Browsed by
Tag: PRISM

Why Won’t They Tell Us the Truth About NSA Spying? – Article by Ron Paul

Why Won’t They Tell Us the Truth About NSA Spying? – Article by Ron Paul

The New Renaissance Hat
Ron Paul
August 10, 2013
******************************
In 2001, the Patriot Act opened the door to US government monitoring of Americans without a warrant. It was unconstitutional, but most in Congress over my strong objection were so determined to do something after the attacks of 9/11 that they did not seem to give it too much thought. Civil liberties groups were concerned, and some of us in Congress warned about giving up our liberties even in the post-9/11 panic. But at the time most Americans did not seem too worried about the intrusion.
***

This complacency has suddenly shifted given recent revelations of the extent of government spying on Americans. Federal politicians and bureaucrats are faced with serious backlash from Americans outraged that their most personal communications are intercepted and stored. They had been told that only the terrorists would be monitored. In response to this anger, defenders of the program have time and again resorted to spreading lies and distortions. But these untruths are now being exposed very quickly.

In a Senate hearing this March, Director of National Intelligence James Clapper told Senator Ron Wyden that the NSA did not collect phone records of millions of Americans. This was just three months before the revelations of an NSA leaker made it clear that Clapper was not telling the truth. Pressed on his false testimony before Congress, Clapper apologized for giving an “erroneous” answer but claimed it was just because he “simply didn’t think of Section 215 of the Patriot Act.” Wow.

As the story broke in June of the extent of warrantless NSA spying against Americans, House Intelligence Committee Chairman Mike Rogers assured us that the project was a strictly limited and not invasive. He described it as a “lockbox with only phone numbers, no names, no addresses in it, we’ve used it sparingly, it is absolutely overseen by the legislature, the judicial branch and the executive branch, has lots of protections built in…”

But we soon discovered that also was not true either. We learned in another Guardian newspaper article last week that the top secret “X-Keyscore” program allows even low-level analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”

The keys to Rogers’ “lockbox” seem to have been handed out to everyone but the janitors! As Chairman of the Committee that is supposed to be most in the loop on these matters, it seems either the Intelligence Community misled him about their programs or he misled the rest of us. It sure would be nice to know which one it is.

Likewise, Rep. Rogers and many other defenders of the NSA spying program promised us that this dragnet scooping up the personal electronic communications of millions of Americans had already stopped “dozens” of terrorist plots against the United States. In June, NSA director General Keith Alexander claimed that the just-disclosed bulk collection of Americans’ phone and other electronic records had “foiled 50 terror plots.”

Opponents of the program were to be charged with being unconcerned with our security.

But none of it was true.

On August 3, 2013, the Senate Judiciary Committee heard dramatic testimony from NSA deputy director John C. Inglis. According to the Guardian:

“The NSA has previously claimed that 54 terrorist plots had been disrupted ‘over the lifetime’ of the bulk phone records collection and the separate program collecting the internet habits and communications of people believed to be non-Americans. On Wednesday, Inglis said that at most one plot might have been disrupted by the bulk phone records collection alone.”

From dozens to “at most one”?

Supporters of these programs are now on the defensive, with several competing pieces of legislation in the House and Senate seeking to rein in an administration and intelligence apparatus that is clearly out of control. This is to be commended. What is even more important, though, is for more and more and more Americans to educate themselves about our precious liberties and to demand that their government abide by the Constitution. We do not have to accept being lied to – or spied on — by our government.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

Internet Fascism and the Surveillance State – Article by Ben O’Neill

Internet Fascism and the Surveillance State – Article by Ben O’Neill

The New Renaissance Hat
Ben O’Neill
July 16, 2013
******************************

What is the purpose of telecommunication and internet surveillance?

The NSA presents its surveillance operations as being directed toward security issues, claiming that the programs are needed to counter terrorist attacks. Bald assertions of plots foiled are intended to bolster this claim.[1] However, secret NSA documents reveal that their surveillance is used to gather intelligence to achieve political goals for the US government. Agency documents show extensive surveillance of communications from allied governments, including the targeting of embassies and missions.[2] Reports from an NSA whistleblower also allege that the agency has targeted and intercepted communications from a range of high-level political and judicial officials, anti-war groups, US banking firms and other major companies and non-government organizations.[3] This suggests that the goal of surveillance is the further political empowerment of the NSA and the US government.

Ostensibly, the goal of the NSA surveillance is to prevent terrorist acts that would harm or kill people in the United States. But in reality, the primary goal is to enable greater control of that population (and others) by the US government. When questioned about this issue, NSA whistleblower Thomas Drake was unequivocal about the goal of the NSA: “to own the internet and find out what everybody is doing.”[4]

“To own the internet” — Public-private partnerships in mass surveillance

The internet is, by its very nature, a decentralized arrangement, created by the interaction of many private and government servers operating on telecommunications networks throughout the world. This has always been a major bugbear of advocates for government control, who have denigrated this decentralized arrangement as being “lawless.” Since it began to expand as a tool of mass communication for ordinary people, advocates for greater government power have fought a long battle to bring the internet “under control” — i.e., under their control.

The goal of government “ownership of the internet” entails accessing the facilities that route traffic through the network. This is gradually being done through government control of the network infrastructure and the gradual domination of the primary telecommunications and internet companies that provide the facilities for routing traffic through the network. Indeed, one noteworthy aspect of the mass surveillance system of the NSA is that it has allegedly involved extensive cooperation with many “private” firms operating under US law. This has allegedly included major security, telecommunications and internet companies, as well as producers of network software and hardware.

Examples of such “public-private partnerships” are set out in leaked documents of the NSA. An unnamed US telecommunications company is reported to provide the NSA with mass surveillance data on the communications of non-US people under its FAIRVIEW program.[5] Several major computing and internet companies have also been explicitly named in top secret internal NSA material as being current providers for the agency under its PRISM program.[6] Several of these companies have issued denials disavowing any participation in, or prior knowledge of the program, but this has been met with some scepticism.[7] (Indeed, given that the NSA did not anticipate public release of its own internal training material, it is unlikely that the agency would have any cause to lie about the companies they work with in this material. This suggests that the material may be accurate.)

Many of these companies have supplied the NSA with data from their own customers, or created systems which allow the agency access to the information flowing through telecommunications networks. They have done so without disclosure to their own customers of the surveillance that has occurred, by using the blanket advisement that they “comply with lawful requests for information.” By virtue of being subject to the jurisdiction of US statutes, all of these companies have been legally prohibited from discussing any of their dealings with the NSA and they have been well placed for retaliatory action by the many regulatory agencies of the US government if they do not cooperate. In any case, it appears from present reports that many companies have been active partners of the agency, assisting the NSA with illegal surveillance activities by supplying data under programs with no legitimate legal basis.

This has been a common historical pattern in the rise of totalitarian States, which have often sought to incorporate large business concerns into their network of power. Indeed, the very notion of “public-private partnerships” in this sector readily brings to mind the worst aspects of fascist economic systems that have historically existed. The actions of US companies that have cooperated in the NSA’s mass surveillance operations calls into question the “private” status of these companies. In many ways these companies have acted as an extension of the US government, providing information illegally, in exchange for privileges and intelligence. According to media reports, “Such cooperation is an extremely delicate issue for the companies involved. Many have promised their customers data confidentiality in their terms and conditions. Furthermore, they are obliged to follow the laws of the countries in which they do business. As such, their cooperation deals with the NSA are top secret. Even in internal NSA documents, they are only referred to by the use of code names.”[8]

We began this discussion by asking the purpose of telecommunication and internet surveillance. The answer lies in the uses to which those surveillance powers are being put, and will inevitably be put, as the capacity of the NSA expands. The true purpose of the NSA is not to keep us safe. Its goal is to own the internet, to own our communications, to own our private thoughts — to own us.

Ben O’Neill is a lecturer in statistics at the University of New South Wales (ADFA) in Canberra, Australia. He has formerly practiced as a lawyer and as a political adviser in Canberra. He is a Templeton Fellow at the Independent Institute, where he won first prize in the 2009 Sir John Templeton Fellowship essay contest. Send him mail. See Ben O’Neill’s article archives.

This article was published on Mises.org and may be freely distributed, subject to a Creative Commons Attribution United States License, which requires that credit be given to the author.

Notes

[1] Mathes, M. (2013) At least 50 spy programs foiled by terror plots: NSA . The Sydney Morning Herald, 19 June 2013.

[2] MacAskill, E. (2013) New NSA leaks show how US is bugging its European allies . The Guardian, 1 June 2013.

[3] Burghardt, T. (2013) NSA spying and intelligence collection: a giant blackmail machine and “warrantless wiretapping program.” Global Research , 24 June 2013. Reports are from NSA whistleblower Russ Tice, who is a former intelligence analyst at the NSA.

[4] Wolverton, J. (2012) Classified drips and leaks. The New American, 6 August 2012. Emphasis added. Capitalization of “Internet” removed.

[5] Greenwald, G. (2013) The NSA’s mass and indiscriminate spying on Brazilians . The Guardian, 7 July 2013.

[6] Gelman, B. and Poitras, L. (2013) US, British intelligence mining data from nine US internet companies in broad secret program . The Washington Post, 7 June 2013. See also NSA slides explain the PRISM data-collecting program . The Washington Post, 6 June 2013.

[7] McGarry, C. (2013) Page and Zuckerberg say NSA surveillance program is news to them . TechHive, 7 June 2013.

[8] Ibid Poitras, p. 3.

If You Like the Surveillance State, You’ll Love E-Verify – Article by Ron Paul

If You Like the Surveillance State, You’ll Love E-Verify – Article by Ron Paul

The New Renaissance Hat
Ron Paul
June 30, 2013
******************************

From massive NSA spying, to IRS targeting of the administration’s political opponents, to collection and sharing of our healthcare information as part of Obamacare, it seems every day we learn of another assault on our privacy. Sadly, this week the Senate took another significant, if little-noticed, step toward creating an authoritarian surveillance state. Buried in the immigration bill is a national identification system called mandatory E-Verify.

The Senate did not spend much time discussing E-Verify, and what little discussion took place was mostly bipartisan praise for its effectiveness as a tool for preventing illegal immigrants from obtaining employment. It is a tragedy that mandatory E-Verify is not receiving more attention, as it will impact nearly every American’s privacy and liberty.

The mandatory E-Verify system requires Americans to carry a “tamper-proof” Social Security card. Before they can legally begin a job, American citizens will have to show the card to their prospective employers, who will then have to verify their identity and eligibility to hold a job in the US by running the information through the newly created federal E-Verify database. The database will contain photographs taken from passport files and state driver’s licenses. The law gives federal bureaucrats broad discretion in adding other “biometric” identifiers to the database. It also gives the bureaucracy broad authority to determine what features the “tamper-proof” card should contain.

Regardless of one’s views on immigration, the idea that we should have to ask permission from the federal government before taking a job ought to be offensive to all Americans. Under this system, many Americans will be denied the opportunity for work. The E-Verify database will falsely identify thousands as “ineligible,” forcing many to lose job opportunities while challenging government computer inaccuracies. E-Verify will also impose additional compliance costs on American businesses, at a time when they are struggling with Obamacare implementation and other regulations.

According to David Bier of Competitive Enterprise Institute, there is nothing stopping the use of E-Verify for purposes unrelated to work verification, and these expanded uses could be authorized by agency rule-making or executive order. So it is not inconceivable that, should this bill pass, the day may come when you are not be able to board an airplane or exercise your Second Amendment rights without being run through the E-Verify database. It is not outside the realm of possibility that the personal healthcare information that will soon be collected by the IRS and shared with other federal agencies as part of Obamacare will also be linked to the E-Verify system.

Those who dismiss these concerns as paranoid should consider that the same charges were leveled at those who warned that the PATRIOT Act could lead to the government collecting our phone records and spying on our Internet usage. Just as the PATRIOT Act was only supposed to be used against terrorists but is now used to bypass constitutional protections in matters having noting to do with terrorism or national security, the national ID/mandatory E-Verify database will not only be used to prevent illegal immigrants from gaining employment. Instead, it will eventually be used as another tool to monitor and control the American people.

The recent revelations of the extent of National Security Agency (NSA) spying on Americans, plus recent stories of IRS targeting Tea Party and similar groups for special scrutiny, demonstrates the dangers of trusting government with this type of power. Creation of a federal database with photos and possibly other “biometric” information about American citizens is a great leap forward for the surveillance state. All Americans who still care about limited government and individual liberty should strongly oppose E-Verify.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

The Eyes Watching You: “1984” and the Surveillance State – Article by Sarah Skwire

The Eyes Watching You: “1984” and the Surveillance State – Article by Sarah Skwire

The New Renaissance Hat
Sarah Skwire
June 19, 2013
******************************

George Orwell. 1984. New York: Plume, [1949] 2003. 323 pages.

In the kind of horrifying coincidence that surely would have prompted one of his more acerbic essays, the news that various U.S. government surveillance agencies have been gathering data from millions of citizens’ phones, email accounts, and web searches broke during the week of the 64th publication anniversary of George Orwell’s 1984. As the news reports poured in, and as sales of 1984 surged by an astonishing 6,884 percent, a friend asked me whether the PRISM story strikes me as more Orwellian or more Kafkaesque.

My response? We’d better hope it’s Kafkaesque.

No one wants to inhabit a Franz Kafka novel. But the surveillance states he describes do have one thing going for them—incompetence. In Kafka’s stories, important forms get lost, permits are unattainable, and bureaucrats fail to do their jobs. Like the main character in Kafka’s unfinished story, “The Castle,” if you were trapped in Kafka’s world you could live your whole life doing nothing but waiting for a permit. But at least you could live. Incompetence creates a little space.

What is terrifying about Orwell’s 1984 is the complete competence of the surveillance state. Winston Smith begins the novel by believing he is in an awful, but Kafkaesque world where there is still some slippage in the state’s absolute control, and still some room for private action. Winston says that Oceania’s world of telescreens and Thought Police means that there are “always the eyes watching you and the voice enveloping you. Asleep or awake, working or eating, indoors or out of doors, in the bath or in bed—no escape.” But he follows that by saying, “Nothing was your own except the few cubic centimeters inside your skull.” He also believes that while the diary he keeps will inevitably be discovered, the small alcove in his apartment where he writes his diary puts him “out of the range of the telescreen.”

The feeling that some tiny space for private thought and action can be found leads Winston into his relationship with Julia. Though they know they will inevitably be discovered, Winston and Julia believe that, for a time, their relationship and their meeting place will remain secret. They could not be more wrong.

One day after making love to Julia in their clandestine room, Winston, prompted by a singing thrush and a singing prole woman who is doing laundry, has a vision of a future that “belongs to the proles.”

The birds sang, the proles sang. The Party did not sing. All round the world, in London and New York, in Africa and Brazil, and in the mysterious, forbidden lands beyond the frontiers, in the streets of Paris and Berlin, in the villages of the endless Russian plain, in the bazaars of China and Japan—everywhere stood the same solid unconquerable figure, made monstrous by work and childbearing, toiling from birth to death and still singing. Out of those mighty loins a race of conscious beings must one day come. You were the dead; theirs was the future. But you could share in that future if you kept alive the mind as they kept alive the body.

 

In this very moment, just as Winston comes alive to what feels like hope and possibility and the dream of some kind of a future for humankind, the telescreen that has been hidden in the room all along speaks to Winston and Julia. The Thought Police break down the door. The couple is taken off to be imprisoned, tortured, and broken.

There has never been any private space for Winston or Julia—not in their “secret” meeting places, not in their sexual rebellion, not even in the few cubic centimeters inside their skulls. “For seven years the Thought Police had watched him like a beetle under a magnifying glass. There was no physical act, no word spoken aloud, that they had not noticed, no train of thought that they had not been able to infer.” Winston should have taken more seriously the description of Oceania he read in the forbidden book The Theory and Practice of Oligarchical Collectivism, by Emmanuel Goldstein:

A Party member lives from birth to death under the eye of the Thought Police. Even when he is alone he can never be sure that he is alone. Wherever he may be, asleep or awake, working or resting, in his bath or in bed, he can be inspected without warning and without knowing that he is being inspected. Nothing that he does is indifferent. His friendships, his relaxations, his behaviour towards his wife and children, the expression of his face when he is alone, the words he mutters in sleep, even the characteristic movements of his body, are all jealously scrutinized. Not only any actual misdemeanour, but any eccentricity, however small, any change of habits, any nervous mannerism that could possibly be the symptom of an inner struggle, is certain to be detected.
***

The Orwellian surveillance state is terrifying not because—as in Kafka—you might be arrested because of a rumor or a mistake, or because despite your innocence you might be caught in the surveillance state’s unnavigable maze. It is terrifying because it never makes mistakes. It does not need to listen to rumors. And it knows that no one is ever innocent.

Sarah Skwire is a fellow at Liberty Fund, Inc. She is a poet and author of the writing textbook Writing with a Thesis.

This article was originally published by The Foundation for Economic Education.

 

Universal Surveillance: PRISM and the Litmus Test for Liberty – Video by G. Stolyarov II

Universal Surveillance: PRISM and the Litmus Test for Liberty – Video by G. Stolyarov II

 Will enough Americans respond with outrage and exercise their First Amendment rights to bring an end to the totalitarianism-enabling NSA PRISM surveillance system?

References
Petition to Pardon Edward Snowden
– “Rand Paul planning class action lawsuit against surveillance programs” – Aaron Blake – The Washington Post – June 9, 2013
– “In the Face of Universal Surveillance: PRISM and the Litmus Test for Liberty” – Essay by G. Stolyarov II
– “PRISM (surveillance program)” – Wikipedia
– “Edward Snowden: the whistleblower behind the NSA surveillance revelations” – Glenn Greenwald, Ewen MacAskill and Laura Poitras – The Guardian – June 9, 2013
– “Google, Apple, Facebook & AOL Deny Participating In Alleged NSA “PRISM” Program” – Danny Sullivan – Marketing Land – June 6, 2013
Project Meshnet
DuckDuckGo
– “How Scared of Terrorism Should You Be?” – Ronald Bailey – Reason Magazine – September 6, 2011
– “Futile Temporary Totalitarianism in Boston” – Article by G. Stolyarov II
– “Russian politico: U.S. ignored Tsarnaev intelligence at its own peril” – By Cheryl K. Chumley – The Washington Times – June 4, 2013

In the Face of Universal Surveillance: PRISM and the Litmus Test for Liberty – Article by G. Stolyarov II

In the Face of Universal Surveillance: PRISM and the Litmus Test for Liberty – Article by G. Stolyarov II

The New Renaissance Hat
G. Stolyarov II
June 11, 2013
******************************

Ladies and gentlemen, most of what do you using the Internet or your phone is being tracked by the National Security Agency via its PRISM surveillance program.  If you thought you could take measures to escape such monitoring, it is too late; the program has been operating, clandestinely, since 2007. It took the heroic courage of Edward Snowden, a former CIA and Booz Allen Hamilton employee with access to information about the full depths of this travesty, to reveal this astoundingly invasive operation to us six years later. Snowden has – at the risk of his own comfort, his income, his freedom, and possibly his life – given us the invaluable knowledge that the world is quite unlike what most of us thought it to be. Glenn Greenwald, the perceptive Guardian journalist and long-time defender of civil liberties, is also a champion of human freedom, dignity, and justice, because of his outstanding work in publicizing these abuses before a worldwide audience.

Even I – despite my strong libertarian convictions and considerable skepticism of centralized authority – could not have imagined that virtually all of the large technology companies to whom I had entrusted large amounts of my personal information – Google, Facebook, Skype, Microsoft, YouTube – were participants in the surveillance, enabling the NSA to build covert backdoors into their systems to steal the most confidential possible personal information. From e-mails, to search histories, to credit-card transactions – all of this is within the NSA’s reach; all of this could be used to destroy the reputation and life of anyone suspected of being a threat. It is only by the mercy, or the oversight, or the higher priorities, of our political masters that any of us retain vestiges of the freedom we think we have.

Upon finding out about the massive scope of this surveillance, I struggled to figure out what I could do to regain any expectation of privacy that I had even a week ago. If only one or two private companies had “partnered” with the NSA to facilitate the indiscriminate monitoring and data collection,  it might have been possible, with a few judicious restructurings of one’s habits, to avoid any services of those companies. But it seems that almost all of the major players on the Internet – the ones into whose hands hundreds of millions of us voluntarily (and, in retrospect, foolishly) entrusted vast amounts of personal data – are participants. Apart from taking the drastic (and, in many respects, self-undermining) step of ceasing to use most of the tools of the Internet and mobile technology altogether, one can do very little right away to insulate oneself from the surveillance, and even if such insulation were possible, the data already collected by the NSA are a sunk cost. It is not clear whether these companies chose to involve themselves in PRISM voluntarily, or whether they were browbeaten into it by the NSA and the Obama administration, as a price they needed to pay for being allowed to remain successful and relatively unhampered by politically motivated persecution. The companies are certainly not helping their case by denying all knowledge of their evident involvement in PRISM, using near-identical phrasing (composed by whom, I wonder?) which only prevents them from explaining any elements of their participation which might have been involuntary.

While it would have been supremely satisfying for me to simply disassociate myself from any of the companies implicated in the PRISM surveillance, they are, at present, embedded too deeply into the fabric of our lives. A gradual, evolutionary process will need to occur to enable individuals to discover ways of taking advantage of all the benefits of networked technologies, while preventing the present centralization of Internet activity from ever occurring again. The Meshnet project for creating a decentralized Internet is an intriguing concept supporting this goal.  Also helpful are anonymous search engines such as DuckDuckGo, which I have begun using in place of Google. Over the coming weeks, months, and years, it would benefit us all to think of creative ways to avoid the unwanted disclosure of our private information through the centralized Internet behemoths. As for information that we intend to be public, there seems to be no harm in disclosing that anywhere. The NSA and even Barack Obama himself may read The Rational Argumentator and watch my videos without any objections from me; indeed, this would do them much good. But I draw a clear line between the public and the private aspects of my life, and I intend to be the one who draws that line.

I am not a conspiracy theorist, but some conspiracies are indeed real, and in this case, the conspiracy theorists were right. Right, too, were those who proclaimed for years that the Obama administration represents a fundamental undermining of basic American values – to which I will add that this administration is opposed to basic human values of liberty, privacy, dignity, and the presumption of innocence. This is not routine political malfeasance; it is the wielding of an overarching apparatus of monitoring – a prerequisite to complete social control – that the KGB of the Soviet Union and the Stasi of Communist East Germany could not have dreamed of possessing. Those oppressors of old had to use actual human beings to monitor political dissidents – which severely limited their reach. The default data harvesting and algorithmic mining of the PRISM program does not require a human being to find spurious “associations” with alleged threats – based solely on combinations of keywords or contacts within one’s social networks.

The system works by focusing on all those within a few “degrees of separation” from the central suspects. You could have a phone number that differs by a digit from that of a terror suspect; if someone within that suspect’s network calls you by accident, you might be flagged as a suspect, too.  Sheer curiosity about certain subjects, visitation of certain sites, mention of certain topics in e-mails or private video chats and text messages, could get you flagged. It is not a matter of doing nothing wrong and thus having nothing to hide. With this much data, taken wildly out of context as is always possible with algorithmic data-mining systems, any person’s behavior can be construed as having nefarious motivations. Any sufficiently inconvenient individual can be portrayed as an enemy by Leviathan. This is why no American is safe from his own government unless the wholesale dismantling of the PRISM system and any related surveillance measures occurs. An executive order from Obama could achieve this, but it is doubtful that Obama would issue such an order. Massive public outrage, from within and outside the United States, might, however, set in motion the political processes that would discredit this heinously intrusive system. This is no time to cower in fear, to hush up the expression of one’s honest thoughts because one is unsure about the consequences. Now, more than ever, it is essential for every one of us to make full use of our inalienable First Amendment rights.

The extensive surveillance apparatus in the hands of the administration can be readily deployed to create actual totalitarianism with the snap of a finger. For a small-scale proof of concept, witness the frightening lockdown and militaristic mobilization that occurred in Boston in the wake of the Tsarnaev brothers’ bombings – which, as must be emphasized, the same apparatus of total surveillance and police-state response failed to prevent despite repeated warnings from Russian intelligence.

And yet I know that I am not an enemy. Neither are you. Most of us are peaceful, productive citizens of purportedly free nations. We wish harm to no one and wish only to lead our lives in peace, prosperity, and self-determination. I – and hopefully you – exercise the inalienable basic human right of free speech, a right enshrined in the American First Amendment, a right for whose defense the American Founders pledged their lives, their fortunes, and their sacred honor. Edward Snowden knows what it means to make such a pledge, and what its consequences can be in a world ruled by might rather than by right. This is why it is imperative that he be pardoned, if charged, for any alleged “crimes” that the U.S. government perceives him to have committed.  If you do nothing else, please go to WhiteHouse.gov and sign the petition requesting his pardon. This is, after all, Constitutionally protected speech. If the administration begins to persecute those who signed the petition, then it would be clear that this country is too far gone. Moreover, if Edward Snowden should meet an untimely end, from whatever apparent cause, I would have no doubts of the origins of his demise, and it would also be clear that this country is too far gone.

But I do not believe that this country is too far gone, yet. We may be teetering on the brink of totalitarianism, but I have hope that the fundamental decency of the American people – and the residual adherence in this country to founding American principles – will overcome the depredations of the current American government. Another vitally important project that calls upon the participation of as many Americans as possible is the class-action lawsuit spearheaded by Senator Rand Paul against the NSA PRISM program. (You can sign up to join the lawsuit here.) I have been critical of Rand Paul’s stances (particularly his endorsement of Mitt Romney) in the past, but on the issue of NSA surveillance, he is perhaps the most powerful ally that friends of liberty have within the United States, and we need all of the allies we can get right now. If Rand Paul can help to dismantle the Orwellian apparatus of the NSA, then any of his past errors of judgment would pale in comparison.

Nearly forty years ago, Richard Nixon lost his office because he authorized spying on a few political opponents. Those were the days! Barack Obama and his administration, often with the explicit support of many Members of Congress, have for years authorized and condoned spying on hundreds of millions of Americans and even more citizens of other sovereign jurisdictions – individuals over whom the United States has and ought to have no legitimate power whatsoever.  What will be the result of these disclosures for Barack Obama’s tenure in office? The principles of justice suggest strongly that Obama should resign or be impeached and then removed from office, for his transgressions in the realm of surveillance alone are orders of magnitude greater than those of Nixon. Along with Obama, all of his senior executive officials should resign, in addition to senior Members of Congress from both parties – including Lindsey Graham, John McCain, Dianne Feinstein, Mike Rogers, and Peter King – all of whom have expressed unequivocal support for the violations of our Constitutional rights via the PRISM program, and some of whom have even stated that Edward Snowden is guilty of treason. Yet these politicians are the ones who have violated their oaths of office to support and defend the Constitution of the United States against all enemies, foreign and domestic. I do not mean to single out any one wing of the two-party establishment which has created the Orwellian security state in the U.S. after September 11, 2001. Leading Republicans, including many who held prominent posts in the Bush administration, deserve plenty of the blame for laying the groundwork for the PRISM system. What is needed is not a mere change in political parties (for that achieves nothing), but a change in the fundamental understanding of the role of government, held by those in government.

But will the impeachment or voluntary resignation of Obama and some of the other most powerful people in the United States – indeed, in the world – realistically occur, or will they be able to successfully portray their completely unbidden intrusions into all of our lives as being “for our own good”? Will they frighten and bamboozle us into believing that we need their monitoring of our lives, which we know to be lived innocently, in order to protect us from the threat of terrorism which, according to Ronald Bailey of Reason Magazine, is four times less likely to kill any of us than a lightning strike?  With a surveillance program this pervasive – one so clearly endorsed by officials from both parties, from the very top down – it is unlikely that the powers that be will merely decide to sacrifice a few of their subordinates and let them take the blame for this gross violation of the privacy of many (perhaps most) human beings.  It appears that the American elite has been backed into a corner; either it will vigorously defend the PRISM system as a united front – or it will need to capitulate to human decency and acknowledge the gross moral failures involved at the highest levels.

The outcome will depend on how much public outrage arises. Are Americans going to passively roll over and accept an Orwellian level of surveillance as a fait accompli, or will they let their profound displeasure be known? I, as an American citizen, do not approve of this intrusion into my personal life by the very elected officials and their appointees who are supposed to function as the guardians of freedom. I urge all Americans to use peaceful methods of speech, petition, and creative advocacy to express their absolute disapproval of PRISM. Moreover, I hope that foreign governments and their citizens will send a strong message to the Obama administration and Congress that the monitoring of innocent persons outside America will, likewise, not be tolerated. Whether or not PRISM will continue is the litmus test for liberty in the United States, and perhaps in the remainder of the world as well. The outcome of this series of events will determine whether might or right will shape the future of humankind.