Library Freedom Project

Last updated
Library Freedom Project
Formation2015;9 years ago (2015)
Type Nonprofit
Legal statusprofessional organization
Purposeprivacy advocacy, community building, librarianship
Director
Alison Macrina
Deputy Director
Tess Wilson
Website https://libraryfreedom.org/

Library Freedom Project's stated mission, "is radically rethinking the library professional organization by creating a network of values-driven librarian-activists working together to build information democracy." [1]

Contents

Library Freedom Project (LFP) trains librarians in different community contexts (e.g. public, academic, rural libraries, and urban libraries) to inform their communities about issues related to privacy and security online. Library Freedom Institute (LFI) is LFPs training arm, offering educational opportunities for librarians, ongoing community-building, workshops, webinars, and committee work around specialized topics and sectors of librarianship.

Funding

In January 2015 Library Freedom Project received a $244,700 [2] grant from Knight Foundation. [3] Then, inJanuary 2016 was awarded $50,000 from the Rose Foundation's Consumer Privacy Rights Fund. [4]

In August 2017 the Library Freedom Project was awarded a $249,504 grant from the Institute of Museum and Library Services' (IMLS) Laura Bush 21st Century Librarian Program to facilitate the use of practical privacy tools in libraries. Forty geographically-dispersed librarians participated in a six-month training course to become Privacy Advocates. [5] New York University (NYU) and Library Freedom Project developed a formal collaborative program funded by the Institute of Museum and Library Services (IMLS) in June 2018 called "Library Freedom Institute." [6]

By 2022, the Library Freedom Project built on its funding base by securing $1 million dollars from the Mellon Foundation under its Public Knowledge Program. [7]

Library Freedom Institute

Library Freedom Institute (LFI) is "a free, privacy-focused... program for librarians to teach them the skills necessary to thrive as Privacy Advocates." Privacy Advocates conduct workshops to educate community members in basic online security skills to advocate for their communities through public policy. [8]

LFI's format updates for each cohort's training, which lasts from four to six months. Topics include technology, online privacy, community building, media, activism, and education. At the end of the course, participants create capstone projects for use by the wider LFP community of librarians for teaching and research dissemination. As of July 2020, there have been four cohorts of Library Freedom Institute with over 100 graduates from the program.

Since its inception, the Library Freedom Institute has been supported by grants from the Institute of Museum and Library Services.

Workshops

The director of the Library Freedom Project, Alison Macrina, at unBound, the technology lab and maker space of the Meridian Library District in Idaho, shortly after giving a privacy workshop in January 2016. The logos are those of assorted privacy enhancing technologies, institutions and advocacy groups such as the Tor project, the Electronic Freedom Foundation, Privacy Badger and Noisebridge LibraryFreedomProjectStickerSwag.jpg
The director of the Library Freedom Project, Alison Macrina, at unBound, the technology lab and maker space of the Meridian Library District in Idaho, shortly after giving a privacy workshop in January 2016. The logos are those of assorted privacy enhancing technologies, institutions and advocacy groups such as the Tor project, the Electronic Freedom Foundation, Privacy Badger and Noisebridge

Working with American Civil Liberties Union (ACLU) affiliates across the United States, Library Freedom Project provides workshops to educate librarians about "some of the major surveillance programs and authorizations, including the USA PATRIOT Act, section 702 of the FISA Amendments Act, PRISM, XKEYSCORE, and more, connecting the NSA’s dragnet with FBI and local police surveillance". [9] They also discuss current and developing privacy law on both the federal and state levels, in addition to advising librarians how to handle issues like gag orders and National Security Letters. Other topics covered include Privacy Enhancing Technology (PET) that might help library patrons browse anonymously or evade online tracking.

Furthermore, LFP conducts classes for library patrons that focus on on-line security and privacy. Privacy Advocate librarians adapt materials and topics to accommodate every user, from beginner to advanced, to determine their privacy needs. [10] Library patrons, including but not limited to domestic violence survivors, political activists, whistle blowers, journalists, and LGBTQ teens or adults, require different approaches to privacy. LFP Director Alison Macrina observes that, "Digital security isn’t about which tools you use; rather, it’s about understanding the threats you face and how you can counter those threats. To become more secure, you must determine what you need to protect, and whom you need to protect it from. Threats can change depending on where you’re located, what you’re doing, and whom you’re working with." [11]

Tor Exit Relay Project

Library Freedom Project is a member of the torservers.net network, an organization of nonprofits which specializes in the general establishment of exit nodes via workshops and donations. [12] Tor's pilot project [13] enabled the Kilton Public Library in Lebanon, New Hampshire to become in July 2015 the first library in the United States to host Tor, running a middle relay on its excess bandwidth. This service was put on hold in early September, however, when the library was visited by the local police department after they had received a "heads up" e-mail from Department of Homeland Security highlighting the criminal uses of the Tor network (and which falsely claimed that this was the network's primary usage), [14] whereupon the library began reconsidering the deployment from a public relations perspective. [15] [16] [17]

After an outpouring of support from the Electronic Frontier Foundation, the Massachusetts and New Hampshire affiliates of the ACLU, the Tor Project itself, an editorial in the local paper Valley News strongly in favor of the pilot project, [18] and virtually unanimous public testimony, the library board of trustees decided on 15 September 2015 to renew the anonymity service, letting stand its previous unanimous vote to establish the middle relay. [19] [20] A dozen libraries and their supporters nationwide expressed interest hosting their own nodes after the DHS involvement became public (an example of the Streisand effect), [21] [22] and U.S. Rep. Zoe Lofgren (D-Calif) released a letter on 10 December 2015, in which she asked the DHS to clarify its procedures, stating that “While the Kilton Public Library’s board ultimately voted to restore their Tor relay, I am no less disturbed by the possibility that DHS employers are pressuring or persuading public and private entities to discontinue or degrade services that protect the privacy and anonymity of U.S. citizens.” [23] [24] [25]

In March 2016, New Hampshire state representative Keith Ammon introduced a bill [26] allowing public libraries to run privacy software such as Tor which specifically referenced Tor itself. The bill was crafted with extensive input from Library Freedom director Alison Macrina, and was the direct result of the Kilton Public Library imbroglio. [27] The bill was passed by the House 268-62. [28]

Also in March 2016, the first Tor middle relay at a library in Canada was established, at the University of Western Ontario. [29] Given that the running of a Tor exit node is an unsettled area of Canadian law, [30] and that institutions are more capable than individuals to cope with legal pressures, Alison Macrina has opined that in some ways she would like to see intelligence agencies and law enforcement attempt to intervene in the event that an exit node were established. [31]

Also in March 2016, the Library Freedom Project was awarded the Free Software Foundation's 2015 Free Software Award for Projects of Social Benefit at MIT. [32]

As of 26 June 2016, the Kilton Library is the only library in the U.S. running a Tor exit node. [33] However, in August of that same year, Kilton Library's IT Manager, Chuck McAndrew, said they still hoped other libraries would run their own, adding, "We always planned on our library simply being the pilot for a larger nationwide program. Like everything, this will take time. We continue to talk to other libraries, and the Library Freedom Project is actively working with a number of libraries that have an interest in participating." [34]

Related Research Articles

A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated with the establishment of an electronic mailing list, through which informal groups sought to achieve privacy and security through proactive use of cryptography. The cypherpunk movement has been active since about 1990 at the latest.

The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission is to "secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation." EPIC believes that privacy is a fundamental right, the internet belongs to people who use it, and there's a responsible way to use technology.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely. The software that implements this layer is called an "I2P router", and a computer running I2P is called an "I2P node". I2P is free and open sourced, and is published under multiple licenses.

<span class="mw-page-title-main">FSF Free Software Awards</span>

The Free Software Foundation (FSF) grants two annual awards. Since 1998, FSF has granted the award for Advancement of Free Software and since 2005, also the Free Software Award for Projects of Social Benefit.

<span class="mw-page-title-main">EFF Pioneer Award</span>

The EFF Award, formerly EFF Pioneer Award, is an annual prize by the Electronic Frontier Foundation (EFF) for people who have made significant contributions to the empowerment of individuals in using computers.

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage. The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.

<span class="mw-page-title-main">.onion</span> Pseudo–top-level internet domain

.onion is a special-use top-level domain name designating an anonymous onion service, which was formerly known as a "hidden service", reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the Tor network.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

<span class="mw-page-title-main">Tails (operating system)</span> Linux distribution for anonymity and privacy

Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.

The Calyx Institute is a New York-based 501(c)(3) research and education nonprofit organization formed to make privacy and digital security more accessible. It was founded in 2010 by Nicholas Merrill, Micah Anderson, and Kobi Snitz.

<span class="mw-page-title-main">The Tor Project</span> Free and open-source software project for enabling anonymous communication

The Tor Project, Inc. is a 501(c)(3) research-education nonprofit organization based in Winchester, Massachusetts. It is founded by computer scientists Roger Dingledine, Nick Mathewson, and five others. The Tor Project is primarily responsible for maintaining software for the Tor anonymity network.

<span class="mw-page-title-main">Ricochet (software)</span> Instant messaging software

Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisible.im group is to help people maintain privacy by developing a "metadata free" instant messaging client.

torservers.net is an independent network of non-profit organisations that provide nodes to the Tor anonymity network. The network started in June 2010 and currently transfers up to 7.4 GB/s (~59.2 Gb/s) of exit node traffic as of May 2022.

<span class="mw-page-title-main">Keith Ammon</span> American politician

Keith Ammon is an American politician. He is a member of the New Hampshire House of Representatives, representing the Hillsborough 40th District from 2014 to 2018 and re-elected in 2020.

<span class="mw-page-title-main">Alison Macrina</span> Librarian and Director of the Library Freedom Project.

Alison Macrina is a librarian, internet activist, founder and executive director of the Library Freedom Project.

<span class="mw-page-title-main">Snowflake (software)</span> Anti-censorship software

Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake relay nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake node can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake relay. The node runs whenever the browser or program is connected to the internet.

References

  1. "LFP Values – Library Freedom" . Retrieved 2024-07-01.
  2. "The heroes who saved the Internet in 2015 - The Daily Dot". The Daily Dot . 31 December 2015.
  3. "The Library Freedom Project". Knight Foundation. Retrieved 2015-09-16.
  4. "LFP wins Rose Foundation funding – Library Freedom Project". libraryfreedomproject.org.
  5. "RE-95-17-0076-17". Institute of Museum and Library Services. 2017-08-31. Retrieved 2017-08-31.
  6. Macrina, Alison (2017-12-22). "New Program Turns Librarians into Privacy Advocates". The Tor Project. Retrieved 2018-01-25.
  7. "Mellon Foundation". www.mellon.org. Retrieved 2024-10-09.
  8. "Library Freedom Institute – Library Freedom" . Retrieved 2020-07-07.
  9. "Workshops – Library Freedom Project". libraryfreedomproject.org. Retrieved 2015-11-10.
  10. "Community classes – Library Freedom Project". libraryfreedomproject.org. Retrieved 2015-11-10.
  11. Enis, Matt (2016-03-31). "Library Freedom Project, NYCLU Discuss Privacy and Online Security". Library Journal. Retrieved 2016-05-03.
  12. Steele, Sharon. "Tor at the Heart: Torservers.net".
  13. "Lebanon library at center of internet privacy debate in shutting off its Tor server". Concord Monitor. 2015-09-11. Archived from the original on 2015-09-30. Retrieved 2015-09-16.
  14. "Letter to Kilton Library, signed by Library Freedom Project, ACLU, EFF, and significant others" (PDF). Library Freedom Project. 2015-09-02. Retrieved 2016-01-15.
  15. Angwin, Julia (2015-09-10). "First Library to Support Tor Anonymous Internet Browsing Effort Stops After DHS Email". ProPublica. Retrieved 2015-09-16.
  16. "Support Tor and Intellectual Freedom in Libraries | EFF Action Center". Act.eff.org. Retrieved 2015-09-16.
  17. "First Library To Support Anonymous Internet Browsing Halts Project After DHS Email - Slashdot". Yro.slashdot.org. 2015-09-11. Retrieved 2015-09-16.
  18. "Editorial: Privacy Concerns and the Kilton Library | Valley News". Vnews.com. Archived from the original on 2015-09-21. Retrieved 2015-09-16.
  19. Glaser, April (2015-09-11). "How New Hampshire's Lebanon Libraries fought back against DHS fearmongering about Tor". Slate.com. Retrieved 2015-09-16.
  20. "Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library | Valley News". Vnews.com. 2015-06-15. Archived from the original on 2015-09-18. Retrieved 2015-09-16.
  21. "Small town library stands up to government scare tactic aimed at digital privacy tool". Radio Free. 2015-09-16. Retrieved 2015-09-21.
  22. "SCREW YOU, FEDS! Dozen or more US libraries line up to run Tor exit nodes". Theregister.co.uk. Retrieved 2015-09-21.
  23. "Congresswoman Zoe Lofgren". Congresswoman Zoe Lofgren.
  24. "Rep. Zoe Lofgren wants to know if DHS is sabotaging plans for Tor exit relays". The Daily Dot . 11 December 2015.
  25. "Congresswoman Asks Feds Why They Pressured a Library to Disable Its Tor Node". 12 December 2015.
  26. "The General Court of New Hampshire | 404".
  27. O'Neill, Patrick (2016-03-10). "New Hampshire bill allows for libraries' usage of encryption and privacy software". The Daily Dot. Retrieved 2016-03-10.
  28. "New Hampshire HB1508 - 2016 - Regular Session".
  29. "Library in FIMS joins global network fighting back against digital surveillance, censorship, and the obstruction of information". FIMS News. 2016-03-16. Retrieved 2016-03-16.
  30. Pearson, Jordan (2016-09-25). "Can You Be Arrested for Running a Tor Exit Node In Canada?". Motherboard. Retrieved 2016-03-16.
  31. Pearson, Jordan (2016-03-16). "Canadian Librarians Must Be Ready to Fight the Feds on Running a Tor Node". Motherboard. Retrieved 2016-03-16.
  32. "Library Freedom Project and Werner Koch are 2015 Free Software Awards winners". Free Software Foundation. March 19, 2016. Archived from the original on March 20, 2016. Retrieved July 6, 2022.
  33. "Browse free or die? New Hampshire library is at privacy fore". Associated Press . AP. 2016-06-26. Retrieved 2016-06-26.
  34. "Tor crusader discuss privacy, freedom with ExpressVPN". Home of internet privacy. 2016-08-04. Retrieved 2017-08-31.