Browsed by
Tag: surveillance

The Rational Argumentator’s Eleventh Anniversary Manifesto

The Rational Argumentator’s Eleventh Anniversary Manifesto

The New Renaissance Hat
G. Stolyarov II
August 31, 2013
******************************

In another productive and transformative year for The Rational Argumentator, I have been able to realize a series of long-held ambitions. New and improved editions of Eden against the Colossus, The Best Self-Help is Free, and Implied Consent have all been released since TRA celebrated its tenth anniversary last year. In addition, the Guide to Stolyarovian Shorthand renders my unique system of efficient note-taking available to the public for the first time. Furthermore, numerous new articles, YouTube videos, and links to Resources on Indefinite Life Extension have been created and published, along with several new and even more remastered musical compositions.  This has been a year of rejuvenating the accomplishments of the past while also shaping the future with new creations. I continue to experiment with and implement new approaches for spreading rational enlightenment to all who are willing. My Open Badges on Indefinite Life Extension are a proof of concept of what could be possible when it comes to motivating free, open-source education that produces externally verifiable outcomes. Of course, developing and expanding the system of Open Badges in any range of conceivable subjects will require a considerable amount of time and exertion of effort. However, TRA now has an embedded system for developing multiple-choice quizzes whose completion will result in the awarding of an Open Badge.

Total eleventh-year visitation for all TRA features was 1,077,192 page views, compared to 1,302,774 during the tenth year and the peak of 1,398,438 during the ninth year. While this was a decrease, it is still a higher number than was observed during any of the first eight years of TRA’s existence. TRA’s lifetime visitation stands at 6,746,360 page views.

I attribute the recent trend in reduced visitation to a decrease in new publication activity. During its eleventh year, TRA published 208 features, compared to 306 during its tenth year. The rate of publication slowed because of an unusually turbulent year, both in terms of events that affected me directly and took me away from a more steady publication regimen, and in terms of larger attention-absorbing, paradigm-shattering developments on a world scale, such as the recent revelations of Orwellian NSA surveillance of the general population.

Still, the fact that visitation slipped by less (a decrease of 22.97%) than the number of published features (a decrease of 32.03%) shows that TRA’s content remains sought-after and relevant, perhaps especially so in light of the very troubled and troubling era in which we live, when the direct threats to our personal liberty and privacy continue to mount and to become unavoidably palpable. The message that individuals have rights, that their lives have inherent value, that no “national security” or “greater good” can trump that value, needs to be proclaimed with renewed urgency and commitment. An alternative to the status quo needs to emerge through intellectual, technological, and political innovation, and it needs to emerge sufficiently soon that the Orwellian boot on the face of mankind does not stamp it out forever. The comprehensive surveillance regime unleashed in secret by the Bush and Obama administrations has no historical parallels; it is what the totalitarian regimes of the 20th century could only have dreamed of. At the same time, an increasing disconnect has occurred between the actions of national-government politicians and anything resembling what the people actually think: witness the rampant war hysteria that the Obama administration is currently attempting to stir up for a pointless, counterproductive invasion of Syria that would already be one of the least popular military undertakings in US history.

What can be done to change the political and cultural status quo to anything resembling sanity – even the kind of sanity that could have been said to characterize the 1990s in the United States? Hundreds of distinct approaches, implemented by millions of individuals, are most certainly required.  This problem is not easy; the world took a wrong turn, probably sometime around September 11, 2001, when the fear of “terrorism” led the political leaders of the Western World to use an infinitesimal threat to justify restrictions and invasions of personal liberty and even bodily integrity, which would have been unthinkable in any other context. After the economic collapse of 2008 and the subsequent bailouts of politically connected cronies, it seemed clear that the national governments of the world have sided with the “men of pull” – as Ayn Rand would have called them – against everybody else.  A free system which rewards merit and undermines stagnant hierarchies of rent-seeking privilege was not allowed to manifest itself. Instead, the very people who caused the world to take a wrong turn remain in charge.

While changing the current state of affairs is no easy task, I can confidently say that, in a hypothetical world where all humans were philosophically inclined, informed on current events, concerned with questions of morality, and interested in continual learning and self-improvement, the wrong turn would never have been taken. In a world that suddenly found itself filled with such enlightened individuals, the harms of the status quo would quickly be undone. The goal of The Rational Argumentator is to assist such enlightened individuals, both those who already are and those who might become enlightened through their independent intellectual explorations. While we are far from a world filled with purveyors of philosophical enlightenment (in the 18th-century sense of that term), every individual who becomes a true rational intellectual and a person of moral conscience can take us one step closer in that direction.

Pervasive NSA surveillance, fortunately, is no threat to TRA, because TRA has always been a publicly accessible endeavor. As I have written previously, if  those employed by the NSA and other spy agencies throughout the world were to read information on The Rational Argumentator, this could only benefit humanity by possibly exposing these individuals to ideas of rationality and moral conscience. The truly troubling aspect of universal surveillance is that it seeks to pry into the communications that we do not wish to disclose to anyone and everyone – private e-mails, phone calls, social-media conversations, financial transactions, and search terms. It is reasonable and justified for individuals who wish to preserve a shred of privacy to change their approach toward such communications. However, as far as TRA is concerned, its work can proceed unimpeded, for its message is meant to reach as many people as possible, NSA agents or not.

However, the recent revelations of NSA spying did lead me to reconsider one matter from my March 2012 statement, “A New Era for The Rational Argumentator”. I no longer consider social-networking sites, such as Facebook or Google+, to be effective ways for individuals to create custom repositories of knowledge. While it is still the case that individuals can access content somewhat tailored to their interests through such networks, the fact remains that the networks have been co-opted through NSA backdoors into their systems. The companies running these networks are no longer benign free-market entities whose goal is to exchange value for value with their customers. Rather, the original market-oriented purpose of these companies has been subverted in favor of becoming privatized arms of the surveillance state. Perhaps these companies had little choice but to comply with requests to spy on their users; observe the fate of Lavabit, whose founder tried to stand on principle and refuse such intrusions. The fact remains, though, that it is not prudent to rely for one’s information and philosophical development solely on sources whose role to gather information about one can affect one’s life far more than any of their incidental ability to give information to one. Does this mean that one should abandon all social networks or even Facebook and Google+? I am not advocating this, though I do advocate extreme prudence on these networks. The path-dependency and network effects are too great at present for such abandonment to be a practical choice for many people, myself included. Rather, I wish to emphasize the continued importance of self-contained online information repositories that do not vary based on the visitor and do not seek to do anything to the visitor other than provide content and elicit feedback in public comments. The Rational Argumentator is just such a source, and I hope in the coming months and years to increase its rate of publication and resume its previous modus operandi of publishing both original content and some of the most thought-provoking content that has appeared elsewhere, relying on TRA’s excellent network of authors and articles published under the Creative Commons License. If I can convince you to access TRA directly (rather than only through a social network) on a routine basis as part of your quest for knowledge and edification, then my planned endeavors will be successful.

You will see, in the coming months, the realization of still more ambitious projects, some of which are presently underway. Through all of the changes, improvements, and revitalizations of past materials, I can make you the same promises that I have made throughout TRA’s lifetime: that I will retain all content ever published on TRA; that I will continue to vigorously promote the ideas of liberty, reason, and technological progress; and that this site shall always remain a haven for high intellectualism and civilized discourse. In whatever way I can, I hope to make this magazine a valuable asset to those of us who have the most at stake in the outcome of the continuing and accelerating race between technological progress and authoritarian intervention.

Why The 2,776 NSA Violations Are No Big Deal – Article by Ron Paul

Why The 2,776 NSA Violations Are No Big Deal – Article by Ron Paul

The New Renaissance Hat
Ron Paul
August 18, 2013
******************************
Thanks to more documents leaked by Edward Snowden, this time to the Washington Post, we learned last week that a secret May 2012 internal audit by the NSA revealed 2,776 incidents of “unauthorized” collection of information on American citizens over the previous 12 months. They are routinely breaking their own rules and covering it up.The Post article quotes an NSA spokesman assuring the paper that the NSA attempts to identify such problems “at the earliest possible moment.” But what happened to all those communications intercepted improperly in the meantime? The answer is, they were logged and stored anyway.

We also learned that the NSA routinely intercepts information from Americans while actually targeting foreigners, and that this is not even considered a violation. These intercepts are not deleted once discovered, even though they violate the US government’s own standards. As the article reports, “once added to its databases, absent other restrictions, the communications of Americans may be searched freely.”

The Post article quotes an NSA official explaining that the thousands of unauthorized communications intercepts yearly are relatively insignificant. “You can look at it as a percentage of our total activity that occurs each day. You look at a number in absolute terms that looks big, and when you look at it in relative terms, it looks a little different.”

So although the numbers of Americans who have had their information intercepted in violation of NSA’s own rules seems large, it is actually miniscule compared to the huge volume of our communications they intercept in total!

Though it made for a sensational headline last week, the fact is these 2,776 “violations” over the course of one year are completely irrelevant. The millions and millions of “authorized” intercepts of our communications are all illegal — except for the very few carried out in pursuit of a validly-issued search warrant in accordance with the Fourth Amendment. That is the real story. Drawing our attention to the violations unfortunately sends the message that the “authorized” spying on us is nothing to be concerned about.

When information about the massive NSA domestic spying program began leaking earlier in the summer, Deputy Attorney General James Cole assured us of the many levels of safeguards to prevent the unauthorized collection, storage, and distribution of our communications. He promised to explain the NSA’s record “in as transparent a way as we possibly can.”

Yet two months later we only discover from more leaked documents the thousands of times communications were intercepted in violation of their own standards! It is hardly reassuring, therefore, when they promise us they will be more forthcoming in the future. No one believes them because they have lied and covered up continuously. The only time any light at all is shone on these criminal acts by the US federal government is when a whistleblower comes forth with new and ever more disturbing information.

Americans are increasingly concerned over these violations of their privacy. Calls for reform grow. However, whenever Washington finds itself in a scandal, the federal government responds by naming a federal-government panel made up of current and former federal employees to investigate any mistakes the federal government might have made. The recommendations invariably are that even more federal government employees must be hired to provide an additional layer or two of oversight. That is supposed to reassure us that reforms have been made, while in fact it is just insiders covering up for those who have hired them to investigate.

Let us hope the American people will decide that such trickery is no longer acceptable. It is time to take a very serious look at the activities of the US intelligence community. The first step would be a dramatic reduction in appropriations to force a focus on those real, not imagined, threats to our national security. We should not be considered the enemy.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

A House Divided Over NSA Spying on Americans – Article by Ron Paul

A House Divided Over NSA Spying on Americans – Article by Ron Paul

The New Renaissance Hat
Ron Paul
August 10, 2013
******************************

In late July 2013, the House debate on the Defense Appropriations bill for 2014 produced a bit more drama than usual. After hearing that House leadership would do away with the traditional “open rule” allowing for debate on any funding limitation amendment, it was surprising to see that Rep. Justin Amash’s (R-MI) amendment was allowed on the Floor. In the wake of National Security Agency (NSA) whistleblower Edward Snowden’s revelations about the extent of US government spying on American citizens, Amash’s amendment sought to remove funding in the bill for some of the NSA programs.

Had Amash’s amendment passed, it would have been a significant symbolic victory over the administration’s massive violations of our Fourth Amendment protections. But we should be careful about believing that even if it had somehow miraculously survived the Senate vote and the President’s veto, it would have resulted in any significant change in how the Intelligence Community would behave toward Americans. The US government has built the largest and most sophisticated spying apparatus in the history of the world.

The NSA has been massively increasing the size its facilities, both at its Maryland headquarters and in its newly built (and way over-budget) enormous data center in Utah. Taken together, these two facilities will be seven times larger than the Pentagon! And we know now that much of the NSA’s capacity to intercept information has been turned inward, to spy on us.

As NSA expert James Bamford wrote earlier this year about the new Utah facility:

“The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.”

But it happened anyway.

In late July we have seen two significant prison-breaks, one in Iraq, where some 500 al-Qaeda members broke out of the infamous Abu Ghraib prison, which the US built, and another 1,000 escaped in a huge break in Benghazi, Libya – the city where the US Ambassador was killed by the rebels that the US government helped put in power. Did the US intelligence community, focused on listening to our phone calls, not see this real threat coming?

Rep. Amash’s amendment was an important move to at least bring attention to what the US intelligence community has become: an incredibly powerful conglomeration of secret government agencies that seem to view Americans as the real threat. It is interesting that the votes on Amash’s amendment divided the House not on party lines. Instead, we saw the votes divided between those who follow their oath to the Constitution, versus those who seem to believe that any violation of the Constitution is justified in the name of the elusive “security” of the police state at the expense of liberty. The leadership – not to my surprise — of both parties in the House voted for the police state.

It is encouraging to see the large number of votes crossing party lines in favor of the Amash amendment. Let us hope that this will be a growing trend in the House – perhaps the promise that Congress may once again begin to take its duties and obligations seriously. We should not forget, however, that in the meantime another Defense Appropriations bill passing really means another “military spending” bill. The Administration is planning for a US invasion of Syria, more military assistance to the military dictatorship in Egypt, and more drones and interventionism. We have much work yet to do.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

Why Won’t They Tell Us the Truth About NSA Spying? – Article by Ron Paul

Why Won’t They Tell Us the Truth About NSA Spying? – Article by Ron Paul

The New Renaissance Hat
Ron Paul
August 10, 2013
******************************
In 2001, the Patriot Act opened the door to US government monitoring of Americans without a warrant. It was unconstitutional, but most in Congress over my strong objection were so determined to do something after the attacks of 9/11 that they did not seem to give it too much thought. Civil liberties groups were concerned, and some of us in Congress warned about giving up our liberties even in the post-9/11 panic. But at the time most Americans did not seem too worried about the intrusion.
***

This complacency has suddenly shifted given recent revelations of the extent of government spying on Americans. Federal politicians and bureaucrats are faced with serious backlash from Americans outraged that their most personal communications are intercepted and stored. They had been told that only the terrorists would be monitored. In response to this anger, defenders of the program have time and again resorted to spreading lies and distortions. But these untruths are now being exposed very quickly.

In a Senate hearing this March, Director of National Intelligence James Clapper told Senator Ron Wyden that the NSA did not collect phone records of millions of Americans. This was just three months before the revelations of an NSA leaker made it clear that Clapper was not telling the truth. Pressed on his false testimony before Congress, Clapper apologized for giving an “erroneous” answer but claimed it was just because he “simply didn’t think of Section 215 of the Patriot Act.” Wow.

As the story broke in June of the extent of warrantless NSA spying against Americans, House Intelligence Committee Chairman Mike Rogers assured us that the project was a strictly limited and not invasive. He described it as a “lockbox with only phone numbers, no names, no addresses in it, we’ve used it sparingly, it is absolutely overseen by the legislature, the judicial branch and the executive branch, has lots of protections built in…”

But we soon discovered that also was not true either. We learned in another Guardian newspaper article last week that the top secret “X-Keyscore” program allows even low-level analysts to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals.”

The keys to Rogers’ “lockbox” seem to have been handed out to everyone but the janitors! As Chairman of the Committee that is supposed to be most in the loop on these matters, it seems either the Intelligence Community misled him about their programs or he misled the rest of us. It sure would be nice to know which one it is.

Likewise, Rep. Rogers and many other defenders of the NSA spying program promised us that this dragnet scooping up the personal electronic communications of millions of Americans had already stopped “dozens” of terrorist plots against the United States. In June, NSA director General Keith Alexander claimed that the just-disclosed bulk collection of Americans’ phone and other electronic records had “foiled 50 terror plots.”

Opponents of the program were to be charged with being unconcerned with our security.

But none of it was true.

On August 3, 2013, the Senate Judiciary Committee heard dramatic testimony from NSA deputy director John C. Inglis. According to the Guardian:

“The NSA has previously claimed that 54 terrorist plots had been disrupted ‘over the lifetime’ of the bulk phone records collection and the separate program collecting the internet habits and communications of people believed to be non-Americans. On Wednesday, Inglis said that at most one plot might have been disrupted by the bulk phone records collection alone.”

From dozens to “at most one”?

Supporters of these programs are now on the defensive, with several competing pieces of legislation in the House and Senate seeking to rein in an administration and intelligence apparatus that is clearly out of control. This is to be commended. What is even more important, though, is for more and more and more Americans to educate themselves about our precious liberties and to demand that their government abide by the Constitution. We do not have to accept being lied to – or spied on — by our government.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

Internet Fascism and the Surveillance State – Article by Ben O’Neill

Internet Fascism and the Surveillance State – Article by Ben O’Neill

The New Renaissance Hat
Ben O’Neill
July 16, 2013
******************************

What is the purpose of telecommunication and internet surveillance?

The NSA presents its surveillance operations as being directed toward security issues, claiming that the programs are needed to counter terrorist attacks. Bald assertions of plots foiled are intended to bolster this claim.[1] However, secret NSA documents reveal that their surveillance is used to gather intelligence to achieve political goals for the US government. Agency documents show extensive surveillance of communications from allied governments, including the targeting of embassies and missions.[2] Reports from an NSA whistleblower also allege that the agency has targeted and intercepted communications from a range of high-level political and judicial officials, anti-war groups, US banking firms and other major companies and non-government organizations.[3] This suggests that the goal of surveillance is the further political empowerment of the NSA and the US government.

Ostensibly, the goal of the NSA surveillance is to prevent terrorist acts that would harm or kill people in the United States. But in reality, the primary goal is to enable greater control of that population (and others) by the US government. When questioned about this issue, NSA whistleblower Thomas Drake was unequivocal about the goal of the NSA: “to own the internet and find out what everybody is doing.”[4]

“To own the internet” — Public-private partnerships in mass surveillance

The internet is, by its very nature, a decentralized arrangement, created by the interaction of many private and government servers operating on telecommunications networks throughout the world. This has always been a major bugbear of advocates for government control, who have denigrated this decentralized arrangement as being “lawless.” Since it began to expand as a tool of mass communication for ordinary people, advocates for greater government power have fought a long battle to bring the internet “under control” — i.e., under their control.

The goal of government “ownership of the internet” entails accessing the facilities that route traffic through the network. This is gradually being done through government control of the network infrastructure and the gradual domination of the primary telecommunications and internet companies that provide the facilities for routing traffic through the network. Indeed, one noteworthy aspect of the mass surveillance system of the NSA is that it has allegedly involved extensive cooperation with many “private” firms operating under US law. This has allegedly included major security, telecommunications and internet companies, as well as producers of network software and hardware.

Examples of such “public-private partnerships” are set out in leaked documents of the NSA. An unnamed US telecommunications company is reported to provide the NSA with mass surveillance data on the communications of non-US people under its FAIRVIEW program.[5] Several major computing and internet companies have also been explicitly named in top secret internal NSA material as being current providers for the agency under its PRISM program.[6] Several of these companies have issued denials disavowing any participation in, or prior knowledge of the program, but this has been met with some scepticism.[7] (Indeed, given that the NSA did not anticipate public release of its own internal training material, it is unlikely that the agency would have any cause to lie about the companies they work with in this material. This suggests that the material may be accurate.)

Many of these companies have supplied the NSA with data from their own customers, or created systems which allow the agency access to the information flowing through telecommunications networks. They have done so without disclosure to their own customers of the surveillance that has occurred, by using the blanket advisement that they “comply with lawful requests for information.” By virtue of being subject to the jurisdiction of US statutes, all of these companies have been legally prohibited from discussing any of their dealings with the NSA and they have been well placed for retaliatory action by the many regulatory agencies of the US government if they do not cooperate. In any case, it appears from present reports that many companies have been active partners of the agency, assisting the NSA with illegal surveillance activities by supplying data under programs with no legitimate legal basis.

This has been a common historical pattern in the rise of totalitarian States, which have often sought to incorporate large business concerns into their network of power. Indeed, the very notion of “public-private partnerships” in this sector readily brings to mind the worst aspects of fascist economic systems that have historically existed. The actions of US companies that have cooperated in the NSA’s mass surveillance operations calls into question the “private” status of these companies. In many ways these companies have acted as an extension of the US government, providing information illegally, in exchange for privileges and intelligence. According to media reports, “Such cooperation is an extremely delicate issue for the companies involved. Many have promised their customers data confidentiality in their terms and conditions. Furthermore, they are obliged to follow the laws of the countries in which they do business. As such, their cooperation deals with the NSA are top secret. Even in internal NSA documents, they are only referred to by the use of code names.”[8]

We began this discussion by asking the purpose of telecommunication and internet surveillance. The answer lies in the uses to which those surveillance powers are being put, and will inevitably be put, as the capacity of the NSA expands. The true purpose of the NSA is not to keep us safe. Its goal is to own the internet, to own our communications, to own our private thoughts — to own us.

Ben O’Neill is a lecturer in statistics at the University of New South Wales (ADFA) in Canberra, Australia. He has formerly practiced as a lawyer and as a political adviser in Canberra. He is a Templeton Fellow at the Independent Institute, where he won first prize in the 2009 Sir John Templeton Fellowship essay contest. Send him mail. See Ben O’Neill’s article archives.

This article was published on Mises.org and may be freely distributed, subject to a Creative Commons Attribution United States License, which requires that credit be given to the author.

Notes

[1] Mathes, M. (2013) At least 50 spy programs foiled by terror plots: NSA . The Sydney Morning Herald, 19 June 2013.

[2] MacAskill, E. (2013) New NSA leaks show how US is bugging its European allies . The Guardian, 1 June 2013.

[3] Burghardt, T. (2013) NSA spying and intelligence collection: a giant blackmail machine and “warrantless wiretapping program.” Global Research , 24 June 2013. Reports are from NSA whistleblower Russ Tice, who is a former intelligence analyst at the NSA.

[4] Wolverton, J. (2012) Classified drips and leaks. The New American, 6 August 2012. Emphasis added. Capitalization of “Internet” removed.

[5] Greenwald, G. (2013) The NSA’s mass and indiscriminate spying on Brazilians . The Guardian, 7 July 2013.

[6] Gelman, B. and Poitras, L. (2013) US, British intelligence mining data from nine US internet companies in broad secret program . The Washington Post, 7 June 2013. See also NSA slides explain the PRISM data-collecting program . The Washington Post, 6 June 2013.

[7] McGarry, C. (2013) Page and Zuckerberg say NSA surveillance program is news to them . TechHive, 7 June 2013.

[8] Ibid Poitras, p. 3.

Restore the Fourth – Protest Against NSA Surveillance – Carson City Interviews – Video by G. Stolyarov II

Restore the Fourth – Protest Against NSA Surveillance – Carson City Interviews – Video by G. Stolyarov II

Mr. Stolyarov interviews attendees at the Restore the Fourth rally against NSA surveillance in Carson City, NV, on July 4, 2013. This successful protest is the beginning of what will hopefully become a major movement to regain essential individual freedoms and to roll back infringements upon Americans’ (and most human beings’) essential private spheres.

Thanks go to Larry Rubald for filming and for organizing the event.

NOTE: Apologies for the traffic noise obstructing some of the words. Full captions are now available. Thank you for your patience.

References
Restore the Fourth: Upholding the Meaning of the 4th Amendment – Video by G. Stolyarov II
Video: Several protest government snooping on Fourth of July in Carson City – Reno Gazette-Journal – July 4, 2013

Restore the Fourth: Upholding the Meaning of the 4th Amendment – Video by G. Stolyarov II

Restore the Fourth: Upholding the Meaning of the 4th Amendment – Video by G. Stolyarov II

Mr. Stolyarov discusses his experiences at the July 4, 2013, Restore the Fourth protest in Carson City, in opposition to the unconstitutional surveillance by the National Security Agency. He also expresses the need for more Americans to speak out and unambiguously state their disapproval of the Orwellian surveillance society that the NSA has put in place.

The protest went as smoothly as possible. It was civil and peaceful, and received general public support.

More videos from the protest are to come!

Reference
– “Video: Several protest government snooping on Fourth of July in Carson City” – Reno Gazette-Journal – July 4, 2013

If You Like the Surveillance State, You’ll Love E-Verify – Article by Ron Paul

If You Like the Surveillance State, You’ll Love E-Verify – Article by Ron Paul

The New Renaissance Hat
Ron Paul
June 30, 2013
******************************

From massive NSA spying, to IRS targeting of the administration’s political opponents, to collection and sharing of our healthcare information as part of Obamacare, it seems every day we learn of another assault on our privacy. Sadly, this week the Senate took another significant, if little-noticed, step toward creating an authoritarian surveillance state. Buried in the immigration bill is a national identification system called mandatory E-Verify.

The Senate did not spend much time discussing E-Verify, and what little discussion took place was mostly bipartisan praise for its effectiveness as a tool for preventing illegal immigrants from obtaining employment. It is a tragedy that mandatory E-Verify is not receiving more attention, as it will impact nearly every American’s privacy and liberty.

The mandatory E-Verify system requires Americans to carry a “tamper-proof” Social Security card. Before they can legally begin a job, American citizens will have to show the card to their prospective employers, who will then have to verify their identity and eligibility to hold a job in the US by running the information through the newly created federal E-Verify database. The database will contain photographs taken from passport files and state driver’s licenses. The law gives federal bureaucrats broad discretion in adding other “biometric” identifiers to the database. It also gives the bureaucracy broad authority to determine what features the “tamper-proof” card should contain.

Regardless of one’s views on immigration, the idea that we should have to ask permission from the federal government before taking a job ought to be offensive to all Americans. Under this system, many Americans will be denied the opportunity for work. The E-Verify database will falsely identify thousands as “ineligible,” forcing many to lose job opportunities while challenging government computer inaccuracies. E-Verify will also impose additional compliance costs on American businesses, at a time when they are struggling with Obamacare implementation and other regulations.

According to David Bier of Competitive Enterprise Institute, there is nothing stopping the use of E-Verify for purposes unrelated to work verification, and these expanded uses could be authorized by agency rule-making or executive order. So it is not inconceivable that, should this bill pass, the day may come when you are not be able to board an airplane or exercise your Second Amendment rights without being run through the E-Verify database. It is not outside the realm of possibility that the personal healthcare information that will soon be collected by the IRS and shared with other federal agencies as part of Obamacare will also be linked to the E-Verify system.

Those who dismiss these concerns as paranoid should consider that the same charges were leveled at those who warned that the PATRIOT Act could lead to the government collecting our phone records and spying on our Internet usage. Just as the PATRIOT Act was only supposed to be used against terrorists but is now used to bypass constitutional protections in matters having noting to do with terrorism or national security, the national ID/mandatory E-Verify database will not only be used to prevent illegal immigrants from gaining employment. Instead, it will eventually be used as another tool to monitor and control the American people.

The recent revelations of the extent of National Security Agency (NSA) spying on Americans, plus recent stories of IRS targeting Tea Party and similar groups for special scrutiny, demonstrates the dangers of trusting government with this type of power. Creation of a federal database with photos and possibly other “biometric” information about American citizens is a great leap forward for the surveillance state. All Americans who still care about limited government and individual liberty should strongly oppose E-Verify.

Ron Paul, MD, is a former three-time Republican candidate for U. S. President and Congressman from Texas.

This article is reprinted with permission.

The Eyes Watching You: “1984” and the Surveillance State – Article by Sarah Skwire

The Eyes Watching You: “1984” and the Surveillance State – Article by Sarah Skwire

The New Renaissance Hat
Sarah Skwire
June 19, 2013
******************************

George Orwell. 1984. New York: Plume, [1949] 2003. 323 pages.

In the kind of horrifying coincidence that surely would have prompted one of his more acerbic essays, the news that various U.S. government surveillance agencies have been gathering data from millions of citizens’ phones, email accounts, and web searches broke during the week of the 64th publication anniversary of George Orwell’s 1984. As the news reports poured in, and as sales of 1984 surged by an astonishing 6,884 percent, a friend asked me whether the PRISM story strikes me as more Orwellian or more Kafkaesque.

My response? We’d better hope it’s Kafkaesque.

No one wants to inhabit a Franz Kafka novel. But the surveillance states he describes do have one thing going for them—incompetence. In Kafka’s stories, important forms get lost, permits are unattainable, and bureaucrats fail to do their jobs. Like the main character in Kafka’s unfinished story, “The Castle,” if you were trapped in Kafka’s world you could live your whole life doing nothing but waiting for a permit. But at least you could live. Incompetence creates a little space.

What is terrifying about Orwell’s 1984 is the complete competence of the surveillance state. Winston Smith begins the novel by believing he is in an awful, but Kafkaesque world where there is still some slippage in the state’s absolute control, and still some room for private action. Winston says that Oceania’s world of telescreens and Thought Police means that there are “always the eyes watching you and the voice enveloping you. Asleep or awake, working or eating, indoors or out of doors, in the bath or in bed—no escape.” But he follows that by saying, “Nothing was your own except the few cubic centimeters inside your skull.” He also believes that while the diary he keeps will inevitably be discovered, the small alcove in his apartment where he writes his diary puts him “out of the range of the telescreen.”

The feeling that some tiny space for private thought and action can be found leads Winston into his relationship with Julia. Though they know they will inevitably be discovered, Winston and Julia believe that, for a time, their relationship and their meeting place will remain secret. They could not be more wrong.

One day after making love to Julia in their clandestine room, Winston, prompted by a singing thrush and a singing prole woman who is doing laundry, has a vision of a future that “belongs to the proles.”

The birds sang, the proles sang. The Party did not sing. All round the world, in London and New York, in Africa and Brazil, and in the mysterious, forbidden lands beyond the frontiers, in the streets of Paris and Berlin, in the villages of the endless Russian plain, in the bazaars of China and Japan—everywhere stood the same solid unconquerable figure, made monstrous by work and childbearing, toiling from birth to death and still singing. Out of those mighty loins a race of conscious beings must one day come. You were the dead; theirs was the future. But you could share in that future if you kept alive the mind as they kept alive the body.

 

In this very moment, just as Winston comes alive to what feels like hope and possibility and the dream of some kind of a future for humankind, the telescreen that has been hidden in the room all along speaks to Winston and Julia. The Thought Police break down the door. The couple is taken off to be imprisoned, tortured, and broken.

There has never been any private space for Winston or Julia—not in their “secret” meeting places, not in their sexual rebellion, not even in the few cubic centimeters inside their skulls. “For seven years the Thought Police had watched him like a beetle under a magnifying glass. There was no physical act, no word spoken aloud, that they had not noticed, no train of thought that they had not been able to infer.” Winston should have taken more seriously the description of Oceania he read in the forbidden book The Theory and Practice of Oligarchical Collectivism, by Emmanuel Goldstein:

A Party member lives from birth to death under the eye of the Thought Police. Even when he is alone he can never be sure that he is alone. Wherever he may be, asleep or awake, working or resting, in his bath or in bed, he can be inspected without warning and without knowing that he is being inspected. Nothing that he does is indifferent. His friendships, his relaxations, his behaviour towards his wife and children, the expression of his face when he is alone, the words he mutters in sleep, even the characteristic movements of his body, are all jealously scrutinized. Not only any actual misdemeanour, but any eccentricity, however small, any change of habits, any nervous mannerism that could possibly be the symptom of an inner struggle, is certain to be detected.
***

The Orwellian surveillance state is terrifying not because—as in Kafka—you might be arrested because of a rumor or a mistake, or because despite your innocence you might be caught in the surveillance state’s unnavigable maze. It is terrifying because it never makes mistakes. It does not need to listen to rumors. And it knows that no one is ever innocent.

Sarah Skwire is a fellow at Liberty Fund, Inc. She is a poet and author of the writing textbook Writing with a Thesis.

This article was originally published by The Foundation for Economic Education.

 

Universal Surveillance: PRISM and the Litmus Test for Liberty – Video by G. Stolyarov II

Universal Surveillance: PRISM and the Litmus Test for Liberty – Video by G. Stolyarov II

 Will enough Americans respond with outrage and exercise their First Amendment rights to bring an end to the totalitarianism-enabling NSA PRISM surveillance system?

References
Petition to Pardon Edward Snowden
– “Rand Paul planning class action lawsuit against surveillance programs” – Aaron Blake – The Washington Post – June 9, 2013
– “In the Face of Universal Surveillance: PRISM and the Litmus Test for Liberty” – Essay by G. Stolyarov II
– “PRISM (surveillance program)” – Wikipedia
– “Edward Snowden: the whistleblower behind the NSA surveillance revelations” – Glenn Greenwald, Ewen MacAskill and Laura Poitras – The Guardian – June 9, 2013
– “Google, Apple, Facebook & AOL Deny Participating In Alleged NSA “PRISM” Program” – Danny Sullivan – Marketing Land – June 6, 2013
Project Meshnet
DuckDuckGo
– “How Scared of Terrorism Should You Be?” – Ronald Bailey – Reason Magazine – September 6, 2011
– “Futile Temporary Totalitarianism in Boston” – Article by G. Stolyarov II
– “Russian politico: U.S. ignored Tsarnaev intelligence at its own peril” – By Cheryl K. Chumley – The Washington Times – June 4, 2013