Olduvaiblog: Musings on the coming collapse

Home » Posts tagged 'Edward Snowden'

Tag Archives: Edward Snowden

This house would call Edward Snowden a hero.

This house would call Edward Snowden a hero.

Video and Transcript – Oxford Union Debate

Chris Hedges speech arguing in favor of the proposition “This house would call Edward Snowden a hero.”

 

I have been to war. I have seen physical courage. But this kind of courage is not moral courage. Very few of even the bravest warriors have moral courage. For moral courage means to defy the crowd, to stand up as a solitary individual, to shun the intoxicating embrace of comradeship, to be disobedient to authority, even at the risk of your life, for a higher principle. And with moral courage comes persecution.

The American Army pilot Hugh Thompson had moral courage. He landed his helicopter between a platoon of U.S. soldiers and 10 terrified Vietnamese civilians during the My Lai massacre. He ordered his gunner to fire his M60 machine gun on the advancing U.S. soldiers if they began to shoot the villagers. And for this act of moral courage, Thompson, like Snowden, was hounded and reviled. Moral courage always looks like this. It is always defined by the state as treason—the Army attempted to cover up the massacre and court-martial Thompson. It is the courage to act and to speak the truth. Thompson had it. Daniel Ellsberg had it. Martin Luther King had it. What those in authority once said about them they say today about Snowden. 

“My country, right or wrong” is the moral equivalent of “my mother, drunk or sober,” G.K. Chesterton reminded us.

So let me speak to you about those drunk with the power to sweep up all your email correspondence, your tweets, your Web searches, your phone records, your file transfers, your live chats, your financial data, your medical data, your criminal and civil court records and your movements, those who are awash in billions upon billions of taxpayer dollars, those who have banks of sophisticated computer systems, along with biosensors, scanners, face recognition technologies and miniature drones, those who have obliterated your anonymity, your privacy and, yes, your liberty.

There is no free press without the ability of the reporters to protect the confidentiality of those who have the moral courage to make public the abuse of power. Those few individuals inside government who dared to speak out about the system of mass surveillance have been charged as spies or hounded into exile. An omnipresent surveillance state—and I covered the East German Stasi state—creates a climate of paranoia and fear. It makes democratic dissent impossible. Any state that has the ability to inflict full-spectrum dominance on its citizens is not a free state. It does not matter if it does not use this capacity today; it will use it, history has shown, should it feel threatened or seek greater control. The goal of wholesale surveillance, as Hannah Arendt wrote, is not, in the end, to discover crimes, “but to be on hand when the government decides to arrest a certain category of the population.” The relationship between those who are constantly watched and tracked and those who watch and track them is the relationship between masters and slaves.

Those who wield this unchecked power become delusional. Gen. Keith Alexander, the director of the National Security Agency, hired a Hollywood set designer to turn his command center at Fort Meade into a replica of the bridge of the starship Enterprise so he could sit in the captain’s chair and pretend he was Jean-Luc Picard. James Clapper, the director of national intelligence, had the audacity to lie under oath to Congress. This spectacle was a rare glimpse into the absurdist theater that now characterizes American political life. A congressional oversight committee holds public hearings. It is lied to. It knows it is being lied to. The person who lies knows the committee members know he is lying. And the committee, to protect their security clearances, says and does nothing.

These voyeurs listen to everyone and everything. They bugged the conclave that elected the new pope. They bugged the German Chancellor Angela Merkel. They bugged most of the leaders of Europe. They intercepted the talking points of U.N. Secretary-General Ban Ki-moon ahead of a meeting with President Obama. Perhaps the esteemed opposition can enlighten us as to the security threats posed by the conclave of Catholic cardinals, the German chancellor and the U.N. secretary-general. They bugged business like the Brazilian oil company Petrobras and American law firms engaged in trade deals with Indochina for shrimp and clove cigarettes. They carried out a major eavesdropping effort focused on the United Nations Climate Change Conference in Bali in 2007. They bugged their ex-lovers, their wives and their girlfriends. And the NSA stores our data in perpetuity.

I was a plaintiff before the Supreme Court in a case that challenged the warrantless wiretapping, a case dismissed because the court believed the government’s assertion that our concern about surveillance was “speculation.” We had, the court said, no standing … no right to bring the case. And we had no way to challenge this assertion—which we now know to be a lie—until Snowden.

In the United States the Fourth Amendment limits the state’s ability to search and seize to a specific place, time and event approved by a magistrate. And it is impossible to square the bluntness of the Fourth Amendment with the arbitrary search and seizure of all our personal communications. Former Vice President Al Gore said, correctly, that Snowden disclosed evidence of crimes against the United States Constitution.

We who have been fighting against mass state surveillance for years—including my friend Bill Binney within the NSA—made no headway by appealing to the traditional centers of power. It was only after Snowden methodically leaked documents that disclosed crimes committed by the state that genuine public debate began. Elected officials, for the first time, promised reform. The president, who had previously dismissed our questions about the extent of state surveillance by insisting there was strict congressional and judicial oversight, appointed a panel to review intelligence. Three judges have, since the Snowden revelations, ruled on the mass surveillance, with two saying the NSA spying was unconstitutional and the third backing it. None of this would have happened—none of it—without Snowden.

Snowden had access to the full roster of everyone working at the NSA. He could have made public the entire intelligence community and undercover assets worldwide. He could have exposed the locations of every clandestine station and their missions. He could have shut down the surveillance system, as he has said, “in an afternoon.” But this was never his intention. He wanted only to halt the wholesale surveillance, which until he documented it was being carried out without our consent or knowledge.

No doubt we will hear from the opposition tonight all the ways Snowden should have made his grievances heard, but I can tell you from personal experience, as can Bill, that this argument is as cogent as the offer made by the March Hare during the Mad Tea Party in “Alice in Wonderland.”

“Have some wine,” the March Hare said in an encouraging tone.

Alice looked all round the table, but there was nothing on it but tea.

“I don’t see any wine,” she remarked.

“There isn’t any,” said the March Hare.

 

 

 

 

 

 

Here's What The Richest Man In The World Thinks About Snowden And NSA Surveillance | Zero Hedge

Here’s What The Richest Man In The World Thinks About Snowden And NSA Surveillance | Zero Hedge.

Submitted by Mike Krieger of Liberty Blitzkrieg blog,

So Bill Gates recently gave an interview to Rolling Stone magazine. The vast majority of the interview focused on his philanthropic efforts, with a particular focus on poverty and climate change. However, several questions were brought up on illegal NSA surveillance in general, and Edward Snowden in particular.

His answers reveal one of the biggest problems facing America today, which is the fact that the billionaire class as a whole does not question or rock the boat whatsoever. They criticize only when it is convenient or easy to do so, never putting themselves at risk for the sake of civil liberties and the Constitution.

In mosts cases, this is due to the fact that they themselves are the characters pulling the strings of the political class in Washington D.C. So when it comes down to it, their policies ultimately become our policies.

It is also important to note that Microsoft was a particularly eager participant in NSA spying from the very beginning. For example, according to the following PRISM slide provided by Edward Snowden, we see that Gates’ company was the first to become involved. In fact, they were participating a full six months before Yahoo!, while Apple didn’t join until a year after Steve Jobs died.

What a tangled web we have weaved. Now from Rolling Stone:

Question: When people think about the cloud, it’s not only the accessibility of information and their documents that comes to mind, but also their privacy – or lack of it.

Gates: Should there be cameras everywhere in outdoor streets? My personal view is having cameras in inner cities is a very good thing. In the case of London, petty crime has gone down. They catch terrorists because of it. And if something really bad happens, most of the time you can figure out who did it. There’s a general view there that it’s not used to invade privacy in some way. Yet in an American city, in order to take advantage of that in the same way, you have to trust what this information is going to be used for.

Do they really catch terrorists because of it in London? Because in the U.S., the NSA chief already admitted that the entire spy program has stopped essentially zero terrorist attacks. It certainly didn’t stop the Boston bombings. So what are we giving up our privacy for exactly?

Question: Thanks to Edward Snowden, who has leaked tens of thousands of NSA documents, we are. Do you consider him a hero or a traitor?

Gates: I think he broke the law, so I certainly wouldn’t characterize him as a hero. If he wanted to raise the issues and stay in the country and engage in civil disobedience or something of that kind, or if he had been careful in terms of what he had released, then it would fit more of the model of “OK, I’m really trying to improve things.” You won’t find much admiration from me.

Sorry Billy boy, but we have had many whistleblowers in the past who went through the system and they ended up in jail or their lives were ruined. For example, the only person imprisoned for torture in the USA is the guy who exposed the torture program, John Kiriakou.

Question: Even so, do you think it’s better now that we know what we know about government surveillance?

Gates: The government has such ability to do these things. There has to be a debate. But the specific techniques they use become unavailable if they’re discussed in detail. So the debate needs to be about the general notion of under what circumstances should they be allowed to do things.

First of all, without the Snowden revelations, there would be no “debate.” As it stands, the intelligence complex and Obama don’t seem to have much interest in changing a single thing anyway.

Before Snowden proved us right, those who accurately claimed the NSA was doing all of these things were labeled paranoid conspiracy theorists. Moreover, how can anyone seriously defend these “techniques” in light of the recent revelations that show activities so egregious that security experts think they threaten the infrastructure of the entire internet?

Gates goes on to ponder…

Should surveillance be usable for petty crimes like jaywalking or minor drug possession? Or is there a higher threshold for certain information?Those aren’t easy questions.

How are those not easy questions? They are exceedingly easy questions for a civilized society. The answer is no. Unless you want to toss even more citizens in jail for non-violent offenses, because having 25% of the world’s prison population and only 5% of its population is not inhumane enough.

More from Gates…

The U.S. government in general is one of the better governments in the world. It’s the best in many, many respects. Lack of corruption, for instance, and a reasonable justice system.

Seriously, what country is Gates living in? I suppose when you are the richest man in the world it’s pretty easy to live in a bubble. He is so obsessed with the problems of the outside world and the fact that they are more corrupt than we are, that he is completely blind to the very dangerous trends happening in America.

What a joke.

The entire interview can be read here.

Here’s What The Richest Man In The World Thinks About Snowden And NSA Surveillance | Zero Hedge

Here’s What The Richest Man In The World Thinks About Snowden And NSA Surveillance | Zero Hedge.

Submitted by Mike Krieger of Liberty Blitzkrieg blog,

So Bill Gates recently gave an interview to Rolling Stone magazine. The vast majority of the interview focused on his philanthropic efforts, with a particular focus on poverty and climate change. However, several questions were brought up on illegal NSA surveillance in general, and Edward Snowden in particular.

His answers reveal one of the biggest problems facing America today, which is the fact that the billionaire class as a whole does not question or rock the boat whatsoever. They criticize only when it is convenient or easy to do so, never putting themselves at risk for the sake of civil liberties and the Constitution.

In mosts cases, this is due to the fact that they themselves are the characters pulling the strings of the political class in Washington D.C. So when it comes down to it, their policies ultimately become our policies.

It is also important to note that Microsoft was a particularly eager participant in NSA spying from the very beginning. For example, according to the following PRISM slide provided by Edward Snowden, we see that Gates’ company was the first to become involved. In fact, they were participating a full six months before Yahoo!, while Apple didn’t join until a year after Steve Jobs died.

What a tangled web we have weaved. Now from Rolling Stone:

Question: When people think about the cloud, it’s not only the accessibility of information and their documents that comes to mind, but also their privacy – or lack of it.

Gates: Should there be cameras everywhere in outdoor streets? My personal view is having cameras in inner cities is a very good thing. In the case of London, petty crime has gone down. They catch terrorists because of it. And if something really bad happens, most of the time you can figure out who did it. There’s a general view there that it’s not used to invade privacy in some way. Yet in an American city, in order to take advantage of that in the same way, you have to trust what this information is going to be used for.

Do they really catch terrorists because of it in London? Because in the U.S., the NSA chief already admitted that the entire spy program has stopped essentially zero terrorist attacks. It certainly didn’t stop the Boston bombings. So what are we giving up our privacy for exactly?

Question: Thanks to Edward Snowden, who has leaked tens of thousands of NSA documents, we are. Do you consider him a hero or a traitor?

Gates: I think he broke the law, so I certainly wouldn’t characterize him as a hero. If he wanted to raise the issues and stay in the country and engage in civil disobedience or something of that kind, or if he had been careful in terms of what he had released, then it would fit more of the model of “OK, I’m really trying to improve things.” You won’t find much admiration from me.

Sorry Billy boy, but we have had many whistleblowers in the past who went through the system and they ended up in jail or their lives were ruined. For example, the only person imprisoned for torture in the USA is the guy who exposed the torture program, John Kiriakou.

Question: Even so, do you think it’s better now that we know what we know about government surveillance?

Gates: The government has such ability to do these things. There has to be a debate. But the specific techniques they use become unavailable if they’re discussed in detail. So the debate needs to be about the general notion of under what circumstances should they be allowed to do things.

First of all, without the Snowden revelations, there would be no “debate.” As it stands, the intelligence complex and Obama don’t seem to have much interest in changing a single thing anyway.

Before Snowden proved us right, those who accurately claimed the NSA was doing all of these things were labeled paranoid conspiracy theorists. Moreover, how can anyone seriously defend these “techniques” in light of the recent revelations that show activities so egregious that security experts think they threaten the infrastructure of the entire internet?

Gates goes on to ponder…

Should surveillance be usable for petty crimes like jaywalking or minor drug possession? Or is there a higher threshold for certain information?Those aren’t easy questions.

How are those not easy questions? They are exceedingly easy questions for a civilized society. The answer is no. Unless you want to toss even more citizens in jail for non-violent offenses, because having 25% of the world’s prison population and only 5% of its population is not inhumane enough.

More from Gates…

The U.S. government in general is one of the better governments in the world. It’s the best in many, many respects. Lack of corruption, for instance, and a reasonable justice system.

Seriously, what country is Gates living in? I suppose when you are the richest man in the world it’s pretty easy to live in a bubble. He is so obsessed with the problems of the outside world and the fact that they are more corrupt than we are, that he is completely blind to the very dangerous trends happening in America.

What a joke.

The entire interview can be read here.

FOURTH TURNING: THE PEOPLE vs BIG BROTHER « The Burning Platform

FOURTH TURNING: THE PEOPLE vs BIG BROTHER « The Burning Platform.

 

“The risk of catastrophe will be very high. The nation could erupt into insurrection or civil violence, crack up geographically, or succumb to authoritarian rule. If there is a war, it is likely to be one of maximum risk and effort – in other words, a total war. Every Fourth Turning has registered an upward ratchet in the technology of destruction, and in mankind’s willingness to use it.” – Strauss & Howe – The Fourth Turning

 

 

 

“In the need to develop a capacity to know what potential enemies are doing, the United States government has perfected a technological capability that enables us to monitor the messages that go through the air. Now, that is necessary and important to the United States as we look abroad at enemies or potential enemies. We must know, at the same time, that capability at any time could be turned around on the American people, and no American would have any privacy left such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.

 

If this government ever became a tyrant, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology.

 

I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision so that we never cross over that abyss. That is the abyss from which there is no return.” – Frank Church on Meet the Press regarding the NSA – 1975

 

Ever since Edward Snowden burst onto the worldwide stage in June 2013, I’ve been wondering how he fits into the fabric of this ongoing Fourth Turning. This period of Crisis that arrives like clockwork, 60 to 70 years after the end of the previous Fourth Turning (Civil War – 66 years after American Revolution, Great Depression/World War II – 64 years after Civil War, Global Financial Crisis – 62 years after World War II), arrived in September 2008 with the Federal Reserve created collapse of the global financial system. We are now five and a half years into this Fourth Turning, with its climax not likely until the late-2020’s. At this point in previous Fourth Turnings a regeneracy had unified sides in their cause and a grey champion or champions (Ben Franklin/Samuel Adams, Lincoln/Davis, FDR) had stepped forward to lead. Thus far, no one from the Prophet generation has been able to unify the nation and create a sense of common civic purpose. Societal trust continues to implode, as faith in political, financial, corporate, and religious institutions spirals downward. There is no sign of a unifying regeneracy on the horizon.

 

The core elements of this Fourth Turning continue to propel this Crisis: debt, civic decay, global disorder. Central bankers, politicians, and government bureaucrats have been able to fashion the illusion of recovery and return to normalcy, but their “solutions” are nothing more than smoke and mirrors exacerbating the next bloodier violent stage of this Fourth Turning. The emergencies will become increasingly dire, triggering unforeseen reactions and unintended consequences. The civic fabric of our society will be torn asunder.

 

In retrospect, the spark might seem as ominous as a financial crash, as ordinary as a national election, or as trivial as a Tea Party. The catalyst will unfold according to a basic Crisis dynamic that underlies all of these scenarios: An initial spark will trigger a chain reaction of unyielding responses and further emergencies. The core elements of these scenarios (debt, civic decay, global disorder) will matter more than the details, which the catalyst will juxtapose and connect in some unknowable way. If foreign societies are also entering a Fourth Turning, this could accelerate the chain reaction. At home and abroad, these events will reflect the tearing of the civic fabric at points of extreme vulnerability – problem areas where America will have neglected, denied, or delayed needed action.” – The Fourth Turning – Strauss & Howe

 

Debt

 

The core crisis element of debt is far worse than it was at the outset of this Crisis in September 2008. The National Debt has risen from $9.7 trillion to $17.5 trillion, an 80% increase in five and half years. It took 215 years for the country to accumulate as much debt as it has accumulated since the start of this Crisis. We continue to add $2.8 billion a day to the National debt, and the president declares it is time for this austerity to end. The total unfunded liabilities of the Federal government for Social Security, Medicare, Medicaid, government pensions and now Obamacare exceeds $200 trillion and is mathematically impossible to honor. Corporate debt stands at an all-time high. Margin debt is at record levels, as faith in the Federal Reserve’s ability to levitate the stock market borders on delusional. Consumer debt has reached new heights, as the government doles out subprime auto loans to deadbeats and subprime student loans to future University of Phoenix Einsteins. Global debt has surged by 40% since 2008 to over $100 trillion, as central bankers have attempted to cure a disease caused by debt with more debt.

 

All of this debt accumulation is compliments of Bernanke/Yellen and the Federal Reserve, who have produced this new debt bubble with their zero interest rate policy and quantitative easing that has driven their balance sheet from $935 billion of mostly Treasury bonds in September 2008 to $4.2 trillion of toxic mortgage garbage acquired from their owners – the insolvent Too Big To Trust Wall Street banks. This entire house of cards is reliant upon permanently low interest rates, the faith of foreigners in our lies, and trust in Ivy League educated economists captured by Wall Street. This debt laden house of cards sits atop hundreds of trillions of derivatives of mass destruction used by the Wall Street casinos to generate “riskless” profits. When, not if, a trigger ignites this explosive concoction of debt, the collapse will be epic and the violent phase of this Fourth Turning will commence.

 

Civic Decay

 

The core crisis element of civic decay is evident everywhere you turn. Our failed public educational system is responsible for much of the civic decay, as a highly educated critical thinking populace is our only defense against a small cabal of bankers and billionaires acquiring unwarranted influence and control over our country. Our children have been taught how to feel and to believe government propaganda. The atrocious educational system is not a mistake. It has been designed and manipulated by your owners to produce the results they desire, as explained bluntly by George Carlin.

 

 

 

 

 

“There’s a reason that education sucks, and it’s the same reason it will never ever ever be fixed. It’s never going to get any better, don’t look for it. Be happy with what you’ve got. Because the owners of this country don’t want that. I’m talking about the real owners now, the big, wealthy, business interests that control all things and make the big decisions. They spend billions of dollars every year lobbying to get what they want. Well, we know what they want; they want more for themselves and less for everybody else. But I’ll tell you what they don’t want—they don’t want a population of citizens capable of critical thinking. They don’t want well informed, well educated people capable of critical thinking. They’re not interested in that. That doesn’t help them. That’s against their interest.”

 

The urban ghettos become more dangerous and uninhabitable by the day. The inner cities are crumbling under the weight of welfare spending and declining tax revenues. The very welfare policies begun fifty years ago to alleviate poverty have hopelessly enslaved the poor and ignorant in permanent squalor and destitution. The four decade old drug war has done nothing to reduce the use of drugs. It has benefited the corporate prison industry, as millions have been thrown into prison for minor drug offenses. Meanwhile, millions more have been legally addicted to drugs peddled by the corporate healthcare complex. The culture warriors and advocates of new rights for every special interest group continue their never ending battles which receive an inordinate amount of publicity from the corporate media. Class warfare is simmering and being inflamed by politicians pushing their particular agendas. Violence provoked by race and religion is growing by the day. The fault lines are visible and the imminent financial earthquake will push distress levels beyond the breaking point. Once the EBT cards stop working, all hell will break loose. Three days of panic will empty grocery store shelves and the National Guard will be called out to try and restore control.

 

Global Disorder

 

The core crisis element of global disorder is evident everywhere you turn. The false flag revolution in the Ukraine, initiated by the U.S. and EU in order to blunt Russia’s control of natural gas to Europe, has the potential to erupt into a full blown shooting war at any moment. The attempt by Saudi Arabia, Israel and the U.S. to overthrow the Syrian dictator in order to run a natural gas pipeline across their land into Europe was blunted by Russia. Iraq is roiled in a civil war, after the U.S. invaded, occupied and destabilized the country. After 12 years of occupation, Afghanistan is more dysfunctional and dangerous than it was before the U.S. saved them from the evil Taliban. Unrest, violent protests, and brutal measures by rulers continue in Egypt, Turkey, Thailand, Venezuela, Bahrain, Brazil, and throughout Africa. American predator drones roam the skies of the world murdering suspected terrorists. The European Union is insolvent, with Greece, Spain, Italy and Portugal propped up with newly created debt. Austerity for the people and prosperity for the bankers is creating tremendous distress and tension across the continent. A global volcanic eruption is in the offing.

 

It is clear to me the American Empire is in terminal decline. Hubris, delusion, corruption, foolish disregard for future generations and endless foreign follies have set in motion a chain of events that will lead to a cascading sequence of debt defaults, mass poverty, collapsing financial markets, and hyperinflation or deflation, depending on the actions of feckless bankers and politicians. There is no avoiding the tragic outcome brought on by decades of bad choices and a century of allowing private banking interests to control our currency. The “emergency” QE and ZIRP responses by the Federal Reserve to the Federal Reserve created 2008 financial collapse continue, even though the propaganda peddled by the Deep State tries to convince the public we have fully recovered. This grand fraud cannot go on forever. Ponzi schemes no longer work once you run out of dupes. With societal trust levels approaching all-time lows and foreign countries beginning to understand they are the dupes, another global financial crisis is a lock.

 

The Snowden Factor

 

With ten to fifteen years likely remaining in this Fourth Turning Crisis, people familiar with generational turnings can’t help but ponder what will happen next. Linear thinkers, who constitute the majority, mistakenly believe things will magically return to normal and we’ll continue our never ending forward human progress. Their ignorance of history and generational turnings that recur like the four seasons will bite them in the ass. We are being flung forward across the vast chaos of time and our existing social order will be transformed beyond recognition into something far better or far worse. The actual events over the coming decade are unknowable in advance, but the mood and reactions of the generational archetypes to these events are predictable. The actions of individuals will matter during this Fourth Turning. The majority are trapped in their propaganda induced, techno distracted stupor of willful ignorance. It will take a minority of liberty minded individuals, who honor the principles of the U.S. Constitution and are willing to sacrifice their lives, to prevail in the coming struggle.

 

Despite fog engulfing the path of future events, we know they will be propelled by debt, civic decay, and global disorder. Finding a unifying grey champion figure seems unlikely at this point. I believe the revelations by Edward Snowden have set the course for future events during this Fourth Turning. The choices of private citizens, like Snowden, Assange, and Manning, have made a difference. The choices we all make over the next ten years will make a difference. A battle for the soul of this country is underway. The Deep State is firmly ingrained, controlling the financial, political and educational systems, while using their vast wealth to perpetuate endless war, and domination of the media to manipulate the masses with propaganda and triviality. They are powerful and malevolent. They will not relinquish their supremacy and wealth willingly.

 

Snowden has revealed the evil intent of the ruling class and their willingness to trash the Constitution in their psychopathic pursuit of mammon. The mass surveillance of the entire population, locking down of an entire city in pursuit of two teenagers, military training exercises in major metropolitan areas, militarization of local police forces by DHS, crushing peaceful demonstrations with brute force, attempting to restrict and confiscate guns, molesting innocent airline passengers, executive orders utilized on a regular basis by the president, and treating all citizens like suspects has set the stage for the coming conflict. Strauss & Howe warned that history has shown armed conflict is always a major ingredient during a Fourth Turning.

 

“History offers even more sobering warnings: Armed confrontation usually occurs around the climax of Crisis. If there is confrontation, it is likely to lead to war. This could be any kind of war – class war, sectional war, war against global anarchists or terrorists, or superpower war. If there is war, it is likely to culminate in total war, fought until the losing side has been rendered nil – its will broken, territory taken, and leaders captured.” – The Fourth Turning – Strauss & Howe -1997

 

It appears to me the Deep State is preparing for armed conflict with the people. Why else would they be utilizing Big Brother methods of surveillance, militarization of police forces  and Gestapo like tactics of intimidation to control the masses? This doesn’t happen in a democratic republic where private individuals are supposed to know everything done by public government servants, not vice versa. They know the cheap, easy to access energy resources are essentially depleted. They know the system they have built upon a foundation of cheap energy and cheap debt is unsustainable and will crash in the near future. They know their fiat currency scheme is failing.They know it is going to come crashing down.  

 

They know America and the world will plunge into an era of depression, violence, and war. They also know they want to retain their wealth, power and control. There is no possibility the existing establishment can be purged through the ballot box. It’s a one party Big Brother system that provides the illusion of choice to the Proles. Like it or not, the only way this country can cast off the shackles of the banking, corporate, fascist elites, and the government surveillance state is through an armed revolution. The alternative is to allow an authoritarian regime, on par with Hitler, Stalin and Mao, to rise from the ashes of our financial collapse.This is a distinct possibility, given the ignorance and helplessness of most Americans after decades of government education and propaganda.       

 

The average mentally asleep American cannot conceive of armed conflict within the borders of the U.S. War, violence and dead bodies are something they see on their 52 inch HDTVs while gobbling chicken wings and cheetos in their Barcalounger. We’ve allowed a banking cartel and their central bank puppets to warp and deform our financial system into a hideous façade, sold to the masses as free market capitalism. We’ve allowed corporate interests to capture our political system through bribery and corruption.

 

We’ve allowed the rise of a surveillance state that has stripped us of our privacy, freedom, liberty and individuality in a futile pursuit of safety and security. We’ve allowed a military industrial complex to exercise undue influence in Washington DC, leading to endless undeclared wars designed to enrich the arms makers. We’ve allowed the corporate media and the government education complex to use propaganda, misinformation and social engineering techniques to dumb down the masses and make them compliant consumers. These delusions will be shattered when our financial and economic system no longer functions. The end is approaching rapidly and very few see it coming.

 

Glory or Ruin?

 

The scenario I envision is a collapse of our debt saturated financial system, with a domino effect of corporate, personal, and governmental defaults, exacerbated by the trillions of currency, interest rate, and stock derivatives. Global stock markets will crash. Trillions in paper wealth will evaporate into thin air. The Greater Depression will gain a choke-hold around the world. Mass bankruptcies, unemployment and poverty will sweep across the land. The social safety net will tear under the weight of un-payable entitlements. Riots and unrest will breakout in urban areas. Armed citizens in rural areas will begin to assemble in small units. The police and National Guard will be unable to regain control. The military will be called on to suppress any and all resistance to the Federal government. This act of war will spur further resistance from liberty minded armed patriots. The new American Revolution will have begun. Leaders will arise in the name of freedom. Regional and local bands of fighters will use guerilla tactics to defeat a slow top heavy military dependent upon technology and vast quantities of oil. A dictatorial regime may assume power on a Federal level. A breakup of the nation into regional states is a distinct possibility.

 

With the American Empire crumbling from within, our international influence will wane. With China also in the midst of a Fourth Turning, their debt bubble will burst and social unrest will explode into civil war. Global disorder, wars, terrorism, and financial collapse will lead to a dramatic decrease in oil production, further sinking the world into depression. The tensions caused by worldwide recession will lead to the rise of authoritarian regimes and global warfare. With “advances” in technological warfare and the proliferation of nuclear warheads, this scenario has the potential to end life on earth as we know it. The modern world could be set back into the stone-age with the push of a button. There are no guarantees of a happy ending for humanity.

 

The outcome of this Fourth Turning is dependent upon the actions of a minority of critical thinking Americans who decide to act. No one can avoid the trials and tribulations that lie ahead. We will be faced with immense challenges. Courage and sacrifice will be required in large doses. Elders will need to lead and millennials will need to carry a heavy load, doing most of the dying. The very survival of our society hangs in the balance. Edward Snowden has provided an example of the sacrifice required during this Fourth Turning. How we respond and the choices we make over the next decade will determine whether this Fourth Turning will result in glory or ruin for our nation.

 

“Eventually, all of America’s lesser problems will combine into one giant problem. The very survival of the society will feel at stake, as leaders lead and people follow. The emergent society may be something better, a nation that sustains its Framers’ visions with a robust new pride. Or it may be something unspeakably worse. The Fourth Turning will be a time of glory or ruin.” – Strauss & Howe – The Fourth Turning

 

Click these links to read the first two parts of this three part series:

 

Do No Evil Google – Censor & Snitch for the State

 

Google, China, the NSA and the Fourth Turning

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed | A Lightning War for Liberty

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed | A Lightning War for Liberty.

Posted on March 12, 2014

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Earlier this week, during a talk at SXSW, Edward Snowden pleaded with people to use encryption. While he admitted if the NSA targeted you individually they could almost certainly “own your computer,” he stated that if people use encryption on a massive scale it makes the NSA’s attempts to monitor everyone at the same time much more difficult.

Apparently, the NSA is well aware of this threat. Which is why we now know that the agency has been dedicating significant amounts of taxpayer dollars toward an attempt to infect millions of computers with malware in an attempt at “industrial-scale exploitation,” which would lead to them “owning the net.”

As Mikko Hypponen, an expert in malware stated:

“The NSA’s surveillance techniques could inadvertently be undermining the security of the Internet.”

Move along serfs, nothing to see here.

From The Intercept:

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

It sounds like that is precisely their intent…

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to securet internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Your tax dollars at works slaves.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.

According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance.QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.

Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.

According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.

Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.

“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”

In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”

GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing “active” hacking attacks for surveillance “may be illegal” under British law.

When even the GCHQ is questioning the legality of a surveillance program you know you’ve gone too far. Way too far.

Full article here.

In Liberty,
Michael Krieger

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed | A Lightning War for Liberty

The Most Evil and Disturbing NSA Spy Practices To-Date Have Just Been Revealed | A Lightning War for Liberty.

Posted on March 12, 2014

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Earlier this week, during a talk at SXSW, Edward Snowden pleaded with people to use encryption. While he admitted if the NSA targeted you individually they could almost certainly “own your computer,” he stated that if people use encryption on a massive scale it makes the NSA’s attempts to monitor everyone at the same time much more difficult.

Apparently, the NSA is well aware of this threat. Which is why we now know that the agency has been dedicating significant amounts of taxpayer dollars toward an attempt to infect millions of computers with malware in an attempt at “industrial-scale exploitation,” which would lead to them “owning the net.”

As Mikko Hypponen, an expert in malware stated:

“The NSA’s surveillance techniques could inadvertently be undermining the security of the Internet.”

Move along serfs, nothing to see here.

From The Intercept:

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

It sounds like that is precisely their intent…

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to securet internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Your tax dollars at works slaves.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.

According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.

In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.

But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance.QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.

Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.

According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.

Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.

In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.

“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”

In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”

GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing “active” hacking attacks for surveillance “may be illegal” under British law.

When even the GCHQ is questioning the legality of a surveillance program you know you’ve gone too far. Way too far.

Full article here.

In Liberty,
Michael Krieger

Edward Snowden To EU: NSA Is Spying On All Of Europe : Personal Liberty – Conservative News and Political Commentary For Your Personal and Financial Freedom

Edward Snowden To EU: NSA Is Spying On All Of Europe : Personal Liberty – Conservative News and Political Commentary For Your Personal and Financial Freedom.

STRASBOURG, Germany (UPI) — European Union lawmakers received a 12-page testimony from former National Security Agency contractor Edward Snowden that says the NSA has been spying on all of Europe.

“I know the good and the bad of these systems, and what they can and cannot do, and I am telling you that without getting out of my chair, I could have read the private communications of any member of this committee, as well as any ordinary citizen.” wrote Snowden in his testimony.

Snowden did not reveal any new information in the testimony but said there are more programs that would infringe on EU citizens’ rights but that information will be given to responsible journalists.

Snowden explains that the NSA exploited loopholes in data agreements with individual countries to spy on the whole of Europe. The report being considered by the European parliament could put an end to the Safe Harbor agreement, which allows U.S. tech companies to self-certify that they are following EU data-protection laws. Further action by the EU could spell trouble for companies like Google.

Snowden also added that he would accept asylum from a European country if offered and once again reaffirmed he has not worked with the Russian or Chinese governments, although he did say that the Russian secret service did approach him.

“Even the secret service of Andorra would have approached me, if they had the chance: that’s their job,” wrote Snowden, “But I didn’t take any documents with me to Hong Kong, and while I’m sure they were disappointed, it doesn’t take long for an intelligence service to realize when they’re out of luck.”

Digital surveillance won't drive me off social media: Lauren O’Neil – Community – CBC News

Digital surveillance won’t drive me off social media: Lauren O’Neil – Community – CBC News.

CBC social media producer is an avowed ‘internet addict’

By Lauren O’Neil, CBC News Posted: Mar 07, 2014 5:00 AM ET Last Updated: Mar 07, 2014 5:00 AM ET

Lauren O'Neil is a producer on the Community desk of CBC News and a self-professed 'internet addict.'Lauren O’Neil is a producer on the Community desk of CBC News and a self-professed ‘internet addict.’ (Evan Mitsui/CBC)

I was 12 years old when I published my first blog post.

 

It was 1996 and, at the time, my biggest concern was that one of my parents would pick up the phone and kill our 14K modem’s connection to the internet while I was uploading images.

 

The concept of digital privacy didn’t even register in my mind – I was simply thrilled to put my thoughts and face on the web for the entire world to see.

 

A lot has changed since then, technologically speaking, but my desire to share my life online has never wavered. In fact, it’s only grown stronger with the advent of social networks, micro-blogging and, most significantly, smartphones.

 

Today, I live out much of my personal life through my iPhone and laptop. I communicate with my friends through Facebook Messenger, post photos of my daily adventures on Instagram and even publish blog posts through WordPress while I’m on the streetcar sometimes.

‘As this project shows, I’m revealing quite a bit more [about myself] than I’d expected.’– CBC News social media producer Lauren O’Neil

 

I tweet out jokes, musings, fun links and photos constantly – almost compulsively – and probably upload more selfies than is considered socially acceptable. I’ve also got a YouTube channel, a Tumblr blog, multiple Gmail addresses and accounts with Google+, Rdio, SoundCloud, Netflix, Pinterest and Foursquare.

 

As an associate producer on the Community desk for CBC News, I write multiple blog posts a day, host a weekly online chat show and sometimes appear on television to speak about internet-related things.

 

When my colleagues approached me to take part in a project tracking my daily surveillance habits, I was curious to see just how much information I’m giving away. Suffice it to say, I’m quite comfortable putting myself out there.

 

What I’m not comfortable with is the idea of anyone gaining access to information I haven’t explicitly made public – and as this project shows, I’m revealing quite a bit more than I’d expected.

 

The extent of online tracking

 

When I was first told about this project, I assumed that my online activity was being tracked at least a little bit.

 

I understood that leaving my iPhone’s GPS on would geolocate my Instagram photos, that checking into the gym on Foursquare could activate nearby marketing promotions and that third-party Twitter apps had access to my email address and other data I’d provided.

 

Surveillance interactiveClick on the graphic above to see an interactive on how we are digitally tracked on a daily basis. (CBC)

 

 

I was even aware that Facebook was selling my data to marketers – hey, that’s the price you pay for a free (and, to my mind, essential) service.

 

What shocked me was how much of my personal, private information could be accessed by the government and corporations through simple activities such as buying a coffee or checking my RSS feed over breakfast.

 

Every email and tweet I send contains metadata such as the date, time and subject of the message, as well as the IP address from which it was sent. With the amount of personal data I push through my iPhone every hour, it means I could be tracked down at almost any time of the day.

It’s scary to think about what could happen if that information came into the wrong hands.

 

Something else I’d never really considered was how vulnerable I was making myself by using public Wi-Fi networks, which can be insecure. Sure, I might save a few bucks on my wireless bill, but is it worth the risk of giving third-party corporations or even malicious hackers access to my data?

 

Participating in this project has opened my eyes to how much information I’m involuntarily sharing with marketers, the Canadian government and potentially even U.S. authorities.

 

But while privacy is important to me, so is communicating with my peers, having a creative outlet and contributing to the online culture I so deeply love and respect.

 

Without sharing so much of my life through the Internet, I wouldn’t be where I am professionally. I’d also have missed out on some of great social, creative and career opportunities.

 

The rewards outweigh the risks… for now. That said, I’ll definitely be turning off my iPhone’s GPS function. It’s a small but necessary step.

Digital surveillance won’t drive me off social media: Lauren O’Neil – Community – CBC News

Digital surveillance won’t drive me off social media: Lauren O’Neil – Community – CBC News.

CBC social media producer is an avowed ‘internet addict’

By Lauren O’Neil, CBC News Posted: Mar 07, 2014 5:00 AM ET Last Updated: Mar 07, 2014 5:00 AM ET

Lauren O'Neil is a producer on the Community desk of CBC News and a self-professed 'internet addict.'Lauren O’Neil is a producer on the Community desk of CBC News and a self-professed ‘internet addict.’ (Evan Mitsui/CBC)

I was 12 years old when I published my first blog post.

 

It was 1996 and, at the time, my biggest concern was that one of my parents would pick up the phone and kill our 14K modem’s connection to the internet while I was uploading images.

 

The concept of digital privacy didn’t even register in my mind – I was simply thrilled to put my thoughts and face on the web for the entire world to see.

 

A lot has changed since then, technologically speaking, but my desire to share my life online has never wavered. In fact, it’s only grown stronger with the advent of social networks, micro-blogging and, most significantly, smartphones.

 

Today, I live out much of my personal life through my iPhone and laptop. I communicate with my friends through Facebook Messenger, post photos of my daily adventures on Instagram and even publish blog posts through WordPress while I’m on the streetcar sometimes.

‘As this project shows, I’m revealing quite a bit more [about myself] than I’d expected.’– CBC News social media producer Lauren O’Neil

 

I tweet out jokes, musings, fun links and photos constantly – almost compulsively – and probably upload more selfies than is considered socially acceptable. I’ve also got a YouTube channel, a Tumblr blog, multiple Gmail addresses and accounts with Google+, Rdio, SoundCloud, Netflix, Pinterest and Foursquare.

 

As an associate producer on the Community desk for CBC News, I write multiple blog posts a day, host a weekly online chat show and sometimes appear on television to speak about internet-related things.

 

When my colleagues approached me to take part in a project tracking my daily surveillance habits, I was curious to see just how much information I’m giving away. Suffice it to say, I’m quite comfortable putting myself out there.

 

What I’m not comfortable with is the idea of anyone gaining access to information I haven’t explicitly made public – and as this project shows, I’m revealing quite a bit more than I’d expected.

 

The extent of online tracking

 

When I was first told about this project, I assumed that my online activity was being tracked at least a little bit.

 

I understood that leaving my iPhone’s GPS on would geolocate my Instagram photos, that checking into the gym on Foursquare could activate nearby marketing promotions and that third-party Twitter apps had access to my email address and other data I’d provided.

 

Surveillance interactiveClick on the graphic above to see an interactive on how we are digitally tracked on a daily basis. (CBC)

 

 

I was even aware that Facebook was selling my data to marketers – hey, that’s the price you pay for a free (and, to my mind, essential) service.

 

What shocked me was how much of my personal, private information could be accessed by the government and corporations through simple activities such as buying a coffee or checking my RSS feed over breakfast.

 

Every email and tweet I send contains metadata such as the date, time and subject of the message, as well as the IP address from which it was sent. With the amount of personal data I push through my iPhone every hour, it means I could be tracked down at almost any time of the day.

It’s scary to think about what could happen if that information came into the wrong hands.

 

Something else I’d never really considered was how vulnerable I was making myself by using public Wi-Fi networks, which can be insecure. Sure, I might save a few bucks on my wireless bill, but is it worth the risk of giving third-party corporations or even malicious hackers access to my data?

 

Participating in this project has opened my eyes to how much information I’m involuntarily sharing with marketers, the Canadian government and potentially even U.S. authorities.

 

But while privacy is important to me, so is communicating with my peers, having a creative outlet and contributing to the online culture I so deeply love and respect.

 

Without sharing so much of my life through the Internet, I wouldn’t be where I am professionally. I’d also have missed out on some of great social, creative and career opportunities.

 

The rewards outweigh the risks… for now. That said, I’ll definitely be turning off my iPhone’s GPS function. It’s a small but necessary step.

%d bloggers like this: