Barack and his Orwellian siblings.

I'm Watermark

Diabetic
I personally do not believe the U.S. Government is controlled by shadowy figures lurking behind a smoke smoke screen of faux democracy. If anything, the political and social events of the last few years are evidence that no one is ultimately "in control" and that every player, from the President to the Speaker to captains of industry, is each equally frustrated. If the United States were a software program, it's clearly poorly maintained with many hasty hacks working around several buggy components.

However, I have friends who see smoke screens everywhere. One of my friends is convinced that the proverbial jackbooted thugs with ATF and FBI badges are going to take his guns away. While he is otherwise a normal family man he see ominous signs where I can't find them. He's talked this way for over 10 years. His paranoia has nothing to do with Obama or the attention the media pays to lunatic murderers. From the first day I met him he tried to clue me into the plot of a bad Hollywood movie where he is the hero and the rest of us are fools.

Another friend of mine is very technical and a wannabe member of Anonymous. In most respects he is completely normal: He has great tech job and a great family. He is absolutely sure the CIA and the NSA are listening to his phone conversations and reading his email, text messages, and Facebook posts. He tweets random links just to throw the bad guys off. Like my gun-owning friend he too has been acting this way for more than a decade. If he takes a liking to you, he will pull you aside, in a public place, cover his mouth to thwart lip reading cameras, and explain how every keystroke we type is logged into a secret government cloud for nefarious purposes. This behavior has been going on long enough that it clearly has nothing to do with cyber-surveillance, The Matrix, or over zealous prosecutors throwing the book at idealistic hacktivists.

While these guys seem to represent two very different extremes they do share a common thread (beside a form of tightly focused mania).

Guns and computers are powerful tools. In the right hands they level the playing field for individuals and make it more difficult for an organized group of bullies to boss us around. In the wrong hands, or in misguided, immature, or emotionally unstable hands, both guns and computers are powerful weapons, creating tragedies.

There is an argument that gun control or restrictions on the free flow of information only harms law abiding citizens. The criminals, shooters, and cyber thieves, will get their hands on guns and hacking tools anyway, as they disregard laws without compunction. That's clearly true about the criminals.

But we need mostly to protect ourselves from ourselves. The gun nut, who is a model citizen, really doesn't need many guns to exercise his second amendment rights. The cyber nut, who always returns library books, really doesn't need tools to control botnets. They certainly don't need armor piercing bullets or strong crypto. They are both going to get themselves in trouble. They will piss off the wrong people and get into a fight for no other reason that it's kinda cool to use your weapons for a just cause (the trap of righteous indignation).

When I imply my friends will draw the attention of the wrong people, I don't mean the government, the shadow government, Anonymous, or the Illuminati. I mean other guys like them only more crazy. Gun nuts with bigger agendas or cyber nuts looking for credit cards and social security numbers. Or they will get their family members in trouble. No matter how many locks you put on your gun safe or how many characters in your passwords, your kids always seem to circumvent your safeguards. Kids are natural hackers.

This is why I'm an advocate for both sensible gun safety and sensible intellectual property laws. And before you start yelling at me how any compromise in principles leads to a slippery slope remember that an argument is a rhetorical tool used to win a contest of words. "Slippery slope" is a tool and when it's misused, it becomes a fallacy.

If you are truly worried about the big brother or big government stealing our constitutional rights, words are, and will continue to be, our best and most powerful weapons that keep us free. In a war of words there is no collateral damage, and in the end everyone gets to walk away and play again another day.

http://www.huffingtonpost.com/john-..._2559200.html?utm_hp_ref=politics&ir=Politics

r-OBAMA-huge.jpg


George-Orwell-at-his-type-010.jpg
 
[h=1]Pentagon's new massive expansion of 'cyber-security' unit is about everything except defense[/h] Cyber-threats are the new pretext to justify expansion of power and profit for the public-private National Security State




As the US government depicts the Defense Department as shrinking due to budgetary constraints, the Washington Post this morning announces "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold." Specifically, says the New York Times this morning, "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900." The Post describes this expansion as "part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force." This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and American citizens.
The Pentagon's rhetorical justification for this expansion is deeply misleading. Beyond that, these activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as always, there is a small army of private-sector corporations who will benefit most from this expansion.
[h=2]Disguising aggression as "defense"[/h]Let's begin with the way this so-called "cyber-security" expansion has been marketed. It is part of a sustained campaign which, quite typically, relies on blatant fear-mongering.
In March, 2010, the Washington Post published an amazing Op-Ed by Adm. Michael McConnell, Bush's former Director of National Intelligence and a past and current executive with Booz Allen, a firm representing numerous corporate contractors which profit enormously each time the government expands its "cyber-security" activities. McConnell's career over the last two decades - both at Booz, Allen and inside the government - has been devoted to accelerating the merger between the government and private sector in all intelligence, surveillance and national security matters (it was he who led the successful campaign to retroactively immunize the telecom giants for their participation in the illegal NSA domestic spying program). Privatizing government cyber-spying and cyber-warfare is his primary focus now.
McConnell's Op-Ed was as alarmist and hysterical as possible. Claiming that "the United States is fighting a cyber-war today, and we are losing", it warned that "chaos would result" from an enemy cyber-attack on US financial systems and that "our power grids, air and ground transportation, telecommunications, and water-filtration systems are in jeopardy as well." Based on these threats, McConnell advocated that "we" - meaning "the government and the private sector" - "need to develop an early-warning system to monitor cyberspace" and that "we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable." As Wired's Ryan Singel wrote: "He's talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Agency can pinpoint users and their computers for retaliation."
The same week the Post published McConnell's extraordinary Op-Ed, the Obama White House issued its own fear-mongering decree on cyber-threats, depicting the US as a vulnerable victim to cyber-aggression. It began with this sentence: "President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter." It announced that "the Executive Branch was directed to work closely with all key players in US cybersecurity, including state and local governments and the private sector" and to "strengthen public/private partnerships", and specifically announced Obama's intent to "to implement the recommendations of the Cyberspace Policy Review built on the Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush."
Since then, the fear-mongering rhetoric from government officials has relentlessly intensified, all devoted to scaring citizens into believing that the US is at serious risk of cataclysmic cyber-attacks from "aggressors". This all culminated when Defense Secretary Leon Panetta, last October, warned of what he called a "cyber-Pearl Harbor". This "would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability." Identifying China, Iran, and terrorist groups, he outlined a parade of horribles scarier than anything since Condoleezza Rice's 2002 Iraqi "mushroom cloud":
"An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country."
As usual, though, reality is exactly the opposite. This massive new expenditure of money is not primarily devoted to defending against cyber-aggressors. The US itself is the world's leading cyber-aggressor. A major purpose of this expansion is to strengthen the US's ability to destroy other nations with cyber-attacks. Indeed, even the Post report notes that a major component of this new expansion is to "conduct offensive computer operations against foreign adversaries".
It is the US - not Iran, Russia or "terror" groups - which already is the first nation (in partnership with Israel) to aggressively deploy a highly sophisticated and extremely dangerous cyber-attack. Last June, the New York Times' David Sanger reported what most of the world had already suspected: "From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons." In fact, Obama "decided to accelerate the attacks . . . even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet." According to the Sanger's report, Obama himself understood the significance of the US decision to be the first to use serious and aggressive cyber-warfare:
"Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons - even under the most careful and limited circumstances - could enable other countries, terrorists or hackers to justify their own attacks

http://www.guardian.co.uk/commentisfree/2013/jan/28/pentagon-cyber-security-expansion-stuxnet
 
Back
Top