I. What’s Going On
Corporations are taking advantage of these times by changing their privacy policies so that they can track us, use us, and sell us whatever their algorithms decide that we need or want based on data they have acquired about our movements, contacts, desires, fantasies, or kinks. Governments on the other hand are using our data to make sure that we will never acquire enough power to change any policies that we deem to be a threat to our happiness, livelihood, or survival. In essence, we are at war with these organizations and we should act as such:
“…this is truly unprecedented in history. And what we’re seeing is secrecy and surveillance are completely subverting security and liberty, not just in the United States, but for many, many citizens around the world.”
In a sign of things to come for the U.S. tech industry, Ladar Levison, the owner of Lavabit, the secure private encrypted email provider that shut down after 10 years of operation (2, 3) because he decided not to abide by the demands made by the United States government to spy on their 400,000 plus users, explains that if he loses his case against the U.S. government he will most likely hand over his company to someone overseas and let them run it. It’s important to note that the U.S. government already new that this would be the end result, that revelations about NSA’s PRISM program would hurt American Technology companies, but they didn’t really care.
Levison clarifies his position in the following interview on Democracy Now!. The segment in which he makes these comments occurs at approximately the 11 minute mark, but the whole interview is well worth watching, especially the part just before these comments where he explains how the U.S. government is “remotely loading malware onto people’s computers without any kind of restriction, restraint or oversight.”
Being from Canada, interested in technology and the markets, and a privacy advocate, BlackBerry, formerly known as Research In Motion (RIM), has been on my radar for a number of years, so I would like to add my two cents regarding its demise (2, 3, 4, 5).
The two most important things we need to keep in mind about the “timeline of the company from RIM to Blackberry” are that: first, “when phone systems failed in New York and DC on 9/11, it was the BlackBerry network that provided backup communication”; second, contrary to popular belief, apps were never meant to be the feature selling point for its products, it was its security and privacy, the way it encrypted communication across its network that made it the only game in town.
In 2010, when governments threatened to “block encrypted BlackBerry corporate e-mail and messaging services if its security agencies were not granted access to them”, BlackBerry’s reply was:
“RIM also said it has drawn a firm line by insisting that any capabilities it provides to carriers for ‘lawful’ access purposes be limited by four main principles: Such access has to be legal, it must not exceed access imposed on RIM's competitors, it does not change the security architecture for Blackberry enterprise customers, and does not require a country-specific deal that does not conform to RIM's global standard for lawful access.”
By Rady Ananda
A single smart meter measuring a home’s electricity usage, by appliance, emits radiation 100 times higher than the level internationally recognized as “extreme concern” and 450 times higher than a cell phone.
It’s not the act of revealing secrets that has gotten Edward Snowden in trouble, after all, members of the Bush Administration did exactly that in the Plame affair as did members of the Obama Administration by leaking the drone memo. Leaking classified documents doesn’t always lead to prosecution, on the contrary, sometimes it leads to advancement of personal agendas:
“Does the rule of law demand that leaks of highly classified information be prosecuted? If so, John Brennan and many other current and former national-security officials had better be given orange jumpsuits. They weren't even leaking to alert Americans to behavior that they found immoral. Often times, the U.S. national security establishment leaks to exploit a political advantage.”
By Steve Scheetz and Rady Ananda
Since September 11, 2001, the US government has been operating with a demand for the understanding of the people. We, as part of this demand, are to allow certain limitations on our liberty in order to gain a certain level of security. But, given the questionable nature of what are likely exaggerated threats, coupled with Congressional enrichment from these expensive security technologies, the U.S. public is losing both liberty and security, as well as money.
Former director of Homeland Security Tom Ridge revealed details about how terrorism alerts are used. Among other things, Ridge admits that he was pressured to raise the terror alert to help Bush win re-election in 2004. According to the Associated Press, “He said the episode convinced him to follow through with his plans to leave the administration; he resigned on Nov. 30, 2004.”
By Rady Ananda
"Is that a Pistole in your pocket, Nappy, or are you just happy to see us?"
In response to public and pilot outrage at sexual assault by transportation security authorities and to the carcinogenic x-ray machines used to scan flyers, New Jersey lawmakers announced on Monday the introduction of several resolutions banning such practices.
Additionally, the U.S. Senate Subcommittee on Aviation Operations, Safety, and Security is holding a Transportation Security Administration Oversight Hearing today (10 AM Wednesday).
By Rady Ananda
At the San Diego International Airport yesterday, about one-fifth of the travelers were selected for sexual assault by transportation security agents. Though TSA’s website did not list SAN as one of the airports employing the carcinogenic naked scan or a full body rub down, one man was told his refusal to submit would result in a civil law suit and a $10,000 fine. Under 49 CFR Sec.s 1540.105 and 1540.107, as summarized in these 2004 TSA Sanction Guidelines, apparently TSA has Congressional support to fine people for refusing to submit to molestation.
John Tyner posted his video of the incident and described in detail the experience. At about 3:50 into the first video, Tyner tells TSA agents:
“If you touch my junk, I’m gonna have you arrested.”
By Rady Ananda
Are transportation security authorities looking for terrorists or a hard on? Why would 19 agents and police officers need to handle -- and watch -- a 20-something woman who happens to be 'smoking hot' get her breasts squeezed and twisted?
By Rady Ananda
What France has done with its ban on the face veil is deem protection from a statistically remote threat (terrorists dressing in veils) superior to freedom of expression, freedom of religion, and freedom of dissent. The excuse of national security is not supported by the facts, so what can be the real reason for the ban?
The popular notion that anti-Semitism caused the Zionist movement makes the mistake of post hoc ergo propter hoc - "after the fact, therefore because of the fact."
Sixty-six years ago, on November 29, 1947, the United Nations General Assembly adopted resolution 181, which partitioned the land of Palestine into two States: the “birth certificate” for Israel, and the “death certificate” for Palestine.
Native Americans held a special knowledge of the land and its inhabitants, and believed they were only a small part of the whole circle of life, and that each part of creation played a significant role in the contentment and survival of the other.
The assassination of the President of the United States on national television by the “lone” assassin, Lee Harvey Oswald—who according to authorities used an obsolete bolt-action WWI rifle that was not capable of firing bullets fast enough to wound John F. Kennedy—who is then assassinated the next day by another “lone” assassin, is so stupid that whoever is behind the assassination didn’t expect you to believe it.
|Your donation helps provide a place for people to speak out. thepeoplesvoice.org P.O. Box 159113 Nashville, TN 37215 Not tax deductible. firstname.lastname@example.org|
|Articles and Writers||Old TPV|
|<< <||> >>|