Rebecca,<br><br>I think the proposed legislation is a terrible development which completely contradicts the goals stated by secretary Clinton in her internet freedom speech. <br><br>This quite reminds me of the "clipper chip" encryption policy battles of the 90's when the Clinton administration asked for similar powers. The policy was defeated by a coalition of human rights ngos, privacy experts and technical experts who showed that the proposed back doors would in fact make us less, not more secure.<br>

<br>The reasoning being put forward now is the same. The danger remains the same - build in surveillance and back doors - and they will be used against us. China already has this capability, and is using it to strategically steal info from ngos, businesses and govts.<br>

<br><br>In addition, there isn't mention of enhanced independent oversight and appeal process - which is a must for any such invasive measure.<br><br>It is my view that the proposal will :<br><br>- not only weaken internet freedom domestically, but also serve as a precedent for repressive govts to enact far broader surveillance powers.<br>

<br>- have the unintended consequence of making the use of secure tools for communication illegal at home and abroad.<br><br>- make it harder, is not impossible for US based group to call out govts that conduct internet surveillance.<br>

<br><br>In summary, the US must try to serve as an example of freedom and liberty online. If we let proposed policies like this prevail, the great potential of the internet for freedom will be lost forever.<br><br>Regards<br>

<br>Robert <br>--- <br>Robert Guerra <<a href="mailto:guerra@freedomhouse.org">guerra@freedomhouse.org</a>> <br>Project Director, Internet Freedom <br>Freedom House <br>Tel +1 202 569 1800 <br>Twitter : netfreedom<br>

 <br><br><div class="gmail_quote">On Mon, Sep 27, 2010 at 10:02 AM, Rebecca MacKinnon <span dir="ltr"><<a href="mailto:rebecca.mackinnon@gmail.com">rebecca.mackinnon@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">

<div style="word-wrap: break-word;"><div><br></div>I recommend Glenn Greenwald's comparison of the Obama admin's latest moves with the UAE/Blackberry situation, which the administration criticized: <a href="http://www.salon.com/news/opinion/glenn_greenwald/2010/09/27/privacy/index.html" target="_blank">http://www.salon.com/news/opinion/glenn_greenwald/2010/09/27/privacy/index.html</a><div>

<br></div><div>If the bill described by the NYT were to be passed into law, am I correct in my understanding that tools like Tor would be illegal and/or impossible to develop and operate in the U.S.? </div><div><div><br>
</div>
<div>Best,</div><div>Rebecca</div><div><br><div><div>On Sep 27, 2010, at 6:40 AM, Carlos A. Afonso wrote:</div><br><blockquote type="cite"><div>There is a legal foundation in the Brazilian constitution which establishes that "confidentialy of correspondence is inviolable". The latest major rewriting of our Constitution is from 1989, when email was a little more than an experiment, but for all legal purposes email is regarded as "correspondence" just as any common letter. If one encrypts email therefore it becomes irrelevant to the Constitution, since its contents are inviolable.<br>

<br>But, of course, a Court can legitimately require breach of confidentiality by a designated law official if there is legal ground to prove that this breaching is required as proof against a possible crime, felony etc during a due process of law. However, as much as no one ca be forced to read his or her own letter even if the style is impossible to read by anyone else, so he/she cannot be forced to decode or facilitate the decoding the encrypted content of any message or document. This is also based in established law: no one can be forced to generate evidence against him/herself in any circumstance, or, in other words, we all have a right to remain silent.<br>

<br>In practice, a lot of illegal violations of confidentiality (either by wiretapping or outright opening of any correspondence) is committed very frequently by government officials or private entities with or without government involvement, and usually the victim might never know if this happened, how and why.<br>

<br>The question then is (assuming the same legal framework is valid in the USA): is the government entitled to open any correspondence on suspicion without a legal and explicit procedure? In other words: does government spying violate those legal principles?<br>

<br>I think the conclusion is that, if the government can break this confidentiality without due process of law (and spying is breaking this without due process of law), basic rights are being automatically put at grave risk. However, even if it cannot do that, we will all be at risk of illegal violations by government or other agents. Encrypting digital information seems to be the last resort a citizen has to ensure as much as possible his/her constitutional right of confidentiality<br>

<br>I am not a lawyer, so my reasoning might be full of flaws, but this is what I think.<br><br>frt rgds<br><br>--c.a.<br><br><br>On 09/27/2010 02:40 AM, Sivasubramanian M wrote:<br><blockquote type="cite">And, from the Privacy list:   NYTimes: U.S. wants access to *all* encrypted<br>

</blockquote><blockquote type="cite">Internet communications <a href="http://bit.ly/b7iSFC" target="_blank">http://bit.ly/b7iSFC</a>  (New York Times)<br></blockquote><blockquote type="cite"><br></blockquote><blockquote type="cite">

On Mon, Sep 27, 2010 at 10:38 AM, Sivasubramanian M<<a href="mailto:isolatedn@gmail.com" target="_blank">isolatedn@gmail.com</a>>wrote:<br></blockquote><blockquote type="cite"><br></blockquote><blockquote type="cite">

<blockquote type="cite">In other parts of the world, it is not exactly torture and a prison term,<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">but activists, NGOs and journalists can't possibly be euphoric that their<br>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite">communications are private and free of surveillance. China makes news, china<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

is loud in its methods, but elsewhere around the world the same is possibly<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">happening in a lesser degree in a more subtle, undetected form. Can it be<br>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite">argued that other Governments anywhere do not use available technology to<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

monitor activists NGOs and journalists?<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite">Sivasubramanian M<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

On Sun, Sep 26, 2010 at 9:09 PM, Rebecca MacKinnon<<br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><a href="mailto:rebecca.mackinnon@gmail.com" target="_blank">rebecca.mackinnon@gmail.com</a>>  wrote:<br>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"> From the South China Morning Post Sunday Magazine.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><a href="http://www.scmp.com/portal/site/SCMP/menuitem.1d923702d0f3d4b2b5326b10cba0a0a0/?vgnextoid=8b50812fd593b210VgnVCM100000360a0a0aRCRD&vgnextfmt=mag&issue=20100926&ss=Post+Magazine&s=Magazines" target="_blank">http://www.scmp.com/portal/site/SCMP/menuitem.1d923702d0f3d4b2b5326b10cba0a0a0/?vgnextoid=8b50812fd593b210VgnVCM100000360a0a0aRCRD&vgnextfmt=mag&issue=20100926&ss=Post+Magazine&s=Magazines</a><br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Chain of commands Mainland authorities are detaining individuals for<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">perceived crimes committed online. But how do they access such incriminating<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">information? Paul Mooney<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Updated on Sep 26, 2010When Norzin Wangmo used her computer and mobile<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">phone two years ago to communicate with friends about protests in Tibet, she<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">had no idea it would result in her torture and a five-year prison sentence.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Detained soon after sending the messages, the 30-year-old Tibetan<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">government worker and writer was accused by officials of using the<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">technology to inform the outside world about civil unrest in Tibet.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">After months in detention, during which her friends said she was tortured,<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the five-year prison term was handed down. Few other details about Norzin<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">Wangmo, who leaves behind a young son, are known.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">No one is sure how Chinese intelligence obtained the details of her<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">communications. But the story is a frightening example of the dark side of<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">internet espionage on the mainland, where people perceived to be a threat to<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the state are targeted, including ordinary Chinese citizens, scholars,<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">human-rights workers, journalists, diplomats and businesspeople.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Many security experts who study China believe the government is being fed<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">information by a loose and shadowy network that includes the hacker<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">community, organised crime and other parts of government, including security<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

agencies and the People's Liberation Army (PLA).<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">"The sheer amount of energy and resources the Chinese government has<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

thrown at this is enormous," says Lhadon Tethong, director of the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Canada-based Tibet Action Institute, which helps Tibetans fight for rights,<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">primarily through the safe exchange of information, using sophisticated<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">technology.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Many victims of internet espionage are quick to point a finger at the<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">central government.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"Who else would attack us?" asks Chine Chan, a researcher for Amnesty<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">International Hong Kong. "It doesn't make sense unless it's the government."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Security experts, however, are careful to explain that no smoking gun has<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">yet been found linking the hacking and the use of malware - malicious<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">software designed to secretly access a computer system - to Beijing.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Greg Walton, an independent cyber security researcher based in Britain,<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">believes the attacks are the work of groups of players. He points to<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Chongqing, where there is a concentration of internet espionage control and<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">command centres, as an example.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

"Chongqing is interesting in that it's like a nexus of organised crime,<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the party, a big computer-hacking scene and all sorts of PLA installations,"<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">he says. "It's a combination of many forces that do these attacks. It's not<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">a secret that the data is ending up with the state. Any other explanation is<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">improbable."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Experts say the spying is highly organised and professional, with some<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">hackers working in shifts, even making note of when targets are having lunch<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">or taking breaks.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

It is also likely that many hackers are working independently and some<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">targets are being compromised by more than one malware group, says Nart<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Villeneuve, a researcher at the Information Warfare Monitor (IWM), whose<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">members include the Citizen Lab, Munk School of Global Affairs, the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">University of Toronto and the SecDev Group, a security consultancy based in<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Canada.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Walton says patriotic hackers are probably selling information to the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">government, providing it with "another layer of deniability".<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Since last year, IWM has published two reports on cyber-espionage<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">networks: "Tracking GhostNet: Investigating a Cyber Espionage Network" and<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"Shadows in the Cloud: An investigation into cyber espionage 2.0."<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">GhostNet is the name investigators have given to a network of more than<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">1,200 compromised computers in 103 countries, including foreign affairs<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">ministries, embassies, international organisations, news organisations and a<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">computer in the headquarters of Nato. The network's command and control<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">centre appears to be on Hainan Island, home of the Lingshui signals<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">intelligence facility and the Third Department of the PLA.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">In September and October 2008, IWM investigated alleged cyber espionage on<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the computer systems in various offices related to the work of the Tibet<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">government in exile and other Tibetan groups. These included the Office of<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">His Holiness the Dalai Lama, in Dharamsala, India, organisations in the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">United States, Britain, France, Belgium and Switzerland, and the office of<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Drewla, an NGO which runs an online outreach project that uses young<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Chinese-speaking Tibetans to talk with people in the mainland about the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">situation in Tibet.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">The GhostNet report said some 70 per cent of the control servers behind<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

the attacks on Tibetan organisations were located on IP addresses assigned<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">to the mainland.<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">During an investigation at the Dalai Lama's private office, Walton<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">observed as documents were being pilfered from the computer network,<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">including a file containing thousands of e-mail addresses and another<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">detailing the negotiating position of the spiritual leader's envoy.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">During the investigation into the so-called Shadow Network, investigators<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">were able to obtain data taken by the attackers, including some 1,500<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

letters sent from the Dalai Lama's office between January and November last<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">year. While the report said many of the letters did not contain sensitive<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">information, it added that they allowed the attackers to collect information<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">on anyone contacting the exiled spiritual leader's office.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The team traced the attacks to hackers apparently in Chengdu, which is<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">also the location of one of the PLA's technical reconnaissance bureaus<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">charged with signals intelligence collection. Researchers said one hacker,<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

who used the cyber name "lost33", had attended the University of Electronic<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Science and Technology of China, which publishes manuals on hacking and<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">offers courses on network attack and defence security.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The authors said an anomaly was detected when analysing traffic from the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">offices of the Tibet government in exile: computers in Dharamsala were<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">checking in with a command and control server situated in Chongqing. Despite<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">Chongqing Communist Party chief Bo Xilai's high-profile anti-corruption<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">campaign, the city still has a high concentration of gangs said to have ties<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">to the government and which have extended their traditional criminal<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">activities to include cyber crime.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">While Walton admits no direct link to the central government has been<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">detected, he does not seem to have any doubts about who is behind the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">attacks.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">"Some people shy away from saying it's the state," he says, "but there's a<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

growing body of evidence. My own feeling is that sooner or later someone<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">will be able to prove it."<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

The "Shadows in the Cloud" report, which Walton contributed to, points to<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the existence of a vibrant hacker community in the mainland "that has been<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">tied to targeted attacks in the past and has been linked, through informal<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">channels, to elements of the Chinese state, although the nature and extent<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">of the connections remains unclear".<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The authors allude to a "privateering" model in which the government<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">authorises citizens to carry out attacks against "enemies of the state".<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

However, the report referred to research by Scott Henderson, author ofThe<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Dark Visitor: Inside the World of Chinese Hackers. Henderson wrote that<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">there was disagreement about the exact relationship between hackers and the<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">state, running from "authorise" to "tacit consent" to "tolerate".<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The most plausible explanation, the report said, and the one supported by<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">the evidence, is that the Shadow Network is based in the mainland and run by<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">one or more people with close ties to the country's criminal underworld.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The report concluded: "As a result, information that is independently<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">obtained by the Chinese hacker community is likely to find its way to<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">elements within the Chinese state."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>
</blockquote>
</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Lhadon Tethong says security experts she's spoken to consider the cyber<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">war "a lost game" but that she takes a different approach - trying to remain<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">one step ahead of the mainland authorities.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"We're looking at new technologies that haven't come out yet and how they<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">can be used in Tibet," she says. "The Chinese government can control your<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">BlackBerry or laptop, but let's look beyond that, at iPads and Android<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">technology [a mobile-phone operating system developed by Google]. You cannot<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">stop it. The force is just too strong.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"We worked with young and innovative technical experts and geeks from the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">beginning," she says. "The optimistic part is that the advances in<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">communications technology are happening so quick that the Chinese<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">bureaucracy can't keep up. Saying you can't do this or that because they're<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

too good is just not true."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">She cites the microblogging service Twitter, which the authorities managed<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">to block. Before that, Tibetan activists had found it a useful tool for<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">getting their message across both within and outside the mainland.<br></blockquote></blockquote></blockquote>
<blockquote type="cite">
<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"You can block one site and another will pop up, and it won't take long<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">before people find it," she says. "You can try to control it but there's no<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">way to stop it and I think they know that."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Chan agrees. "The trend can't go back. It's important to learn how to get<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">around [the controls]. If civil society grows faster than the government<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">controls, then you win."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br>
</blockquote>
</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Meanwhile, the attacks are increasing in number and in sophistication.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">On March 18, people on the mailing list of Human Rights in China (HRIC)<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">received an e-mail that appeared to be from director Sharon Hom. The subject<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">line - "Microsoft, Stool Pigeon for the Cops and FBI" - convinced many<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">recipients to take a look at the enclosed attachment. Within seconds the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">e-mail was flying around cyberspace, with thousands receiving it and passing<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">it on to others.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">But the e-mail was not from Hom. It was a "spear phishing" e-mail that<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">lured recipients to visit a compromised website in Taiwan. Those who clicked<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">on the link unknowingly loaded malware that allowed the attackers to take<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

control of their computers from a server in Jiangsu province.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">In a report on the HRIC attack, Villeneuve wrote that the malware spread<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

via the e-mail was traced to a command and control centre in Jiangsu. He<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">said the nature of the compromised entities and the data stolen by the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">attackers indicated correlations with the mainland's strategic interests.<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">But he concluded that "we were unable to determine any direct connection<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">between these attackers and elements of the Chinese state".<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>
</blockquote>
</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Earlier this year, a foreign journalist was conducting a text conversation<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">on Skype with Tsering Woeser, a Beijing-based Tibetan poet and commentator,<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

when the journalist received an article over the internet service. When the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">suspicious reporter called Tsering Woeser to ask about the file, she was not<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">even home. Someone had hijacked her account and started conversations with<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">30 of her Skype friends, several of them journalists. They even imitated the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">way the poet spoke. Some were tricked into downloading malware. This was the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">second hijacking of her Skype account in two years.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Most cyber attacks rely on a tactic known as "social engineering",<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">manipulating people to get them to provide computer access through trickery,<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">rather than technical hacking.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"At the root it's not technology," Walton says. "The deeper the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">penetration, the more intelligence they can feed into a social engineering<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">attack. If I look at your computer, I can draft e-mails that you will trust<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">more and more."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">Robbie Barnett, director of the Modern Tibet Studies programme at Columbia<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

University, in the United States, says the attackers are getting<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">increasingly sophisticated in their use of social engineering. They use the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">names of people you know, refer to an incident over the past 48 hours, often<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">with a provocative subject, and may even have the actual sender's real<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">e-mail address. He says no one can be 100 per cent safe, no matter what<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">precautions are taken.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

"Eventually, they hit a bull's eye," Barnett says, "They send you a letter<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">from a Tibetan who's just written to you and could easily be sending<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">something to you. Even if you've been careful for years, you could fall for<br></blockquote></blockquote>
</blockquote>
<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">it."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Typically the target receives an e-mail appearing to be from an<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">acquaintance. Often it mentions some sensational detail that lures the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">victim into opening a file or visiting a website that opens a backdoor,<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">where malware can be planted.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Control is often maintained through the use of the Chinese Gh0st RAT<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">(remote access tool). These trojans enable nearly unrestricted access to the<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">infected system. The attacker can then carry out surveillance of the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

attacked computer, pilfer files and e-mails and send data to other<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">computers, and use the infected computer as a platform to launch future<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">attacks against computers around the world.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"It's all part of a trend that I've been watching for a decade," says<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Walton, "pushing surveillance of the population from the network to the<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">desktop.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"Everything you can do, they can do - it's like they're sitting in front<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">of your computer. They can turn on the webcam, the microphone and access<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

documents. Someone is staring back at you through your webcam. It's<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Orwellian."<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">While much of the activity seems focused on gathering intelligence and<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">disruption of operations, in some cases the attacks are more dangerous. In<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">July, the website of Chinese Human Rights Defenders was shut down several<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">times by direct denial of service (DDOS) attacks. In April, the Foreign<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Correspondents' Club of China was forced to take its website offline<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">temporarily after being repeatedly hit by DDOS attacks.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">In January, Google announced it had found "a highly sophisticated and<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">targeted attack on our corporate infrastructure originating from China that<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">resulted in the theft of intellectual property". The attack was said to have<br></blockquote></blockquote></blockquote><blockquote type="cite">
<blockquote type="cite">
<blockquote type="cite">targeted the Google e-mail accounts of Chinese human-rights activists.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Journalists have also become a target. In April, Andrew Jacobs, Beijing<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">correspondent for The New York Times, wrote an article detailing how his<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

computer had been hacked and e-mails redirected to an unknown address.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Jacobs said scores of foreign reporters in the mainland had experienced<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">similar intrusions.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Last September, several foreign news bureaus in Beijing began receiving<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">e-mails from "Pam", who said she was an economics editor. The e-mails, which<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">were in well-written English and included a list of genuine contact names,<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">detailed a proposed reporting trip. However, when the attached PDF was<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">opened it unleashed malware.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Walton and Villeneuve, who studied the virus, said in a report that the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">file appeared to be a legitimate document that had been stolen from a<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">compromised computer, which was then modified to include malware and serve<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">as a lure. While they said the malware could not be traced back to the<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">central government, the recipients were Chinese news assistants, whose<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">e-mail addresses were not widely known to the public, but were to the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Ministry of Foreign Affairs.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Richard Baum, moderator of Chinapol, an online community of more than 900<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">China watchers, including journalists, lawyers and analysts, says the group<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">has suffered "a certain amount of leakage" of membership lists and e-mail<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">traffic. Members have also received phishing e-mails. Recently, an e-mail<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">was sent to some members purporting to be the new member e-mail list, which<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">had a malware attachment.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Walton says data was being sent back to a computer in Chongqing within 30<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">seconds of the malware being accepted.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">In the HRIC incident, a member of Chinapol sent the e-mail to all its<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">members, some of whom in turn passed it on to their acquaintances.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">What's troubling is anti-virus software used by the general public is not<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">always effective in catching these viruses. In the case of the HRIC attack,<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">there was very low anti-virus cover, with only eight out of 42 anti-virus<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">products detecting the file as malware, the investigation found. In the case<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">of the news assistants who downloaded malware, only three of 41 anti-virus<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">products used by VirusTotal, a service that analyses suspicious files and<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">URLs, detected the malicious code embedded in the PDF file.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Fake e-mails also create confusion. A human-rights activist in Hong Kong<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">tells of an e-mail sent out in her name revealing certain information only<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">known to people she worked closely with.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>
</blockquote>
</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"This is their way of saying, `We know who you are and what you're doing',<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">to make you feel scared," she says. "Even if people know the e-mail is not<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">from me, the damage is already done. The next time they'll ask if it's<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">really from me."<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

HRIC's Hom says: "This is seriously raising security issues for us. It<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">makes every NGO, every journalist, every contact ask if they get an e-mail<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">from me if it's real. As a small NGO we don't have the resources, technical<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">expertise and capacity to guard ourselves against such high-level attacks.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">It makes it very difficult for us to do our work.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"How can any organisation, company or government function if communication<br></blockquote></blockquote></blockquote>
<blockquote type="cite">
<blockquote type="cite"><blockquote type="cite">with other persons or organisations runs the risk of a malware attack that<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

undermines the trust in the organisation? The biggest impact on us is we<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">have to be extremely careful not to compromise the security of the people<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">we're dealing with."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">One example of this, from the GhostNet report, is that of a young Tibetan<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">woman who was returning to her village after having worked for two years in<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">India. She was stopped at the Nepal-Tibet border by Chinese intelligence<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

officers. The woman was taken to a detention centre, where she was<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">interrogated about her connection with Drewla.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

She insisted she had gone to India just to study, denying any political<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">involvement, but her claims were waved away. The officers then pulled out a<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">dossier on her activities in India, including transcripts of her online<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">chats about Tibet.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">She was held for two months and then allowed to return to her village.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">As a result, many activists are now reluctant to send information over the<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">internet and even delete e-mails from people they don't know or that look<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">suspicious. The result is less information is getting through to the people<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">who need it.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">"It's caused a lot of problems for me," says Tsering Woeser, who is often<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

under police surveillance. "First, because of my situation, I can only<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">contact my friends through Skype and e-mail, and now some Tibetan friends<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">are afraid to contact me. I'm getting much less information than before.<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">It's a huge interference."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Tsering Woeser says her internet activities are constantly probed. In a<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">recent incident, she received an e-card from dissident writer Yu Jie, which<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">turned out to be a phishing spear. She says that at least once a month a<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">person pretending to be a Tibetan attempts to make contact with her online.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

"But what I worry about most is that the people who are in contact with me<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">may get into trouble and I won't even know about it," she says.<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Barnett also depends on sources to provide him with news from tightly<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">controlled Tibetan areas. He says he, too, is now receiving far less<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">information than in previous years. "The deterrent effect on people sending<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">information is very effective," he says. "This is having a massive effect on<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">the limitation of outsiders finding out what's happening in China. A lot of<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

it works by fear, intimidation and self-censorship. People are worried about<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">interception."<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Barnett says this climate of surveillance suggests to anyone considering<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">sending information "that they should think twice".<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">The culture of security in China, he says, means the government only has<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">to go after a few people to have a deterrent effect.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"You only have to pick up three people for passing on information and that<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">will deter hundreds of thousands of others," he says. "The system may now be<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">more powerful than us."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Walton says there has been a clear increase in the number of incidents<br></blockquote></blockquote></blockquote>

<blockquote type="cite"><blockquote type="cite"><blockquote type="cite">this year, although he cautions that this may be due to the fact people are<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">more on the lookout for these things.<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">"There's more awareness and people are suspicious of links and e-mails,"<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">he says. "In terms of forward trends, I see a continuous escalation of these<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">
attacks. People are being compromised every day and I'm getting examples on<br>
</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">a daily basis."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Experts say that if Beijing is not responsible for the attacks, it has a<br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">responsibility to shut down hackers working within its borders.<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">"I have never and still don't make the claim that it was the government,"<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Hom says. "But if China insists on internet sovereignty and sovereignty over<br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">its territory, it has to take responsibility for these kinds of cyber<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">attacks. It has to show the international community that it has taken steps<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

to investigate, track down and end these attacks."<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">Rebecca MacKinnon<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Schwartz Senior Fellow, New America Foundation<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Co-founder, <a href="http://GlobalVoicesOnline.org" target="_blank">GlobalVoicesOnline.org</a><br></blockquote>

</blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Cell: +1-617-939-3493<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

E-mail: <a href="mailto:rebecca.mackinnon@gmail.com" target="_blank">rebecca.mackinnon@gmail.com</a><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Blog: <a href="http://RConversation.blogs.com" target="_blank">http://RConversation.blogs.com</a><br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">Twitter: <a href="http://twitter.com/rmack" target="_blank">http://twitter.com/rmack</a><br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

</blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">____________________________________________________________<br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">You received this message as a subscriber on the list:<br></blockquote></blockquote></blockquote><blockquote type="cite">

<blockquote type="cite"><blockquote type="cite">     <a href="mailto:governance@lists.cpsr.org" target="_blank">governance@lists.cpsr.org</a><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite">To be removed from the list, send any message to:<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">     <a href="mailto:governance-unsubscribe@lists.cpsr.org" target="_blank">governance-unsubscribe@lists.cpsr.org</a><br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

For all list information and functions, see:<br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">     <a href="http://lists.cpsr.org/lists/info/governance" target="_blank">http://lists.cpsr.org/lists/info/governance</a><br>

</blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">

Translate this email: <a href="http://translate.google.com/translate_t" target="_blank">http://translate.google.com/translate_t</a><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite">

<blockquote type="cite"><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><br></blockquote></blockquote>

<blockquote type="cite"><br></blockquote><br>-- <br><br>Carlos A. Afonso<br><a href="http://CGI.br" target="_blank">CGI.br</a> (<a href="http://www.cgi.br" target="_blank">www.cgi.br</a>)<br>Nupef (<a href="http://www.nupef.org.br" target="_blank">www.nupef.org.br</a>)<br>

====================================<br>new/nuevo/novo e-mail: <a href="mailto:ca@cafonso.ca" target="_blank">ca@cafonso.ca</a><br>====================================<br>____________________________________________________________<br>

You received this message as a subscriber on the list:<br>    <a href="mailto:governance@lists.cpsr.org" target="_blank">governance@lists.cpsr.org</a><br>To be removed from the list, send any message to:<br>    <a href="mailto:governance-unsubscribe@lists.cpsr.org" target="_blank">governance-unsubscribe@lists.cpsr.org</a><br>

<br>For all list information and functions, see:<br>    <a href="http://lists.cpsr.org/lists/info/governance" target="_blank">http://lists.cpsr.org/lists/info/governance</a><br><br>Translate this email: <a href="http://translate.google.com/translate_t" target="_blank">http://translate.google.com/translate_t</a><br>

</div></blockquote></div><font color="#888888"><br><div>
Rebecca MacKinnon<br>Schwartz Senior Fellow, New America Foundation<br>Co-founder, <a href="http://GlobalVoicesOnline.org" target="_blank">GlobalVoicesOnline.org</a><br>Cell: +1-617-939-3493<br>E-mail: <a href="mailto:rebecca.mackinnon@gmail.com" target="_blank">rebecca.mackinnon@gmail.com</a><br>

Blog: <a href="http://RConversation.blogs.com" target="_blank">http://RConversation.blogs.com</a><br>Twitter: <a href="http://twitter.com/rmack" target="_blank">http://twitter.com/rmack</a><br><br>
</div>
<br></font></div></div></div><br>_______________________________________________<br>
liberationtech mailing list<br>
<a href="mailto:liberationtech@lists.stanford.edu">liberationtech@lists.stanford.edu</a><br>
<br>
Should you need to change your subscription options, please go to:<br>
<br>
<a href="https://mailman.stanford.edu/mailman/listinfo/liberationtech" target="_blank">https://mailman.stanford.edu/mailman/listinfo/liberationtech</a><br>
<br></blockquote></div><br>