No Such Agency

As fallout from the recent passage of the USA FREEDOM ACT continues rains down alongside China’s recent officiation of the Thought Police for the patrol of internet behavior and news that you can now be sent to prison for deleting your Internet browsing history, one is left to wonder if there is anything anyone can do to protect themselves online. We need to understand that the narrative currently abounding is designed to trigger the emotion of helplessness within us. We’re meant to feel that there isn’t anything we can do because as long as we feel that way we probably won’t take steps to do anything about it.

It turns out there are actions you can take that are extremely effective, requiring only moments to enact and a little bit of reading to understand.

The military-industrial-intelligence-prison complex has grown so out of control that it is now becoming cliché to refer to our society as Orwellian. There were plenty of warning signs, what with George Orwell’s 1984, Aldous Huxley’s fable Brave New World, Ray Bradbury’s Farenheit 451, and Philip K. Dick’s Minority Report – these books were not novels. In fact when asked where their ideas for these books originated from, several of these authors cited that they had merely rubbed shoulders with the elite, employing these stories as the vehicles by which the common people could become aware of the global agenda. The notion of Doublespeak, Thought Police, perpetual war for perpetual peace, Big Brother and fascism carried out in the name of protecting the people has all been normalized in the past decade. Though the wordings are different, the essentially identical slogans of “War Is Peace, Freedom Is Slavery, Ignorance Is Strength,” are hypnotically repeated in every message broadcast by the mainstream media. Just as Winston Smith’s work at the Ministry of Truth entailed the constant rewriting of history to cover the truth up, today’s government institutions are given innocuous names to deliberately deceive their purpose; the Department of Justice ensures the largest crime families and banking criminals are protected while sending innocent people to the largest prison complex on Earth; the Department of Education oversees the implementation of programs designed to dumb our society down with standardized testing, No Child Left Behind, Common Core and the like; The FDA is headed up by Monsanto’s former Vice President; the American Cancer Society ridicules and suppresses genuine cure innovations like those pioneered by Stanislav Brzezinski, Rene Casse, Max Gerson and others while promoting Radiation and toxic Chemotherapy; and the list goes on and on. Just pick an agency and examine how their actions are counter to their mission statement.

With X-Box’s monitoring conversations, web-cams spying on individuals, cellular phones being utilized to determine GPS coordinates for every person carrying them, and now household “smart” appliances outfitted with hot-mic surveillance mechanisms, all of this begs the question: If technology improves our lives, why is everything continuing to get worse in this downward plummet towards the bottomless abyss of despotism? We’re always sold on the benefits of what a new technology has to offer before learning about the adverse side-effects. We’re made to feel as though we’ll be left behind if we don’t purchase the newest this or the latest that, as though our lives will be unbearably disconnected from the trends if we fail to comply the buying habits desired by major corporations. And worst of all, we’re trained to ridicule members of the population who refuse to participate; “What? You don’t have a smart phone? You’re missing out, dude! Just look at all these apps I got that prevent me from interacting with my surrounding environment or making eye contact with fellow humans! Check out all these games I can play that disconnect me from reality. And look at this – just look at this – my phone transmits location data and shopping habits to Big Brother by tracking wifi signals my phone recognizes by proximity so they know what I’m up to well enough to anticipate my actions. It’s totally sick, dude.”

You can think of our modern Surveillance Panopticon as an attempt by the powerful to maintain their dominance by asserting control over all communications. Corporations discovered that the gathering and analysis of massive amounts of personal data is necessary if they want to remain competitive in an information-rich world. In particular, nearly all advertising is shifting toward surveillance-based tracking of our personal behavior.

Because communications technology has been re-purposed for social control, the nature of current technology requires that our information is either secure in a way that frustrates governments, or is totally insecure in a way that makes possible the widespread and detailed monitoring of an entire populous. Throughout history, surveillance is always inevitably targeted toward the repression of social movements that might upset exploitative and anti-human status quo, but now the modern surveillance state threatens to unleash unprecedented powers over everyone, especially those who think there is no reason to be upset about it and thus do nothing to protect themselves.

This complacency is common precisely because of how overwhelming the topic of surveillance is. Some decide that it is impossible to be secure, so they resign themselves to live under perpetual surveillance or to forsake all forms of digital communication. But there is another way, and that’s to embrace a high degree of security that activist programmers work tirelessly to make easy and accessible for everyone.

A LITTLE BACKGROUND

We’ve been aware that our government has engaged in warrantless wiretapping since the Bush Administration wheeled out the Patriot Act in the wake of 9_11. In fact, the foundational architecture for the entire Echelon program is much earlier than that. However it wasn’t until Edward Snowden stepped forward and unveiled the harrowing truths detailing the extent of abuse at the highest levels that this conversation was finally mainstreamed. Thus many revelations continue to overflow into the public eye. Revelations like the existence of the Five-Eyes Alliance.
The Five-Eyes Alliance was born under the umbrella of an international surveillance program called Echelon in the post World-War-Two world. This ultimately manifested in the creation of five separate intelligence gathering agencies around the world, including the U.S.’s National Security Agency (NSA), Communications Security Establishment Canada (CSEC), the UK’s Government Communications Headquarters (GCHQ), Australia’s Signals Intelligence Directorate (SID) and New Zealand’s Directorate of Defense Intelligence and Security (DDIS). Today, the Five-Eyes Alliance is a supranational intelligence organization that doesn’t answer to the laws of any of the countries it is based in, and is ultimately well beyond any legislation. One of the advantages of this system -for the intelligence community at least- is the ability to circumvent national law; the NSA doesn’t necessarily collect data from Americans if the courts say it is illegal to do so, but there is nothing stopping the NSA, legally speaking, from trading the same information gathered instead by GCHQ.
Echelon computer centers are located around the world, including Royal Air Force Menwith Hill near Harrogate, North Yorkshire England; Pine Gap, near Alice Springs in Australia, and HAARP. Echelon is composed of a vast network of listening posts and spherical ray domes, combined with extremely sophisticated computers, and composed of an enormous number of people, dishes and taps to capture every communication via internet, GSM, UMTS, land lines, TV and radio broadcasts, Satellite communications; private, military and diplomatic – and listen to every word. Computers analyze keywords, which if triggered are handled to human specialists. While most of these stations are staffed exclusively by CIA and NSA analysts, thousands upon thousands of private contractors are employed by NSA in a private fashion; organizations like Snowden’s former employer, Booz Allen Hamilton.
It was private contractors that both the NSA and GCHQ hired in efforts to plant agents into the online game World of Warcraft to spy on gamers. According to Russia Today:
An NSA document from 2008 titled, “Exploiting Terrorist Use of Games & Virtual Environments” leaked by Edward Snowden, warns of the risk of leaving game communities under-monitored and described them as a “target-rich communications network,” where intelligence targets could, “hide in plain sight.”
PRISM
In a similar way, other high-traffic intersections of the internet such as facebook are subject to corrupt power abuses within a cyber security culture radically off course from any public good. In fact facebook users have helped program the new, cutting-edge Facial Recognition Software now being developed as yet another security feature in a vast ocean of security culture. It turns out that by “tagging” friends and acquaintances in photos uploaded to facebook, millions upon millions of facebook users worldwide have unknowingly participated in the creation of facial recognition software. Facebook also stands out as a prime example of the only thing that limits these programs and organizations, namely: policy. Law has always been an art of word-magic, which is another reason that policy is technically separate from law. Regardless of what is legal, policy is the only limitation to the corporate spy networks vying to kill the free internet at all cost. According to facebook’s privacy policies, photos you upload can be used in advertisements without compensation or consent unless you find out about it and opt out in writing.
Even more shocking still is the ability for surveillance agents to tap mobile devices even when no calls are being made, activating the microphone to listen in on whatever conversations are near the device. The small microphone in your cell phone can be cued with a feature called, “Hot Mic,” to listen in to conversations happening near physical proximity and thus ear shot of your wireless devices. The same can be done with the cameras in mobile devices, with a “Camera Capture” feature,available exclusively at the offices of intelligence agencies. Now similar microphones and cameras are being installed in most new electronics, from dishwashers and microwaves to boom-boxes and smoke detectors. Even your X-Box is spying on you.
The walls have ears, and every NSA analyst is familiar with the X-KEYSCORE intelligence search engine, which collects every aspect of every person’s internet traffic, and enables activity deemed by analysts to be tagged, monitored, tracked and even attacked at the stroke of a key – the click of a mouse. And all of this is possible without a court. Any website traffic can be watched, any laptop can be followed, any Email can be read. There is a trinity of programs used by NSA on this front. The first is called TURMOIL which is known as a passive signal intelligence interception and collections system. Next comes something called TURBINE, which instead of inspecting information the way TURMOIL does, TURBINE instead injects information to orchestrate attacks.
Salvador Rodriguez of the LA Times reports:

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware.

The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware “implants” capable of spying on users, according to The Intercept, which cited documents provided by whistleblower Edward Snowden.[15]

Plugging TURMOIL and TURBINE together is a third program called Q-FIRE, which programmatically automates attacks on individuals based on internet traffic.  Q-FIRE uses TURMOIL to watch, TURBINE to attack, and does so automatically without the assistance of a human analyst. Q-FIRE also compromises everyone’s router and directs through them to beat the speed of light as a race condition to localize attacks worldwide.
Then we have the Quantum Series of programs, which determine whether your computer is vulnerable enough to break in to, and if so, does:
  • Quantum Theory – is an arsenal of exploits, specifically implants that die after 30 days.
  • Quantum Nation – commandeers your computer to see if you have host based intrusion detection systems like Tripwire or Aide to detect the presence of hackers.
  • Quantum Bot – hijacks Internet Relay Chat bots (IRC). Interestingly, this program has the potential to stop a lot of bot net attacks, but the NSA have decided to maintain those capabilities.
  • Quantum Copper –  is seen as perhaps the scariest of the Quantum series because it can corrupt file downloads. Copper can interfere with Transmission Control Protocol/Internet Protocol (TCP/IP) which provides communication between separate internet devices. Copper could create  the Great Firewall of China for the entire planet. Copper could kill every anonymity system that exists by forcing them to reset automatically, just like China does.
  • Quantum Insertion – is a Quantum version of what is known as the Man-on-The-Side attack, to insert information packets by posing as a target website. Notably, you can block Insertion if Transport Layer Security (TLS) is present on your system.
To better understand the Man-on-the-side attack, we turn once again to Salvador Rodriguez of the LA Times:

“To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook.

The federal agency performed what is known as a “man-on-the-side” attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user’s computer and extracted data from their hard drive.

Facebook said it had no knowledge of the NSA”s TURBINE program, according to the National Journal.

The NSA is capable of installing different kinds of malware, each capable of performing different tasks. According to the report, certain malware can:

  • Use a computer’s microphone to record audio
  • Use a computer’s webcam to take photos
  • Record a computer’s Internet browsing history
  • Record login details and passwords use for Web services
  • Log users’ keystrokes
  • Extract data from flash drives when they are plugged into infected computers
  • Block users from accessing certain websites
  • Corrupt files that computers attempt to download [15]
The NSA has fifteen years of data retention, but sometimes jobs are just too difficult for them. In such situations, NSA turns to the United Kingdom’s GCHQ, which is home to the extremely powerful Tempora Program. Malicious hackers, criminals, racketeers, pirates and bad governments operate like thieves who want to break in. A skilled thief always checks the doors of potential targets prior to breaking in, and chooses the door with the fewest locks, or the easiest locks to pick. Unfortunately, Government approved and unregulated dragnet surveillance systems are designed for at-scale exploitation to conduct fishing crusades instead of targeted attacks. Even major corporations like AT&T and Apple willingly install secret computer gear designed to spy on internet traffic. If you’ve ever thought that you have nothing to hide, therefore no reason to care, or you’ve pondered that there’s no way they’ll ever find you because you don’t think you’re interesting, think again; Systems like the Marina System should serve as a sobering reminder to the contrary. It stores webcam photos, contacts, emails, and more, and then links everyone you know and interact with together to create a fingerprint that is unique to you and your internet/worldwide presence. Therefore, you cannot hide from these programs and believing that you won’t be found is a fallacy.

In light of all of this, the reason Edward Snowden stepped forward had more to do with how public perception is managed by means of public relations:

In a recent interview posted by BenSwann.com with Edward Snowden:
He states that his “breaking point” was “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” denying the existence of a domestic spying programs while under questioning in March of last year. Mr. Snowden goes on to state that, “The public had a right to know about these programs. The public had a right to know that which the government is doing in its name, and that which the government is doing against the public”
Jacob Appelbaum tells us that these systems exist in part because we have been kept intentionally vulnerable for the benefit of major corporations to sabotage other companies.
IS THERE ANYTHING WE CAN DO TO PREVENT SPYING AND PROTECT OUR DATA?
Image

So how can you protect yourself from the Orwellian totalitarian oblivion? For starters it is probably a good idea to take the Electronic Frontier Foundation’s advice and keep a sticker pasted over the webcam of your laptop. Whenever possible, use a shielded hardline, protect your WIFI, and keep an old telephone modem in your possession. Remember that the best way of communicating anonymously is by not communicating at all. Protect yourself from social and technical hacking. Be aware of Malware, Ransomware and Adware. Defend against what agents in the biz refer to as “Remote Access,” and “Interdiction.”

Total online anonymity can be achieved if you change your internet browsing habits, usE encryption relay stations like Virtual Private Networks, proxies, TOR, Firefox web browser in private mode, extra secure layers, and securing and encrypting computers to the maximum. Encrypt your data and anonymize your computers and the paths inside them, by changing the Media Access Control (MAC) addresses of the individual parts of the computer by using programs like SMAC or TMAC.
But what about the basics of online access? Let’s start at the foundation: What web browser are you using?

Because all four major web browsers have experienced severe security flaws in the recent past, using the most up-to-date version of Firefox, Chrome, Internet Explorer, or Safari, can empower you to make these browsers much better by installing certain extensions. Alternately, because all four major browser companies may be completely compromised by corporate-owned back doors, the Tor project introduced the Tor Browser to completely anonymize your online activities.

The next step is disabling third-party cookies, which serve no legitimate purpose as they are a complete abomination used to track your behavior online.   Disabling Adobe’s default Flash plugin can help put an end to the endless stream of security problems associated with Flash, and the same goes for Java.

Because Google, Apple and Microsoft have a vested interest in assisting the surveillance state and installing back doors on your computer, it might be a good idea to discontinue the use of their services. Google might make public statements that make everyone feel warm and fuzzy, but its well-known that their search engine logs every keystroke you’ve ever made on it. There are plenty of other search engines that are just as good and include map applications, such as duckduckgo.com, ixquick.com, and bing.com. As far as Email providers go, there are plenty that don’t track and record your behavior, such as riseup.net, yandex.com, hushmail.com and fastmail.fm, just to name a few. Using competeing search engines and Email providers doesn’t ensure the absolute security of your data, but the alternatives don’t have long-standing business deals with intelligence agencies that Google and Macintosh do. And at the very least, if corporations are selling us out, they shouldn’t be rewarded for doing so. We at the outer limits had a gmail account for Email right up until April of 2014 when it became known that Google had been aware of the security bug known as Heartbleed for more than two years and likely were associated with the elements behind Heartbleed. We didn’t see any reason to continue working with Google, so we pulled the plug on our account right then and there and have never looked back.

THE ONION ROUTER

Those interested in the highest level of security will be pleased to learn that the most secure method of internet use just so happens to also be the simplest to acquire and implement. The Onion Router or TOR Network is a nonprofit organization that provides a web browser at torproject.org. The TOR browser benefits users with several layers of encryption routed through computers all over the world that are also connected to the TOR Network. When you access a website with the TOR browser, your signal is proxied through another computer’s internet somewhere in the world, then routed to another computer somewhere else, then to a third, before finally accessing the desired website and routing that information back through the daisy-chain to your computer screen. This effectively hides your IP address and makes NSA’s analysts pull their hair out.

While some shills in the media have sometimes regurgitated talking points from the surveillance state in vein attempts to undermine TOR’s usefulness, the truth of the matter is that NSA has a great amount of difficulty with TOR’s sophistication. Proof of this comes in a slide provided by Edward Snowden entitled, “TOR Stinks,” illustrating the NSA’s frustration in cracking TOR. The agency admits that they will never be able to de-anonymize all TOR users all the time, and can only de-anonymize a very small fraction of TOR users, and only when enacting manual analysis.

Using TOR requires that users adjust their browsing habits as torrenting videos and opening files downloaded through TOR immediately compromises anonymity. And it should be noted that becoming completely anonymous is not the goal, nor is the point to become completely invisible as that is impossible with the present sophistication of NSA, GCHQ and the other agencies of the Five-Eyes Alliance. Merely running TOR strengthens the TOR network, empowering journalists and activists with stronger and faster connections. Running TOR is a way to send a clear communication to the surveillance state that their overreach is not appreciated. Running TOR is a worthy first step to bringing an end to this ridiculous state of affairs. And if NSA ever decides to employ their Quantum Program thus enacting the Great Firewall of China for the entire world, TOR would likely remain active when other browsers are disabled.

BROWSER EXTENSIONS
But what about all the things you can’t do with TOR, like downloading files or streaming videos? Firefox is the next best thing, particularly because it is written and programmed by those who want to keep it free, and thus hosts a ton of sweet add-ons [2].

There are a few open-source and absolutely essential browser extensions that all internet users would do well to employ due to their stability and effectiveness. Ublock, Privacy Badger and HTTPS Everywhere are the best, most up-to-date browser extensions you can use to make your browser more secure and in turn, more efficient. Ublock is a more streamlined version of addons like Adblock Plus and Disconnect; it prevents most advertisements and tracking networks. HTTPS Everywhere automatically switches to secure TLS (Transport Layer Security) connections whenever websites support it, which protects against surveilance of the content of your web browsing. Privacy Badger dynamically detects all attempts to track your browsing behavior and actually blocks content from said trackers.

If you want to make your browsing even more secure, you can add Self Destructing Cookies, No Script, Request Policy, RefControl, Random Agent Spoof, and Canvas Blocker to your browser, however these extensions were designed for more advanced users because they are complicated to use and cause many websites to malfunction due to the high level of interplay between surveillance and the visible internet that exists today.

In other words, these extensions attempt to overcome basic privacy flaws in how web browsers work, but because many websites rely on these privacy flaws for basic functionality, attempts to fix these problems can often make a website stop working.

If you’re using Mozilla Firefox:

  • Self Destructing Cookies (Firefox) will clean out the cookies for a website when all the tabs for that site have been closed (rather than requiring that you restart the browser).
  • NoScript allows you to selectively block Javascript and Java.
  • RequestPolicy enables you to prevent a site from loading any third -party content.
  • RefControl will suppress the HTTP referrer header.
  • Random Agent Spoof will change your User-Agent string randomly.
  • Canvas Blocker will allow you to disable HTML5 canvas support for particular websites.

But then there is the category of privacy extensions that act like a Trojan Horse, actually compromising your security. Despite their popularity, extensions such as Ghostery, Adblock Plus, Disconnect, and Better Privacy provide nothing more than a false sense of security.

  • Adblock Plus used to be the best extension to block ads and tracking. However, now they run a bribery scheme where advertisers can pay to bypass their filters. Also, uBlock is better technology anyway.
  • Disconnect works like uBlock, and is open source. If you are running uBlock, Disconnect is unnecessary, although it has some visualization features that uBlock does not.
  • Ghostery works like uBlock, but has horrible defaults that allow most tracking, and the source code is proprietary.
  • Flash Block (Firefox) is an extension allows you to ‘click to play’ Flash. It is preferable to uninstall Flash. Also, this functionality is now built in.
  • Better Privacy was needed in the past to remove LSO or “Flash cookies,” but since the advent of ClearSiteData API, this is no longer needed.
  • TrackMeNot will generate bogus search traffic. It is an interesting idea, but it is much better to just use DuckDuckGo.
 DROP GOOGLE LIKE A SACK OF ALL-SEEING-EYED POTATOES
Now your browsing habits have to change, and the first step is to drop Google. There are many search engines that do not track data and are thus anonymous. Use ixquick or duckduckgo instead. You have a ton of options for search engines that are not google. But what Email services should we use? And which secure Email providers don’t require monthly payments?[3]
“For email, we can start by dropping Gmail, Outlook.com and Yahoo Mail (Yahoo sucks anyway). There are many useful alternatives, including Hushmail, BitMessage and Riseup, all of which encrypt your emails. Personally, I have started using Yandex Mail, which is a Russian company based in Moscow – if anyone’s safe from the NSA’s eyes, it’s gotta be them, surely. (To switch email providers without any fuss, you can read my post here.)”[4]
Next there is encryption. Friedrich Lindenberg and Christian Stöcker of spielgel.de write:
“For those who don’t use encryption, emails are about as private as postcards. Their content can be intercepted and read by third parties, curious employees of the email provider, for instance, or intelligence analysts.
“What’s more, anyone with the password to a user’s email account, be it a hacker or a disgruntled ex, can read emails they find in this account. That’s why anyone who values their email privacy should use encryption. It’s just that most people don’t take the time.“We recommend using the free email client Thunderbird, the free program GnuPG and the free Thunderbird plugin Enigmail to set up your own encryption. Users who want to go this route, however, must be willing to do two things. First, they have to give up using email providers like Gmail directly from their Internet browsers. And second, they must be willing to spend a bit of time getting the encryption method set up and not be easily put off by some new terminology. Once the encryption system is set up, sending and receiving encrypted emails is easy.” [4]
Last but certainly not least, all these encryption and proxy methods are relatively obsolete if we’re running Operating Systems that are tied up with major technology companies that are in bed with the Five-Eyes Alliance/PRISM-Industrial Complex (Windows, Apple OS X, Google Chrome). Open-source alternatives, like Ubuntu, Debian, and the ever-popular GNU Linux, may seem like an inconvenience at first, but they’re absolutely essential if you’re serious about anonymity, security, privacy or liberty.
The only hurdle is your own potential since these Operating Systems are completely free of charge. There is a profound difference between something that is “free of charge” and something that is free in terms of freedom. The most popular name brands, hosting services, and Email providers are “free” for very different reasons that open-source technology is Free, and the corporate world has default back-doors built into the vast majority of devices available on the market at present. The NSA is about as much a department of the Government as the Federal Reserve is. Corporations have been enthroned, and most of the NSA’s capabilities are used for the benefit of  “National Interests” which translates to Corporate Profits.
Whatever you do, remember to relax. Unclench your jaw, lower your shoulders, and accept that anything you can possibly imagine, however science-fiction it may seem, is not only possible, but probably just the beginning.
HOW MUCH DEEPER DOES THE RABBIT HOLE GO?
stock-footage-digits-tunnel-loop
For every fact learned, we’re left with more questions than answers. We’re just now finding out about the NSA Howler Monkey implant chips with built in radio transmitters. We’re just now learning of the Bulldozer PCI Bus hardware implants. And for many, the CIA’s In-Q-Tel still remains a mysterious subject.
Perhaps most infuriating of all of Snowden’s revelations concerning the Draconian Surveillance Panopticon we see around us now, is the fact that it has never prevented a terrorist attack. If they have access to so much information, one might wonder how media event spectacles like Sandy Hook [10] and the Boston Bombing [11] were ever allowed to take place in the first place – unless these events were false flag events to justify further terror legislation and thus solidify more strength in the military industrial complex. There have already been extensive red flags and plenty of evidence of them. History can corroborate this, most notably from the 1993 World Trade Center bombing that was perpetrated by FBI agents conducting classified operations in New York City – many news outlets reported on the FBI’s involvement [12]. The event didn’t create enough damage for them to pass the new terror legislation needed to bring the police state desired by the ruling class elites. Oklahoma city happened shortly thereafter, and the legislation was passed with little effort -legislation that was waiting for an event to be passed[13]. Something similar happened with 9_11, probably most notably with the plans to invade Afghanistan that were drafted six weeks prior to 9_11. Now a new million-square-foot facility in the Utah desert set to begin operations this year will hold all the world’s information for the next hundred years. The real targets are activists, political enemies, ex girlfriends, but certainly not terrorists.
Because when you look around there really are no “terrorists,” at least insofar as the mainstream media would like you to believe as they hypnotically repeat the word again and again in print and on air. For the same reason the TSA has never prevented a terrorist attack. Terrorists are not Islamic boogie men hiding out in some cave beyond Timbuktu. More people die of peanut allergies than of Islamic terrorism. Christopher Titus put it most eloquently when he said:
“Let’s define ‘terrorist organization.’ A terrorist organization is an organization that makes you feel scared all the time and makes you change your behavior. What does CNN, Fox News, and MSNBC do all the time? That’s right. Wolf Blitzer? Terrorist. Glenn Beck? Terrorist. Nancy Grace? Terrorist.”
The Military-Industrial Complex that carries out unconstitutional Wars, the Corporate Media Whores who justify those wars to John Q. Public, and the Bankers who fund both sides of every conflict all are capital-tee Terrorists if there ever were any. They drop bombs on countries in peacetime, and send troops in times of war. Or as Abraham Lincoln put it, “The money powers prey upon the nation in times of peace, and conspire against it in times of adversity. It is more despotic than monarchy, more insolent than autocracy, more selfish than bureaucracy.”Capital-Tee-Terrorists wear five-thousand-dollar suits, and use money and influence to divide the world against itself, for profit and power. They do this to extract resources and simultaneously emerge the rulers of us all by controlling the movement of resources and access to them. State Terrorism is the only kind of terrorism that ever produced mass casualties, be it false flag events or the wars they orchestrate. The “Terror War” is a war of terror, not on it. The “Drug War” is a war on Consciousness, not on inanimate objects. The “War on Cancer” declared also by Nixon, proposes to cure Cancer with other things that cause cancer (Chemo, Radiation and Surgery). There is a War on everything when you sit down and think about it. But the deadliest form of warfare we know of, could be termed Financial Terrorism. Rigging the game starves entire societies, forces indigenous people to move into cities, and creates waves of debt slaves. Waged unilaterally, the deadliest form of violence is and has always been poverty.
If you think this is paranoid then you’re probably not paranoid enough. Protecting the internet is the most essential task standing before today’s generation. Who controls the internet controls the data, and who controls the data controls the future. The revolution might not be televised, but its record will probably be stored on NSA’s servers. In any event, if you decide to bareback with the internet, remember that you’re riding with the NSA. There are things you can do, but educating yourself is the first step.
Imagesupplemental sources and follow ups:
Image
Gabrielle Lafayette is a journalist, writer, and executive producer for the Outer Limits Radio Show.
Check out the more frequently updated tumblr page at outerlimitsradioshow.tumblr.com
Contact the research team at outerlimitsradioshow@fastmail.fm

The Patriot Act’s New Clothes

20150601_freedumbDO YOU PREFER “FREEDOM” OR “PATRIOTISM”?

Last week we focused our attention upon the expiration of the so-called USA PATRIOT Act, or Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, and all of the corporate and government shenanigans associated with it. We know our communications are being recorded and stored in the name of “National Security” – a blanket term that’s used when powerful agencies and companies engage in blatantly illegal behavior. But that’s all over now because the so-called Patriot Act expired on Sunday night, right?

Well, no, not exactly.

There’s a lot of hubbub in the media patting Rand Paul on the back for his vow to force the expiration of the unconstitutional legislation plaguing America since the autumn of 2001. There’s a suspicious celebration of this new USA Freedom Act. And there’s a pesky weed sprouting up yet again in America’s minds that our national spy networks use of corrupt overreach is a problem that can somehow be solved politically.

But let’s get real about what’s actually happened here. Rand Paul might have gummed up the works for a minute, but the so-called Patriot Act’s expiration on Monday morning changes absolutely nothing.

First of all, as we mentioned last week, NSA dragnet surveillance programs did not begin in 2001 with the creation of the Patriot Act. George W. Bush may have institutionalized surveillance in the minds of Americans as acceptable by assuring them it would “keep them safe,” but Anglo-American spy agencies were recording every communication with ECHELON, MINARET, SHAMROCK, COINTELPRO, CHAOS, and countless other operations in the decades prior, that birthed what we know of today as Signals Intelligence or SIGINT.

Secondly, the NSA never needed the Patriot Act to conduct their unconstitutional surveillance on Americans in the first place. Jim Sensenbrenner, one of the chief architects of the Patriot Act, never intended for it to be used in the way that intelligence, spy and surveillance agencies and their associated contractors have. These agencies instituted a secret interpretation of the wording of the act to legally justify their illegal actions.

Third, the sudden passage of the USA Freedom Act on Tuesday immediately followed the expiration of the USA Patriot Act, which stinks of the tried-and-true methods of psychological manipulations employed by the public relations industry in the past – give the people a fake solution so that they’ll go back to sleep. What they’ve done is effectively replaced a red apple for a green apple, which is decidedly a red herring that everyone should be well aware of. Just like the Patriot Act, the Freedom Act’s name derives from a comically over-thought acronym that stands for the “Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring” Act.

Civil liberties advocates are hailing it as a great step forward from the dark days of the Patriot Act, celebrating the first reform of surveillance laws in well over a decade.Don’t believe the hype, though. The Freedom Act is nothing more than a new Patriot Act 2.0. It will perpetuate the same behavior from the intelligence community and the corporations that own it.

As Sonali Kolhatkar pointed out this week, “Activist groups like Demand Progress, Credo and Fight for the Future have unanimously declared that, ‘The USA Freedom Act is a mass surveillance bill dressed up as a reform bill, and its passage will authorize unconstitutional surveillance practices’.”

Sunday night the EFF posted on their website, “Don’t Worry, the Government Still Has Plenty of Surveillance Power If Section 215 Sunsets.” The long journey to stop surveillance has only just begun.

BBC News even admits that key parts of the Patriot Act are retained in the Freedom Act.

nsa-wiretapsDOUBLETHINK

With all of this doublespeak its no wonder so many of us have become apathetic about the political process. The confusion is anything but accidental. The system is deliberately structured to make us bewildered. Just as the language of Wall Street is so confusing you’d have to be crazy to bother learning its dogmatic lexicon, the architecture of our political process intentionally baffles and frustrates the common people into complete indifference. For ordinary citizens who realize these things but don’t quite comprehend the extent of the issue or what should be done, the recent surveillance debate has been nothing short of confounding.

For one thing the vast majority of us are struggling every day just to make ends meet, so we don’t have much time or energy to pay attention to current events, the finer points of one bill versus another, or the congressional procedures involved in the passage of legislation. And even for those who do have the time and the will to take a look, its dry, boring, intimidating, draining, confusing, and at the end of the day seemingly irrelevant. If we internalize the learned helplessness that this Empire has instilled into us with miseducation, the psychology of advertising, and near-total control of mainstream propaganda, what’s to stop the average person from tossing their hands up in disgust while declaring, “Who cares? There’s nothing I can do about it anyway!” And who can blame them?

For one thing we read in the newspapers in the lead up to the Patriot Act’s expiration that the Senate failed to pass the new Freedom Act. But then just a few days later all the headlines proclaimed just the opposite – that the Senate passed the Freedom Act.

Just to clear the air, this piece of legislation was introduced in the Senate as S.1123 on May 12th but failed to pass. Then it was introduced in the House as H.R.2048 and passed the House on May 13th before the Senate passed the House version of the bill on June 2nd and it was signed into law by the President on the same day. So Sunday’s heated Senate session that failed to produce an eleventh-hour extension could be construed as a contrived distraction since they immediately turned around to pass a revised version of the Freedom Act on Tuesday anyway, which is in essence nothing more than a carefully revised Patriot Act.

You’ve probably noticed over the years that these laws are always labeled with emotionally evocative titles, like “The Milk For Cute Babies and Kittens Act.” Who could possibly be against that? In this case, Congress might as well have wasted our time debating whether it is nobler to choose between “Patriotism” or “Freedom.” Retired NSA whistleblower Kirk Wiebe who spent 36 years in the intelligence community, admits that the names of these bills “are designed to elicit emotion with words like Patriot Act and Freedom Act. It’s all psychological manipulation.”

Wiebe summarized the kind of aversion we need to adopt in our thinking on this issue, saying, “We have a variety of organizations that constitute a huge intelligence police apparatus, and it’s being turned against the American people under the explanation that ‘We need to protect you.’ My goodness, that is used by every tyrannical government in history!” prism

Rand Paul pointed out the major weakness in the Freedom Act is that the records of many millions of phone calls would no longer go to the NSA, where such data has been stored in the past. Instead they will now remain with the phone companies. Intelligence agencies could retrieve the records only with the approval of the Foreign Intelligence Surveillance Court, which operates in secret. “We may be replacing one form of bulk collecting with another,” Paul told the Senate on Sunday.

Rand Paul’s message was on point, but since he’s going to run for president next year, the likelihood that his stance was nothing more than a distracting bit of political rig’a’ma’roll is a possibility that becomes more probable the more you think about it. Even if his message was genuine, the vast majority of the other representatives are bought and paid for – just look at their campaign financiers for proof of this assertion. Whomever has the money gets the election, and we know who provides the money in this system.

The Electronic Frontier Foundation – who have expressed optimism about the Freedom Act – admit that it doesn’t go nearly far enough because now we’re entrusting the corporations to follow the law, which they probably won’t. And this isn’t just about one agency or another since the powerful all work together. More than 70% of NSA’s employees are privately contracted by agencies like Booz Allen Hamilton, the firm that Edward Snowden used to work for.

Speaking to the Guardian newspaper this week, Daniel Ellsberg, the man who leaked the Pentagon Papers, said of the new law, “The USA Freedom Act is hardly any better than the Patriot Act, as it still violates a lot of our constitutional rights.”

The only freedom the so-called Freedom Act will provide, is the freedom for Corporations and Intelligence agencies to justify unconstitutional surveillance on everyone with the same legal loopholes provided to them by their secret interpretations of the new statutes. Sure, their lawyers will have to scramble for a few months to write up the specifics of how exactly they’re going to defend their position in front of Congress should that ever happen again, but when was the last time these agencies followed the laws as written?

Legally speaking, NSA has always denied the extent of their surveillance, and when push ever comes to shove can hide behind a technicality that allows the to share data with other members within the Five Eyes Alliance. They might be forbidden from collecting data on Americans, but Britain’s equivalent of the NSA called the Government Communications Headquarters or GCHQ can collect on Americans and then share that data with NSA or FBI.

And the persecution of whistleblowers is likely to continue under the USA Freedom Act. In fact it’s rather likely that whistleblowers will be oppressed even more tyrannically now that Snowden has stepped forward.

The NSA has been violating written laws for decades and has defended such violations quite vociferously. Disregarding constitutional rights is exactly how the NSA got to this point. The government never got a warrant for any invasion of privacy they now take for granted as standard procedure. And a recent Federal court ruling found that the Patriot Act didn’t authorize the degree of intrusive dragnets in which the government has been engaged. So now the same people who got us into this mess have passed an act with the word “FREEDOM” in it in place of the word “PATRIOT” and we’re really naïve enough to think things are going to change? – that they’re just going to say, “Oh well, I guess we have to follow the law now,” and give up control just like that?

Get Real!

I HATE TO BURST YOUR BUBBLE, BUT THEY’RE STILL LISTENING

In an article entitled “Dear NSA: This Call Will Not Be Recorded, Eugene Robinson writes:

“I made a phone call at 12:01 a.m. Monday, and it felt good. For the first time in years, the number I dialed on my iPhone was not captured and stored in a massive government database. Since it was an inconvenient hour, I called my office phone, knowing it would go to voicemail. But I wanted to make the point that an important principle was again being honored: Unless I’m suspected of some involvement with terrorism, it’s none of the National Security Agency’s business whom I talk to. Or when. Or why. … When the relevant parts of the Patriot Act expired, the NSA lost its legal authorization to track the usage of my phone—and yours.”

Robinson would be correct if bulk surveillance collection had actually ended at midnight on Monday, but it didn’t. There’s actually a six-month grace period before any substantive changes will be made, and that’s a best-case scenario. In fact, the Obama administration intends to use part of a law banning the bulk collection of US phone records to temporarily restart the bulk collection of US phone records.

US officials contend they will ask a secret surveillance court to revive the program – deemed illegal by a federal appeals court – all in the name of “transitioning” the domestic surveillance effort to the telephone companies that generate the so-called “call detail records” the government seeks to access.

The unconventional and unexpected legal circumstance depends on a section of the USA Freedom Act, which Obama signed into law on Tuesday, that provides a six-month grace period to prepare the surveillance and legal bureaucracies for a world in which the National Security Agency is no longer the repository of bulk US phone metadata. The Freedom Act’s ban of mass surveillance reads that it “shall take effect on the date that is 180 days after the date of the enactment of this Act”. During that time, the act’s ban on bulk collection will not yet take effect, and they weren’t shut down as of Sunday night.

There is no on/off toggle switch for these intelligence programs within the houses of Congress, and this supposed shut down hasn’t had any more effect on the NSA than the budgetary shutdown of our National Parks could have prevented rivers from flowing or trees from growing within the Parks. The Patriot Act’s 215 provision may have expired on Sunday night, but the government is arguing that it “needs to restart the program in order to end it,” which provides a nice preview of what the future holds – an endless list of excuses but no real changes.

But Robinson continues:

“Assuming the agency obeys the law, the balance between liberty and security has been sensibly rebalanced.”

This last sentence really hits the nail squarely on the head, because we would be rather gullible to assume the agency has any intention of obeying the laws as they are written – or more importantly, as the public would interpret them. Because remember, statutes are not written in English – they’re written in Legalese, which is a different language used by courts and banks to exploit the people, and it’s a language that requires a copy of Black’s Law Dictionary and one hell-of-a-lot of patience to understand properly.

All this adds up to a lot of possible loopholes, the biggest one being the Freedom Act’s reliance on the phone companies, which are part of a web of telecommunication companies, Internet providers, tech companies and others on the information superhighway that work hand-in-hand with the federal government. Most importantly, we won’t know how the secretive FISA court will regulate the process. As the Electric Frontier Foundation stated, the journey to bring the national security apparatus under control has just begun.

There’s still much to be done. If the American people start to organize there is still time to make the necessary steps to salvage what’s left of our Constitutional Republic. As long as we’re reforming surveillance laws, we can focus our attention on the next series of sunsets. For example, certain provisions of the Foreign Intelligence Surveillance Amendments Act are scheduled to sunset in 2017, including Section 702, one of the main legal authorities the government relies on to engage in mass surveillance of people’s online communications. There’s also Executive Order 12333, which provides carte blanche for NSA’s worldwide dragnet, and the obsession with classification that prevents accountability, transparency and oversight all in the name of “National Security.”

UNITY THROUGH FEAR

Let’s get real about the justifications behind the so-called PATRIOT Act. The whole issue of government surveillance was mainstreamed by 9/11, which has been used to justify crimes too numerous to articulate. History’s rhyme scheme again knocks loudly in the form of something Adolf Hitler once said, that “The people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country.”

Anti-war activists protesting the illegal wars in Iraq and Afghanistan, as well as journalists reporting on the illegal activities of NSA and JSOC have all been denounced as villains, granting authorities the vindication to search the communications records of anyone suspected of being a “terrorist.” Just look at the more than 1.5 million names the government has added to its Terrorist Watch List in the past five years. They even charged Reverend Billy with terrorism in 2013 for singing songs in a bank. The “T” word is being thrown around so loosely that its beginning to lose its meaning, as it no longer signifies a genuine threat, but instead indicates anyone who opposes the status quo however peacefully, including activists, journalists and whistleblowers.

September 11th scared the bejesus out of the entire country and this abomination was pushed as an anti-terrorism measure, but it should be clear by now that it was never about the existential threat of “terrorism,” (a threat that our secret military programs have themselves deliberately created) and it wasn’t that it was written hastily in response the 9/11 event. NeoConservative bureaucrats have clearly had such an assault on civil liberties and the US Constitution prepared in the 1990s and further published their plans in the Project for a New American Century a year prior to 9/11, admitting that the new level of imperial mobilization and resource exploitation they desired to further concentrate wealth and power would be difficult to exact, “absent some catastrophic and catalyzing event – like a new Pearl Harbor.”  Not long afterward, late one afternoon, the 1100 page Patriot Act was swiftly dropped on Congress who were expected to vote on it the very next day. Its obviously doubtful at best that anyone was able to even read it. But the point is that the bill was prepared in advance and ready to go when the timing was convenient. It was a preexisting conspiracy, just as were the plans to invade Afghanistan, drafted months ahead of 9/11.

But in all the debate surrounding the so-called Patriot Act, the intelligence community has never been able to claim a single fruitful investigation of terrorism that originated with phone data. Instead, analysts have delved into the haystack to corroborate and expand upon information obtained by other means such as interrogating prisoners, coercing people to become informants, and examining seized documents.

If the job of the intelligence network is to prevent terrorism, when has the government actually stopped terrorist acts over the last 14 years, after 9/11 justified the expansion of these surveillance programs? As we stated last week, there is no evidence that this massive domestic surveillance program rolled up a single terrorist plot, but plenty of evidence that it was misused. This is a point so important it needs to be repeated again and again – after all, the slogan, “We Shall Never Forget,” is a double-edged sword that cuts both ways.

We shall never forget the report by the Justice Department’s inspector general who stated that the FBI “did not identify any major case developments that resulted from use of the records obtained in response to Section 215 orders.”

The phone dragnet has never found a terrorist. The only incident that intelligence agencies say they used it for was finding a guy who sent $8,500 to Somalian militant rebel group al-Shabab, and this dude was trying to fight back against the Kenyan invasion of Somalia, which has nothing to do with the security of America whatsoever.

Contrary to popular belief, several instances of terrorism such as the Boston Marathon bombing were known in advance by the top officials and allowed to happen. Because rather than harming terrorists, the government consistently works to harm us.

On the same day the USA Freedom Act was passed, the Associated Press released a shocking investigative report on FBI surveillance. According to the report, “[t]he FBI is operating a small air force with scores of low-flying planes across the country carrying video and, at times, cellphone surveillance technology–all hidden behind fictitious companies that are fronts for the government.” For years, reports of suspicious-looking planes flying over neighborhoods fueled fears of government surveillance, including during recent protests in Baltimore after the police-custody death of Freddie Gray. The Associated Press report confirms those fears. And AP investigators have found that the use of these surveillance aircraft is so astonishingly widespread that “In a recent 30-day period, the agency flew above more than 30 cities in 11 states across the country.”

We also now know that NSA’s surveillance is shared with the Drug Enforcement Agency, which uses it to prosecute drug dealers but routinely lies to judges about how the case developed. Looking over the numbers its easy to see that the Patriot Act has almost never been used for terrorism cases but more for drug busts and a crack down of civil groups practicing their right to dissent. In many of these cases the illegal actions of the NSA is causing unjust incrimination of citizens not defying state law. While it might be hard for those on the straight-and-narrow to sympathize here, whenever law enforcement acts unconstitutionally and illegally, it harms us all. And its easy for most of us to say, “Well that’s no problem for me – after all, I’m not a drug dealer and I don’t March Against Monsanto, so this doesn’t affect me at all.” But let’s allow CIA whistleblower John Kiriakou to be the first to pop that bubble when he says, “Wake up America – you’re next.” If the routine military raids on organic farms or methodical murder of unarmed black men in urban areas, or the IRS’s targeting of political adversaries isn’t a warning to this effect, I don’t know what is.

HAS ANYTHING CHANGED?

So how does the Freedom Act differ from the Patriot Act?

Not much.

The most significant change is that call records will now remain with the phone companies, at least in theory and on paper. But they are still recording the content of every call, every email, and every communication, and the NSA will probably need only the most minuscule thread to be granted access.

As Juan Cole pointed out this week, “The spy network will likely be only slightly inconvenienced by
the expiration of the misnamed “PATRIOT Act.”

So does it make any difference whatsoever if phone records are held by the telecom companies instead of the government? After all, the corporate monolith has successfully gained control over our government institutions by buying them. Government used to regulate corporate power, and the media used to regulate government power. But now these systems of checks and balances have mutated into the corporate-owned hegemony we see before us. And we would do well to remember that the definition of Fascism is the merging of corporate and government forces.

Warrantless and general searches through people’s papers without probable cause was one of the sparks that set off the first American Revolution. The Fourth Amendment was enacted to ensure that the abuses that occurred under the crown would not continue in our Constitutional Republic. In 2001 the PATRIOT Act abrogated the Fourth Amendment, which used to say:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Section 213 of the unconstitutional Patriot Act allowed “sneak and peak” searches, where law enforcement did not even tell the suspect that his or her premises were being searched. Only half-of-a-percent of searches (0.5%) conducted with these secret warrants actually involved terrorism. Mostly they have been used in the “war on drugs,” which we know is more about keeping the poor impoverished and imprisoned, as well as an attempt by liquor and pharmaceutical companies to eliminate the competition posed by marijuana and other ancient, unregulated medicines.

Our fourth amendment was crafted to make general warrants illegal. Even British courts under the monarchy in the 18th century pushed back against the crown’s assertion of a right to snoop into someone’s papers with no probable cause and no specific warrant. George W. Bush and Barack Obama have both laid claim to a power that even the monarchical King George III never did, and Americans kicked King George III off this continent for being too nosy.

History may not repeat, but it does rhyme. The Patriot Act was all-too reminiscent of the British Sedition Act and eve more recently, the German Enabling Act.

German Justice Minister Herta Daeubler-Gmelin pointed out that George Bush used Iraq to distract the American public from his failed domestic policies, reminding her audience, “That’s a popular method. Even Hitler did that.”

Hitler came to power legally; that the Nazi party were elected democratically in a time of great national turmoil and crisis; that they were funded and ultimately ushered into power by wealthy industrialists looking for government favors.

History teaches us that it is shockingly easy to separate reasonable and intelligent people from their rights. A legally elected leader and party can easily manipulate national events to whip up fear, crucify scapegoats, gag dissenters, and convince the masses that their liberties must be suspended (temporarily, of course) in the name of restoring order, “for your protection.”

When the shooting started at Lexington Green in 1775, those calling themselves patriots were those who refused to yield their rights to an increasingly oppressive government. According to John Ashcroft’s Patriot Act, the modern “Patriot” is someone who kneels down in fear, and hands over all inherent rights to the government. But John Ashcroft and George W. Bush were and are just another chapter in the continuity of a regime that hijacked this country a long time ago.

After America placed her faith in Barack Obama, she was shocked to find his demeanor a carbon-copy facsimile of previous administrations, making the reign of Obama the biggest disappointment since George Lucas’ Star Wars Prequels. If the Freedom Act is the Patriot Act 2.0, Barack Obama is certainly George W. Bush’s upgrade.

As an individual, Obama has demonstrated disinterest in acknowledging the Fourth Amendment. PBS Frontline recently revealed that NSA didn’t even bother to read Obama into its massive domestic surveillance program until 2010, two years into his first term, and that when they did, he just sat nodding complacent approval. It’s led some to wonder if he has been blackmailed in some way, but the reality is much simpler that that. The truth is that the human being named Barack Obama cannot suspend domestic spying programs, any more than he can institute mandatory GMO labeling or end America’s global war and bring the troops home, because organizations far more powerful who have been at this for far longer than he has brought those things into existence and are not about to relinquish on their investment of domination. Furthermore, if the spy agencies have any dirt on any politician, they can ruin them, which is yet another reason why surveillance is fundamentally corrosive to democracy and a menace that leaves the door to fascism wide open.

AT LEAST WE’RE HAVING THE CONVERSATION FINALLY

Juan Cole emphasized this week that the present conversation taking steps toward restoring liberty in this country would not have occurred without the revelations provided by Edward Snowden that publicized just how out of control the National Security Agency is, disclosing how executive orders are used to authorize absolutely outrageous warrantless snooping into the affairs of millions. Even senators like Ron Wyden of Oregon, who knew what the US government was doing in secret, could not openly blow the whistle because they would be instantly arrested.

Snowden scarified a relatively luxurious life to do what he did, and has since been charged with accusations that become more silly the more you think about them, because its obvious that he has put no one’s safety in danger, except the mafioso criminals at the top of the pyramid. Those criminals scrambled to charge him with “unauthorized communication of national defense information” and giving such material to an unauthorized person. Federal officials relied on a World War I-era Espionage Act from 1917 for the charges; an favorite of the Obama administration that has indicted seven whistleblowers in just a few short years. Compare that with the three Espionage Act indictments in the previous century. Ed would face an absolutely draconian prison sentence if he ever chose to give up his Russian exile, so it’s rather unlikely he’ll ever get to see his family again unless the cancerous tumors infecting the military-industrial complex metastasizing throughout every one of our social institutions is uprooted and restored with something more sane.

Snowden’s dramatic change of heart no-doubt came as a surprise to NSA. Ed’s mother works for the federal court system, and his father and grandfather were officers in the Coast Guard officers. In fact, his grandfather was present at the Pentagon when it was hit on 9/11. And his own military experience illustrates someone who believed the commercials about “Be All You Can Be.” Ed trained in the U.S. Army Special Forces for four months. After he broke both of his legs in training, his exceptional computer skills landed him a security guard job in top CIA technical posts before he ended up working for NSA as a private contractor. His concern for the civil liberties of Americans became a greater concern that his superior’s refused to acknowledge that NSA spying programs were blatantly unconstitutional. And the rest is history, but by now it should become more apparent why the intelligence community considers veterans a grave threat to quote “National Security.” In this case, National Security is code to signify that if the American people found out the truth there would be revolution before tomorrow morning, and it would be led by our best and brightest – the veterans who come home from our illegal war zones with a different perspective than they did as naïve recruits, thirsty for blood from the brainwashing of war culture, the celebration of war in films, the glorification of violence in Call of Duty, Halo and Medal of Honor, and the puerile proclamation of war on anything that makes the society uncomfortable, from the war on cancer to the war on drugs to the war on poverty and beyond. Veterans have seen the truth with their own eyes, but this society rarely wants to hear what they have to say because their story is counter to the narrative of our propagandists at the Public Relations firms who make us feel fuzzy about imperialistic genocide done in the name of Christ and wrapped in the American Flag.

Kirk Wiebe recently remarked that, “We are truly witnessing—and I mean it in the most serious sense—the ascension of the police state. Some people call it ‘fascism.’”

With the passage of the Freedom Act, NSA and FISA might not change their tune, but on the bright side they are slightly more transparent and legally accountable than they were a week ago. Will this moment be marked by history as a turning point or just another accommodation to placate the masses back into thoughtless complacency?

Our rights and liberties are nowhere near what they were prior to 9/11, but it seems as though we’re at least playing with the idea of taking a step in the right direction. Surveillance powers will always be abused to intimidate, harass, and to subvert social movements and their leaders. Rather than discussing the details of how much we would like to curb the government’s all-seeing eyes, we would do well to question the legitimacy of these programs and push back as hard as possible against their dubious and unfounded claims to protect us. But are Americans capable of peering deep enough into the looking-glass to see past the propaganda of those who seek to preserve their power at our expense?

What we have now is momentum, which is difficult to acquire. Now that we have it, we must keep it going, and push it in the right direction. Those who love peace must learn to organize as effectively as those who love war. Organized, politically-savvy, articulate, and educated activists strike fear into the black heart of the oligarchy. Let us keep this going.

simpsons-nsa1-1024x576Gabrielle Lafayette is a journalist, writer, and executive producer for the Outer Limits Radio Show.
Catch the cloudcast at mixcloud.com/outerlimitsradioshow
Check out the more frequently updated tumblr page at outerlimitsradioshow.tumblr.com
Contact the research team at outerlimitsradioshow@fastmail.fm