we had to explain that Urban Librarians Unite did not want to ally with us to protect the public and that, running into problems with them from the start, we found them consistently on the other side, testifying in favor of the library sales and shrinkages, and promoting keeping library books off-site (actually a surveillance issue itself).  Ms. Macrina communicated that library “closures” was not an “arena” the Library Freedom Project was working in.
Articles About Library Privacy and Surveillance In Libraries
Since our 2015 communications with the Library Freedom Project, however unproductive they may have been, we have not heard from them again although we ourselves have substantially added to the information we have been passing along to the rest of the world about library surveillance, setting up a dedicated page of links about it (Articles About Library Privacy and Surveillance In Libraries), and, among other things, furnishing information from an October 2016 Noticing New York article based on information from the minutes of NYPL trustee meetings:  Snowden, Booz and the Dismantling of Libraries As We Know Them: Why Was A Private Government Spy Agency Hired to Take Apart New York's Most Important Libraries And Turn Them Into Something Else?

We think it suffices to say that there are issues about surveillance in our libraries that need to be pursued much more deeply than they have been and that there are too many unanswered and unpursued questions relating to surveillance in our libraries and why certain things that are happening to our libraries are happening.

Tuesday, July 24, 2018

Reading on the Internet vs. Reading a Book You Picked Up Browsing In Your Library: Yasha Levine’s “Surveillance Valley- The Secret Military History of the Internet”

You go into a library, a big public building, around you are tables and desks where other patrons similarly drawn to the offerings of the library read and turn pages.  Venturing into the stacks, you see the shoulders and bent necks of other people pulling books off the shelf, reading an index or table of contents, or perhaps their fingers running over the back of book spines naming authors, stating titles and showing the Dewey Decimal numbers that group books of similar content and concerns together. Somewhere, not far out of eyesight, is a desk with one or more librarians who can help and answer questions if you ask. Maybe one trundles through to squeeze past you to replace some of the books to the stacks.  The environment may be hushed and quiet, but it doesn’t seem entirely private.  It might even seem that there is a social aspect to this commons you are occupying.  There is the possibility that, seeing the title you might ask your neighbor, “Good book?”, and in return get an entirely unexpected answer teaching you are amazed to have learned.

By contrast, finding yourself at home reading an article on the Internet in that corner where sun doesn’t come in to glare on your computer screen may seem like a far more private experience. . . .  But is it?

Yasha Levine's book “Surveillance Valley: The Secret Military History of the Internet,” which came out in February is a stern reminder of a fact that gets regularly overlooked and/or forgotten: Reading on the Internet is a very unprivate experience.  In other words, as he explains, the history of the Internet, from its very inception, is intimately intertwined with surveillance and the military. .

Fire up your browser to interface with the Internet and it can track you (your browser probably recently offered to have all your devices share the information it can collect about your browsing habits).  Tell your search engine like Google what you want to look at and it will collect that data from you along with what you actually wanted to click to open from amongst the links its presented.  Along the way, some advertisers will be clued in about what ways you may be a good target for various things.  The websites you land on will also likely try to advertise to you and may know a lot about you even before you get there.   If you are reading an ebook, the publisher may be paying attention to whether you are reading certain parts of it fast or slow, what you want to bookmark and what statements in the book you are researching as you go along.  They may be paying attention to where you are, what your reading habits are time-of-daywise.  Send your friend a few thoughts about what you just read via Gmail and Google will read that email.  And that phone in your pocket that is a powerful little computer? It knows your voice, by default might be listening for it now, recognizes your face; keeps track of where you are reporting that information to the provdiers of various apps. . . .What about your Internet provider or providers?: What are they keeping track of with respect to you?  Who sold you your computer?; What are they keeping track of in terms of your use of it?. . . . And we haven’t even brought up what is formally called “spyware” or deemed “malicious.”
In other words, even if curling up in an easy chair with your laptop in an empty apartment seems like a solitary experience in which you alone are participating, it is really quite the opposite.
Here, via our YouTube channel, is a quick overview about what Yasha Levine's book is about, delivered in the creepiest possible way by Amazon’s Alexa.  
   

    Alexa Explains Surveillance Valley (+ Siri on Alexa) (click through to YouTube for best viewing)

    Amazon's Alexa is happy to describe "Surveillance Valley," Yasha Levine's new book about how surveillance and the military history are baked into the DNA of the Internet including the partnerships between big Internet companies (like Amazon, Google and Facebook) and the military.  Siri also has some things to say about Alexa.
Your first instinct might be to console yourself by telling yourself that all the many companies tracking you as you read are private companies, not the government, and that no matter how much of a nuisance it is that you are being followed by advertisements omniscient about what you last shopped for, their only goal is to help and make life more convenient by anticipating your every next thought before it even pops into your head. . .

. . . But that would be to ignore the Edward Snowden revelations that the flow of information through all the major Internet companies has been tapped into by the U.S. Government.  Further, as Yasha Levine documents extensively in his book, these big Internet companies with surveillance and data collection at the core of so much of their basic purpose, are integrally connected with the government including through all sorts of partnerships.  Mr. Levine also has some scary observations about why hopes for privacy seemingly offered by Edward Snowden are likely just pitfalls instead.

Although those doing this vast amount of surveillance would like to hope that the public makes a distinction between government surveillance and the surveillance done by private corporations and thus consider the situation somehow more benign, Levine makes clear that it is increasingly a distinction with no real difference flowing from the implications attached.  (One thing that Levine’s book does not mention is that the law does make some technical distinctions in this regard, the result of which is that the government can probably more easily do surveillance if it is the outcome of partnerships with the private sector.  One reason partnerships are often in play is because the Internet, something the government created, was privatized through actions undertaken without fanfare in the mid 1980's a convoluted chapter of the overall story Levine tells.)  Levine does not write about whether the intelligence agencies have actually involved themselves in picking the winners and losers in the silicone valley races, which firms will step up to become the Internet giants, but with firms like In-Q-Tel scouting for Internet firms and investing in them since before 9/11 that is not a far-fetched proposition.      

This is from Mr. Levine's prologue to his book:
Google is one of the wealthiest and most powerful corporations in the world, yet it presents itself as one of the good guys: a company on a mission to make the world a better place and a bulwark against corrupt and intrusive government‘s power around the globe. And yet, as I traced the story and dug into the details of Google's government contracting business, I discovered that the company was already a full-fledged military contractor, selling versions of its consumer data mining and analysis technology to police departments, city governments and just about every other US intelligence and military agency.  Over the years it had supplied mapping technology used by the US Army in Iraq, hosted data for the Central intelligence agency, indexed the National Security Agency's vast intelligence databases, built a military robots, colauched a spy satellite with the Pentagon, and leased its cloud computing platform to help police departments predict crime. And Google is not alone. From Amazon to eBay to Facebook – – –
Levine over and over again makes clear how little the difference is between the surveillance tactics of the private Internet firms the government.  At page 164 he writes about Google’s content extraction and collection of data culled from the emails of those using its “free” gmail service (introduced in 2004) and concerns of UC Berkley law professor Chris Hoffnagle who noted its similarity to the “Total Information Awareness” program of President Reagan’s national security advisor John Poindexter. 
Concerns about Google‘s business model would continue to haunt the company. Time proved Hoffnagle right. There wasn’t very much difference between Google‘s approach and the surveillance technology deployed by the NSA, CIA, and Pentagon. Indeed, sometimes they were identical.
Levine notes how the military surveillance programs hailed back to the Vietnam War and efforts then to anticipate and thereby control the direction the populace of the country would go in.  Not to split any hairs, the goal was that the country should not head off in any communist directions.  When transplanted back and used with respect to the populace of the United States such programs also had incorporated built-in notions of the political directions in which the citizens of this country should not be allowed to head.  Levine writes that Martin Luther King, Jr. delivering a speech after the Detroit riots of 1967 was viewed in military terms as a “counterinsurgency.”  Levine notes that the secret CONUS Intel program, exposed in early 1970 that involved thousands of undercover agents spying on United States Citizens, seemed to focus primarily on the Left, “anyone perceived to be sympathetic to the cause of economic and social justice.”  This is not to say that the program didn’t have or utilize its capacity to spy on the John Birch Society (now essentially morphed into the Koch network) at the other end of the polical spectrum.

Levine writes (at Page 76) about the CONUS program:
They infiltrated domestic antiwar political groups movements, spied on left-wing activists, and filed reports in a centralized intelligence database on millions of Americans. “When this program began in the summer of 1965, its purpose was to provide early warning of civil disorders which the army might be called upon to quell in the summer of 1967,” reported [Christopher] Pyle [in his exposé in the Washington Monthly]. “Today, the army maintenance files on the membership, ideology, programs, and practices of virtually every political group in the country.”
On page 85 Levine writes about the investigation of CONUS Intel led by Senator Sam Ervin of North Carolina in a series of 1971 hearings:
    . . . His committee established that the US Army had amassed a powerful domestic intelligence presence and had “developed a massive system for monitoring virtually all political protest in the United States.” There were over 300 regional “record centers” nationwide, with many containing more than 100,000 cards on “personalities of interest”

    * * *

    . . . the army referred to activists and protesters as if they were organized enemy combatants embedded with the indigenous population.

    * * *

    “The hypothesis the revolutionary groups might be behind the civil rights and antiwar movement became a presumption which affected the entire operation,” explained senator Irving and a final report…
What happened then, as reported by Levine is even more of a revelation.  In light of the public outrage resulting from Ervin’s hearings:
The arm promised to destroy the surveillance files, but the Senate could not obtain definitive proof that the files were ever fully expunged.  On the contrary, evidence mounted that the Army had deliberately hidden and continued to use the surveillance data it collected.
Those files were, as Levine recounts, fed into database that was that was at the core of the early Internet.

Levine has something in common with some others who have worked to lift the veil about the unrecognized level of surveillance and inelegance gathering by the United States: At one point, like some others, Levine's book takes on a personally harrowing caste as Levine receives death threats and worries about his safety and that of his family.  Those threats, as we will get to in a moment, came after he started to promulgate information about how perhaps everything people thought they knew about obtainable level of privacy after the Snowden revelations were not what most people informing themselves about these subjects thought they knew.

At the very beginning of his book talking about the military efforts to control the population of Vietnam, Levine mentions the fairly notorious Pheonix program giving an estimate that under that program some forty thousand to eighty thousand Vietnamese were assassinated to neutralize their potential or suspected influence in their society. Acknowledged by the CIA, the CIA officially puts the number of such assassinations at just twenty thousand.

It is one thing that Levine could have gone into in greater depth, but in the age of Internet surveillance and control, such "wet" assassinations become far less necessary.  Like in "The Matrix" it is enough to neutralize a person's cyber identity.  As our venturing forth to interact in public spheres is increasingly in the form of our digital cyber selves, whether we disclose our real identities as we do so, or cloak ourselves theorizing that pseudonyms can be effective, and as we increasingly see others through the digital goggles of services like Google, it is enough that our digital world avatars are neutralized when they threaten the powers that be.  

Laura K. Donohue is a Professor of Law at Georgetown Law, Director of Georgetown's Center on National Security and the Law, and Director of the Center on Privacy and Technology who writes on constitutional law, legal history, emerging technologies, and national security law has spoken about how in the cyberworld of social networks where everything is virtual, individuals whose growing influence is threatening to the security state can readily be readily identified (all the social network programs these days automatically count followers these days, what could be easier- plus they have other tools).  Then their virtual cyberworld existences can neutralized by various means such as isolating them or interfering with or interrupting their communication network to suppress their message.  See: Meta-Irony Of Trying To Mount A Social Network Campaign To Get People To See Oliver Stone’s Movie “Snowden” and To Pardon Snowden- How Efforts To Help Snowden Could Be Impeded, Monday, October 31, 2016.

In other words, who actually saw the Facebook post of this individual?  Are their Twitter posts escaping attention?  Do their Internet posts disappear into the rarely explored nether regions on page 5 or 10 of Google searches?  If the monitored tribe of followers of such individuals is very small, perhaps they are not even a threat, but possible a help as they draw off and help further fractionalize the communication and coordination of an opposition that might otherwise congeal into something fiercer and of more concern.

Maybe these individuals of influence don't need to be neutralized at all.  And maybe with the kind of Internet monitoring being done today, the anticipating and steering of society doesn't have to be thought of any longer as individuals at all: Such individuals can be thought of as just as components of overall trends that can be countered by launching countervailing counter-narratives, or distractions that will sidetrack the potentially influenced segments of society.  Perhaps it is enough that the political candidates supported by such individuals never win (or are consistently co-opted after election) so that their energy deflates with a Sisyphean string of constant defeats.  On the other hand, to say that more and more frequent monitoring may be used to control the flocking behavior our populace in terms of what may be trending, is not to say that nano-targeting of voters on an individual basis won't be a tactic to control the outcome of elections and engineer those defeats.

Something to think about: If the most important thing is for the surveillance state to be monitoring the flocking trends of followers, not leaders, then, although you may not consider yourself a leader with dangerous ideas that they may care about ( nothing that you need care about keeping private), they have as much interest or more in getting an accurate garage of what you as  a follower may be thinking as any leader.  That way they can work to swing trends the other way when they need to.  Which is to say that ideas are not, in and of themselves dangerous: Ideas are only a threat if they take hold.  And in terms of the main centers of power, the mainstream media of this country is pretty innocuous in terms of the ideas it passes along that might threaten those centers.

In Ms. Donohue's estimation, monitoring Internet social network activity is not the best tool for dealing with small secretive terrorist cells, but effective to stymie trends in political opposition:
If you are looking at a social network, the denser that network is the more you can tell about it, but in a cell structure where they are communicating very rarely and you are dealing with peripheries it's very hard to tell where those important nodes are in a sparsely populated communication network.

So, ironically, it turns out to be an incredibly powerful tool to head off potential social, economic, political opposition and not as an effective way to head off concerted terrorist cell structure activity.
The concerns for Levine's life and the safety of his family due to what was angrily posted openly on the Internet was in response to what Levine was researching revealing about the Tor service, and how Tor likely did not provide the secure unsurveilled channels for communication and accessing information through the Internet that it was supposed to.  Why?: Because Tor had deep ongoing ties, including financing to the U.S. government.  (Tor was nominally nonprofit and independent of the government.) And yet it was being embraced as a privacy app by privacy community advocates.  A Tor logo sticker was prominently visible on Edward Snowden's laptop in photographs of him meeting with reporters to leak information about the almost incomprehensible extent of the surveillance by the United States government, including its own citizens, including surveillance that was illegal, and inclining  surveillance that Congress had been told was not going on.

Levine concluded that the personal attacks and threats against him were to fend off his message about Tor, that expressions of personal animosity against him were just a distraction from the main issue.  While Levine analyzed that Tor could perhaps provide some privacy, to use it effectively would require great technical acumen and assiduous care to avoid all the other ways that a communication could be intercepted in various steps along the way.  Even then, the U.S. government would likely have a back door to it.  This is not to say that Tor would not have uses.  It would be useful to U.S. intelligence agency spies themselves, but only if they could disappear into a cloud of other users.  It would also be useful to activists in other countries battling to change or overthrow their governments so long as  the U.S. government did not share its own intelligence with those other governments unable to crack through Tor.  Levine also posits Tor as a "honeypot" to attract and concentrate more accessibly for evaluation all the communicators who really do want hide significant things from the U.S. government.

Levine never uses the term "limited hangout" anywhere in his book. A "limited hangout" is where the intelligence community releases true but partial (or potentially distorted) information intending it to be misleading or relied upon by its recipients in a way that manipulates them into wrong conclusions or actions that are not in their interest.  Levine does write about an  interesting, flamboyant young man who was one of Tor's principal promoters at hacking and privacy conferences around the globe, an encryption and security software developer, by the name of Jacob Appelbaum.

Appelbuam made appearances in two of reporter Laura Poitras' documentaries, her Oscar winning "Citizen Four" about Edward Snowden coming forward with his leaks through the journalists he met with in Hong Kong, including Poitras, and her later released documentary, "Risk" about time Poitras spent with Julliane Assange.  Poitras' documentaries make clear how Appelbuam gained the trust of both Snowden and Assange.  As you can learn from "Risk" and as Levine writes about, Poitras, a journalist trusted by the privacy community also became close enough to Appelbuam to have an affair with him.

Appelbaum in "Citizen Four" about Edward Snowden
Based on the portrait and information about Appelbaum in Levine's book there is an obvious question as to whether Appelbaum was working for the intelligence agencies as part of a limited hangout when he was promoting Tor.  Being careful, questions must also be asked about the ties he was able to make with Snowden and Poitras and his befriending of Assange.

Another possible limited hangout?: On page 222 of Levine's book he describes how one day he arrived home to find a heavy brown box sitting on his doorstep.  It was an answer to a freedom of information act request he had filed and it documented with further information and details much of what he'd been saying about the connections between Tor and the federal government. Should it have been that easy for him to get the information he was requesting, and, if not, why was the information, now public through his book, furnished to him as it was?

Near its end, Levine concludes his book with the following finishing his observations (at page 269):
Now Internet billionaires like Larry Page, Sergey Brin, and Mark Zuckerberg slam government surveillance, talk up freedom, and embrace Snowden and crypto privacy culture, their companies still cut deals with the Pentagon, work with the NSA and CIA, you continue to track and profile people for profit. It is the same old split screen marketing trick: the public branding in the behind the scenes reality
Internet Freedom is a win-win for everyone involved – everyone except regular users, who trust their privacy to double-dealing military contractors, while powerful Surveillance Valley corporations continue to build out the old military cybernetic dream of a world where everyone else watched, predicted, and controlled.
Now think back about that depiction of a visit to the traditional library set forth at the beginning of this discussion-  Reading in the traditional library was a comparative private experience with no such tracking.  You could have access to all sorts of books, books you never thought about or even knew existed before you got to the library and no one would be taking note of any trends that you and the other library users were setting in terms of the books you were plucking from the shelves.

These days, traditional libraries are under siege: Citizens Defending Libraries was formed in response to the across-the-board plans New York City is implementing to sell and shrink libraries, eliminate books and libraries, typically with real estate schemes helping fuel their fast pace.  Meanwhile, the library space that remains in the city system or which is being substituted for what is sold off is becoming, akin to Internet reading, more susceptible to surveillance with books being  kept off the library premises and needing to be requested by computer Internet request, probably searched for and asked for in advance.  The library systems are also seeking to induce patrons to increasingly use digital books that are more expensive for the library.  Or the net result may simply be that library patrons are simply encouraged to do more of their reading on the Internet, perhaps even while at the library.  More about the difference between digital books and physical books, and more about surveillance in the libraries here: Physical Books vs. Digital Books, Articles About Library Privacy and Surveillance In Libraries, and It's Not Just The Real Estate Industry Threatening Libraries: Examining The Panoply of Other Threats

If you watched our video of Alexa explaining what the book "Surveillance Valley" is about then you learned at the end that Alexa is named after the Library of Alexandria, by reputation the greatest library of all time, a repository of the world's knowledge in an ancient time.  Alexa may also store a vast amount of information, but Alexa was not set up to collect the world's information in books, Alexa was a company that was set up by Amazon to collect information about us, information that in previous times, before the Internet, was largely private.

Tuesday, December 6, 2016

Articles About Library Privacy and Surveillance In Libraries

As the articles mount up we thought it would be good to set up this page, which we can further update in time, with a collection of links about articles on the subject of library privacy and surveillance in libraries.

•    National Notice:  Snowden Revelations Considered: Is Your Library, Once Intended To Be A Protected Haven of Privacy, Spying on You? by Michael D. D. White, March 8, 2015
During the McCarthy era there was also concern about what books were available in the libraries, how readily available certain books were and concern about the political leanings of librarians working in the libraries.

* * *

. . .  the surveillance state is interested in something else: The surveillance state wants to know what you think and for that reason the surveillance state believes that libraries should tell the government what you read.

Librarians in Connecticut were the first to successfully challenge the PATRIOT Act when the FBI, along with an accompanying perpetual gag order to keep its actions secret, demanded broadly that the Connecticut librarians turn over to the bureau library records concerning what their patrons were reading and their computer use.

* * *

Now consider this: Changes are being implemented at libraries, and the changes are particularly apparent in New York City, that would make the heroism of these librarians wanting to protect their patrons' privacy virtually meaningless except for its symbolism.
•    Noticing New York:  Snowden, Booz and the Dismantling of Libraries As We Know Them: Why Was A Private Government Spy Agency Hired to Take Apart New York's Most Important Libraries And Turn Them Into Something Else? by Michael D. D. White, October 30, 2016
Essentially, although technically a private publicly traded company, Booz Allen is virtually indistinguishable from our government itself when it comes to surveillance, with as Bloomberg Businessweek said, the "federal government as practically its sole client."  The government's surveillance work is now carried out predominantly through `private' spy organizations like Booz: "About 70 percent of the 2013 U.S. intelligence budget is contracted out, according to a Bloomberg Industries analysis."

* * *

in 2007 the New York Public Library hired Booz Allen Hamilton to advise and help oversee a "radical overhaul at the NYPL involving real estate sales, consolidation and fund-raising." Sherman says that "in consultation with with Booz Allen" the NYPL made the decision to sell three major libraries, the Mid-Manhattan Library, the Donnell Library and the Science, Industry and Business Library (SIBL).   In addition, the plan involved gutting the research stacks of the NYPL's 42nd Street Central Reference Library which held three million books, most of, and what was once the core of, its research collection.

The four libraries thus being dismantled were the four most important central destination libraries in Manhattan. SIBL was a state of the art library just completed in 1996 and the Central Reference Library has last been expanded in 2002.

* * * *

If librarians were the first to successfully stand up and oppose the intelligence overreaching and if Booz Allen Hamilton "is really an arm of the intelligence community" involved with the federal government's "most controversial federal surveillance programs in recent years" then why was Booz Allen Hamilton hired to help reorganize the New York Public Library's most important libraries?

* * * *

Why was a top U.S. intelligence spy agency engaged for radical overhaul of libraries as we have traditionally known them?
•    Noticing New York:  American Library Association Issues "Advocacy Alert" About “Massive Privacy Threat" of U.S. Government Remotely Hacking Library Computers and NYPL Issues “Privacy Policy”- Is “Privacy” At Libraries Actually Protected? by Michael D. D. White, December 6, 2016
. .  the NYPL hired Booz Allen not very long after its board was advised of the expectation that CALEA might "require" the NYPL and "to reengineer their Internet service facilities to enhance law enforcement's ability to monitor and intercept communications."
•    Noticing New York:   Too Close For Comfort? Real Estate Addresses- Blackstone, Booz Allen Hamilton, The Libraries & Bryant Park Wednesday, by Michael D. D. White, November 16, 2016
. . .  the U.S. contracts out the huge preponderance of its surveillance to private firms, and mainly to just a few firms with  Booz Allen Hamilton regarded as the “colossus” of those few.

* * * *

The potential possible connections between Booz and Blackstone were myriad, but not necessarily easy to find out about or discern if they were there.  Frankly, it hadn't yet occurred to me that I should do some simple address checking.  Now that the landlord/tenant real estate connection is identified, what does it mean?  It could actually mean a lot of things. . . .
•    The Nation: The Nation: The Hidden History of New York City's Central Library Plan, Why did one of the world's greatest libraries adopt a $300 million transformation without any real public debate? By Scott Sherman, August 28, 2013
. .  what was the role of Booz Allen Hamilton . .   hired by the NYPL in 2007 to formulate what became known inside the trustee meetings as "the strategy"?

* * * *

In January 2007, Booz Allen Hamilton was hired to assist the trustees with "the strategy." On February 7, the trustees went into executive session (the substance of which is never covered in the minutes)
* * * *

Were Booz Allen's fingerprints on the sale of the Donnell Library and other "non-core assets" owned by the NYPL? In a recent interview,
[NYPL Chief Operating Officer David] Offensend was tight-lipped about the NYPL's association with Booz Allen . . .  “The primary reason that Booz Allen was retained was to help the library develop a broad strategic direction on a lot of different fronts." (NYPL spokesman Ken Weine won't release the documents that emerged from the NYPL's partnership with Booz Allen, for which Booz received $2.7 million
•    Citizens Defending Libraries: Physical Books vs. Digital Books, March 1, 2015

•    On The Media: Librarians Vs. The Patriot Act, June 5, 2015
. . . in the post 9/11 environment, America is like that. They are watching, taking books out of the library, and they are watching our library behavior. Under Attorney general Ashcroft. Things have changed.

* * * *

only six weeks after 9/11. At the time, 67% of Americans said they'd be willing to forfeit civil liberties if it helped keep America safe. Ten years later, only 27% would say the same. So, if the ALA poked holes in the Patriot Act - they risked public backlash.

* * * *
. . . mostly, librarians figured the best way to protect their patrons' privacy was to have nothing to protect. So after a book was returned, the record of its borrower was deleted, and they started shredding paper records daily.
•    The Nation: Librarians Versus the NSA- Your local library is on the front lines against government surveillance, by Zoë Carpenter, May 6, 2015
Under the Patriot Act, the government can demand library records via a secret court order and without probable cause that the information is related to a suspected terrorist plot. It can also block the librarian from revealing that request to anyone. Nor does the term "records" cover only the books you check out; it also includes search histories and hard drives from library computers. The Muslim-American who uses a library computer to correspond with family abroad, or the activist planning a demonstration against police brutality-those digital trails are vulnerable to surveillance, along with everyone else's.
* * *

[Alison] Macrina wants librarians and library users to be less complicit.

* * *

Librarians have frequently been involved in the fight against government surveillance. The first librarian to be locked up for defending privacy and intellectual freedom was Zoia Horn, who spent three week in jail in 1972 for refusing to testify against anti-Vietnam War activists.

* * *

Section 215 allows the FBI to request "any tangible thing" relevant to a terrorism investigation, without having to show probable cause that the "thing" is actually connected to a terrorism suspect. The provision applied to library circulation records, patron lists, Internet records, and hard drives, and it prohibited any library worker who received such a request from discussing it with anyone.

* * *

"The FBI is poised to intrude once more on library confidentiality, this time with an arsenal of surveillance that even our library confidentiality laws may not be able to prevent," a retired librarian named Herbert Foerstel, who'd helped to raise the alarm about the bureau's Library Awareness Program in the 1980s, warned in a Baltimore Sun op-ed in the spring of 2002.

* * * *

The rebellion eventually attracted enough attention that in a September 2003 speech, Attorney General John Ashcroft attacked the librarians directly, accusing them of "baseless hysteria." . . . .  Ashcroft used the word "hysteria" five other times throughout the speech, and then again a few days later during a speech in Memphis.

* * *

 Because of the gag orders, it is impossible to know how many other libraries have received similar requests. At the very least, the case of the Connecticut Four, like the Snowden leaks, validated those who refused to take the government's assertions regarding Section 215 at face value. Adam Eisgrau, the managing director for the ALA's Office of Government Relations, told me that as a result, we know now that librarians "were not hysterical, but absolutely prescient."

* * *

. . The digital shift has increased the privacy challenges. . .
•    American Libraries: Toward the Post-Privacy Library? Public policy and technical pragmatics of tracking and marketing, by Eric Hellman, June 16, 2015
Libraries have a strong tradition of protecting user privacy. Once all the threat models associated with the digital environment are considered, practices will certainly change.
•    The Guardian:  You are not what you read: librarians purge user data to protect privacy- US libraries are doing something even the most security-conscious private firm would never dream of: deleting sensitive information in order to protect users,  Sam Thielman, Wednesday 13 January 2016
Perhaps that sounds like harmless information, but Polly Thistlethwaite, chief librarian at the Graduate Center, said that guilt by association with controversial books has a long history and that librarians have a duty to protect readers of “heretical texts”.
•    The Washington Post: Librarians won't stay quiet about government surveillance, by Andrea Peterson, October 3, 2014
In the case of government surveillance, they [librarians] are not shushing. They've been among the loudest voices urging freedom of information and privacy protections.

Edward Snowden's campaign against the National Security Agency's data collection program has energized this group once again. And a new call to action from the ALA's president means their voices could be louder and more coordinated than ever.
American Libraries Magazine: Advocate. Today. One hour a day makes a difference- American Library Association President’s Message, by Courtney L. Young
We are passionately dedicated to our profession and to fundamental human rights like education, privacy, and intellectual freedom.
Slate: Long Before Snowden, Librarians Were Anti-Surveillance Heroes, by April Glaser,  June 3 2015
. .  Before there was Snowden, there were librarians.

Librarians were among the first to raise concerns about the Patriot Act while it was being debated in Congress. The American Library Association was a signatory on the earliest coalition-led opposition to what became the Patriot Act, which passed in October 2001. Within a few months, a University of Illinois survey found that 85 libraries had been contacted with government requests-and that's likely a low figure, considering that Patriot Act requests came with a gag order.
•    Waging Nonviolance- People Powered News and Analytics: How your local library can help you resist the surveillance state, by Melissa Morrone July 8, 2014
The third principle in the American Library Association's Code of Ethics is, "We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted."

* * *
Google, Facebook and other major Internet corporations, by contrast, may be calling on the U.S. government to curb surveillance, but they have their own plans for how to turn our data that they collect and retain into shareholder value.

* * *

Like any other institution, of course, libraries are beholden to interests, which can inhibit their potential. Library staff as well as patrons are heavy users of Google and other big-data platforms, and in some cases these companies are looking to partner with libraries. E-books and digital rights management present privacy issues within library collections.  Library trustees often come from the business sector or other layers of municipal power structures and may bring correspondingly conservative outlooks to library operations.

* * *
Librarianship may be shaped by the broader society, but it is also marked by opposition to a dominant commercial culture. Librarian Barbara Fister reminds us that libraries do something Google and Amazon don't do: "We serve communities, not just customers, and our goal is the common good, not profits."
•    Brooklyn Daily Eagle: DHS head Johnson asks Brooklyn groups for help fighting home-grown terrorism- Concerns about lone-wolf terrorists `lurking in our communities', by Mary Frost, May 8, 2015
Johnson and Johnson: Brooklyn Public Library president Linda Johnson (left) hosts Homeland Security Secretary Jeh Johnson's (center) event event at Brooklyn's central Grand Army Plaza Library.  Event was held as platform for Johnson (Mr.) to ask community groups to assist in surveillance because of concern for possible "lone wolf" terrorist attacks.
Saying that the global terrorist threat has evolved to become more decentralized and complex, Homeland Security Secretary Jeh Johnson met with community and religious leaders in Brooklyn . . .   at the central branch of the Brooklyn Public Library at Grand Army Plaza.
* * *
“We are concerned about . .  the so-called lone wolf who could be lurking in our own communities . .”
* * *
Brooklyn Public Library President Linda Johnson hosted the event.
Johnson with Johnson again: Brooklyn Public Library president Linda Johnson as host stands with Homeland Security Secretary Jeh Johnson's (podium).
•    Citizens Defending Libraries: Testimony in connection with the NY City Council Hearing Re NYPL's 42nd Street Central Reference Library and Midtown Campus Plans Opposing Proposed Sale of SIBL, the Elimination of Books and the Surveillance of Library Patrons, December 14, 2016.
Last night at the Mid-Manhattan Library the NYPL . .  the NYPL [at the presentation of their plans for the libraries future] said they would answer the public's questions, but the NYPL refused to answer critical basic questions about their plan.

Asked how many books SIBL used to hold, not just the other day, but before concoction of the Central Library Plan when we know that there were well over one million books in SIBL, and, similarly, asked how many books the Mid-Manhattan Library used to hold the NYPL refused to answer.  

* * *
NYPL Won’t Answer The Question: . . why, in connection with its library reorganization plans banishing books, the NYPL hired Booz Allen Hamilton, a top private surveillance firm with the U.S. government as its main client, shortly after the NYPL's board (according to its minutes) was advised that it was expected that the federal government was going to "require" the NYPL "to reengineer their Internet service facilities to enhance law enforcement's ability to monitor and intercept communications."

* * *
The City Council is hereby advised that these questions have been asked and the NYPL has refused to answer them.. .  You as City Council can ask these absolutely essential questions and insist on answers.

* * * *

Councilman Jimmy Van Bramer [in response]:  "As you know. .  I am very familiar with the PATRIOT Act. . .we are the place where everyone comes to feel safe.  The New York Public Library, like the Queens and Brooklyn Library, have hundreds of thousands, if not millions of undocumented folks. . . .  You’ve stated your position, your concern: I understand it; I disagree with it."
 •    Washington Examiner: Trump likely to have Kobach, Kelly run DHS, by Gabby Morrongiello, December 6, 2016.
Kansas Secretary of State Kris Kobach and retired Marine Gen. John Kelly are likely to be tapped for secretary and deputy secretary of homeland security, according to a top transition official familiar with the president-elect's current thinking, but the source would not reveal which of the two men is favored for the top post and which is likely to be deputy secretary.
 •    McClatchyDC: Reports: Immigration hardliner Kobach misses out on top Homeland Security job,  By Lindsay Wise and Dave Helling,  December 7, 2016.
President-elect Donald Trump has passed over Kansas Secretary of State Kris Kobach for the top job at the Department of Homeland Security. . .

Kobach, an immigration hardliner, was thought to be under consideration for the post. . .

. . . It's possible that Trump might still offer Kobach a role at DHS or the Justice Department.
 •    Daily Kos: Be afraid, very afraid: Kobach plan as Secry of Homeland Security, by VaallBlue, November 21, 2016.
Suddenly there is a lot less guesswork in figuring out what Kansas Secretary of State Kris Kobach  would do as a member of Trump's Cabinet . . .

For those not familiar with Kris Kobach, he has a proven record of conceiving and implementing racist laws on immigration and voter suppression. . .

On Sunday, Kobach made no effort to hide what he proposed to Trump if he becomes the new head of the DHS.

* * *

Item #5:  Disenfranchising voters. . .   it is clearly a plan to issue regulations about voter rolls along with amending the National Voter Registration Act.

Given what Kobach did in Kansas, it's not hard to guess that this is about. As Secretary of State, Kobach suspended or cancelled more than 30,000 would-be voters' registrations . . .

* * *
Kobach's plan refers to some use of the Patriot Act with some action taken to "forestall future lawsuits."  That sounds ominous.
 •    Esquire: This Is the Man Spearheading the Newest Voter Suppression Effort- Kris Kobach has quite a track record,  By Charles P. Pierce, August 31, 2016.
Kobach has been the guy that John Ashcroft tasked [when Kobach was at Homeland Security engaged in surveillance/profiling programs] with weeding out foreign travelers in the wake of 9/11-and Kobach's program was so deeply involved in racial profiling that it was shut down. 
 •    LJWorld: Democrats accuse GOP of vote `caging'- Republicans deny making list of voters to challenge, by Scott Rothschild, December 27, 2007.
In an e-mail message sent to state Republicans, Kansas Republican Party Chairman Kris Kobach reviewed the party's accomplishments this year.

In the message, he states: "To date, the Kansas GOP has identified and caged more voters in the last 11 months than the previous two years."

Mike Gaughan, executive director of the Kansas Democratic Party, said, "Vote caging is a pretty direct form of voter suppression."

 . .  In the past, there have been reported incidents of caging lists targeting predominantly minority districts that tend to vote for Democrats.

* * * *

But Christian Morgan, executive director of the Kansas Republican Party, denied the party was doing what Gaughan described.

"It's just a term of art," Morgan said of caging voters.

He said what the party has done is try to identify voters and their views on certain issues.

"We cage that person's information," he said.

Then when the election comes around, the GOP will . . .
  •    Project Censored: Ralph Nader, in October Berkeley CA address (recorded) about his latest book, "Breaking Through Power," December 30, 2016.

If you start out with 1% or less surrounding a particular issue that reflects what Abraham Lincoln called the public sentiment, that is public opinion, you're almost unstoppable. And if you connect on the left/right issues. . . . . Civil liberties, the PATRIOT Act, left/right with a vengeance. They don't want the government to search your home and not have to tell you for 72 hours or get into your medical, financial records without probable cause, or your library records without probable cause.

. . . You want to see a legislator or a lawmaker go pale and have the knees shake?: Walk into their office with conservatives and liberals and say "We are a left/right coalition." They don't know how to game you.. . They don't know how to game a union of both.  [Audio of this quote is used in our CDL YouTube video]
For an overview of how consistently government surveillance effect thread through the history of libraries in the United States see this article:

 •    First Monday (Peer reviewed journal): Libraries and National Security: An Historical Review, By Joan Starr, December 6, 2004.
The September 11, 2001, terrorist attacks launched the United States into a new era of defensive preparedness. The U.S. federal government’s first legislative action in October 2001 was the passage of the . . . USA PATRIOT Act introduc[ing] a greatly heightened level of government intrusion into many aspects of ordinary life, including library use.

* * *
 An inquiry into the similarities and differences with the past may aid in suggesting a response . .

* * *

World War I . . . also brought with it increasingly restrictive information controls and a nearly complete stifling of dissent. Beginning in 1917, Congress passed several pieces of legislation designed to regulate information content and transmission. . .  declaring that any materials containing treasonous or revolutionary content would not be allowed in the mail. . .

. .   authorizing the establishment of an official censorship board . . the Sedition Act, substantially limiting free speech by making it illegal to speak, write, print, or publish anything critical of the U.S. government. Penalties for breaking this law included steep fines and incarceration. Throughout this period, the library community voiced no public or private objections . .

In addition to information restriction, military authorities also requested librarians’ assistance in patron surveillance. In the spring of 1918, military intelligence issued an order to remove from libraries any materials on explosives, as well as to report the names of requestors to the Army. Libraries readily complied, some developing innovative methods for reducing and monitoring access to the materials.

Indeed, librarians responded with extreme initiative, complying with both the letter and spirit of these laws and regulations. . . The pressure to conform suppressed nearly all dissent. The library community completely abandoned the very few librarians brave enough to hold opposing views>

* * *

World War II. . . came the 1942 War Department order for libraries to remove materials on munitions and cryptology, as well as to report to the Federal Bureau of Investigation (FBI) the names of individuals requesting the materials. . . .

. . . In addition, the Office of Facts and Figures (OFF), an early World War II propaganda agency, asked individual libraries to collect intelligence on public perceptions. Librarians were eager to participate . .  providing an "entrance of American librarians into the world of trenchcoats and the coeval emergence of information science and military intelligence in the United States."

 . . . librarians apparently considered privacy a peacetime luxury . . .

* * *

The Early Cold War and McCarthyism. . . What began as strictly an anti–Soviet book purge soon spread to any materials viewed as anti–American. Working librarians had to decide how best to respond to powerful citizen groups, and they debated the merits of book removal, reshelving, and labeling.

The [American Library Association] Council issued two groundbreaking resolutions during this time that provided the profession’s first substantial national support for intellectual freedom. . . intellectual freedom was a major topic, and "general sessions exhorted librarians to uphold democratic values of free inquiry and to combat censorship." The Council adopted the new Bill of Rights, asserting, "Censorship of books … must be challenged by libraries . . .

 . . . The second major document to come from the ALA was the 1953 Freedom to Read statement . .  a product of a large coalition of librarians, publishers, and educators. The statement asserted the value of "diversity of views and expressions," as well as denounced the practice of selecting books based on "the personal history or political affiliations of the author" . .   and clearly articulated the professional responsibility of librarians and publishers to defend intellectual freedom.

* * *

The Late Cold War and the Library Awareness Program. .  June 4, 1987, two FBI agents entered Columbia University’s Mathematics and Science Library and asked a clerk about foreign library users . .  the reference librarian overhead the request and referred the agents to the Acting University Librarian . . . who refused to cooperate with the FBI. . . . she reported the incident . . .

The story of this encounter broke in the national media with a front–page article in the New York Times . . .  The national media picked up the story, and it spread to "all parts of the country and abroad."

The following year. .  the disturbing information that the FBI had conducted over 100 background searches on librarians or their associates, many of whom were presumably "those who had criticized the [Library Awareness] program"

. . .     “documents show that librarians have continued to be contacted after 1987, that people who opposed the program have been investigated, and we are not as secure as we thought."

The year ended with ALA filing appeal with the Justice Department for a full disclosure of the FBI program . .  "We feel we have been grossly misled about the nature, scope, and continuation of the FBI Library Awareness Program"

* * *

. . .  in a parallel study of the public by the Pew Internet and American Life Project (Rainie, et al., 2002). By so doing, they were able to show that librarians are far more likely (67 percent) than the public (35.3 percent) to object to the federal government removing information from its Internet Web sites.
  
For more on the related issue of physical vs. digital books see out other Citizens Defending Libraries page:

  •    Citizens Defending Libraries: Physical Books vs. Digital Books