"If one is to rule and to continue ruling, one must be able to dislocate the sense of reality." -George Orwell

Posts Tagged ‘Thought Control’

The Point of No Return: Climate Change Nightmares Are Already Here

In Uncategorized on August 21, 2015 at 6:02 pm
Walruses

Walruses, like these in Alaska, are being forced ashore in record numbers, as result of rapidly disappearing arctic sea ice. Corey Accardo/NOAA/AP

Oldspeak: “Yah huh. Already here and worsening by the day. We’re actually about 40 years past the point of no return in this on a geologic time scale stupefyingly fast 6th mass extinction event. What took hundreds of thousands of years to happen during Earth’s previously worst & greatest dying, has happened over the course of the last 1oo to 2oo years. I found it interesting while the author dutifully reported on the dire situation of Earth’s vanishing plankton populations, he neglected to mention that, when the plankton go extinct, half of the air we breathe goes with them. A major detail to omit I’d say. There’s quite a bit of nonsense talk mixed in with the sobering reality delineated here. Like talk of “exit strategies”, “carbon taxes”, “remediation plans”, “legal actions”, “safe levels of climate change”. Talk of “emission cuts among world leaders”.  As though any of these utterly bankrupt and futile hopium-tinged ideas are viable, or will make any measurable difference in the fate of most life on Earth. As if human civilization hasn’t long exited the safe operating space of earth by exceeding 4 of 9 planetary boundaries. Given that as the title of the piece states we are at the point of no return, the talk is nothing more than romantic flights of fancy at this late stage with no end to the business as usual worst case scenario trajectory of 4 to 10 degrees C of warming baked in to our Earth cake.  Also left unmentioned is how these light speed climactic changes connect to humankind’s consumption of 1.6 earth’s worth of Earth’s resources which cannot be regenerated in less than 8 months. The disconnect is breathtaking. One only need read the follow-up article to the one below. “5 Things We Learned From the ‘Point of No Return’ Climate Solutions AMA” in it you’ll find even more nonsense talk of climate “solutions”, “activism”, “combating climate change” and the most disingenuous nonsense of all: “hope”. Your Hope and fear are the only things the transnational corporate network of inverted totalitarian kleptocracy has going for it. Leading us to believe we are somehow separated and exalted saviors of this ecology we’re born of that is dying around us; with all our cleverness and ingenuity. Saving a few species is said to “feel like a triumph”. Engaged in vigorous, ubiquitous and relentless campaigns of though control, to serve pathologically ecocidal (and ultimately fictional) ends of profit, power and control.  “That this regime of thought control proved to be so triumphant, with so little public resistance, must be due to its persistent repetitive orchestration.”-Alex Carey. Insidiously concealing a horrific reality; that wrapped in the gauzy and seductive trappings of “convenience”, “development”, “personalization” “efficiency” and “progress” “We have surrendered our lives to corporate forces that ultimately serve systems of death.”-Chris Hedges  Endeavoring to prevent you from realizing that true power and freedom from fear lie in your loss of hope, as Derrick Jensen said: “When you give up on hope, you turn away from fear. You become very dangerous to those in power.” In the twilight of this age of madness cloaked as sanity, cultivate the wisdom of insecurity & creative maladjustment. Have the courage to abide in a “kind of sanity that is unrecognizable to comfort-seeking people.”   Accept that the age of a comfortable and habitable Earth is in the process of ending.” -OSJ

Written By By Eric Holthaus @ Rolling Stone:

Historians may look to 2015 as the year when shit really started hitting the fan. Some snapshots: In just the past few months, record-setting heat waves in Pakistan and India each killed more than 1,000 people. In Washington state’s Olympic National Park, the rainforest caught fire for the first time in living memory. London reached 98 degrees Fahrenheit during the hottest July day ever recorded in the U.K.; The Guardian briefly had to pause its live blog of the heat wave because its computer servers overheated. In California, suffering from its worst drought in a millennium, a 50-acre brush fire swelled seventyfold in a matter of hours, jumping across the I-15 freeway during rush-hour traffic. Then, a few days later, the region was pounded by intense, virtually unheard-of summer rains. Puerto Rico is under its strictest water rationing in history as a monster El Niño forms in the tropical Pacific Ocean, shifting weather patterns worldwide.

On July 20th, James Hansen, the former NASA climatologist who brought climate change to the public’s attention in the summer of 1988, issued a bombshell: He and a team of climate scientists had identified a newly important feedback mechanism off the coast of Antarctica that suggests mean sea levels could rise 10 times faster than previously predicted: 10 feet by 2065. The authors included this chilling warning: If emissions aren’t cut, “We conclude that multi-meter sea-level rise would become practically unavoidable. Social disruption and economic consequences of such large sea-level rise could be devastating. It is not difficult to imagine that conflicts arising from forced migrations and economic collapse might make the planet ungovernable, threatening the fabric of civilization.”

Eric Rignot, a climate scientist at NASA and the University of California-Irvine and a co-author on Hansen’s study, said their new research doesn’t necessarily change the worst-case scenario on sea-level rise, it just makes it much more pressing to think about and discuss, especially among world leaders. In particular, says Rignot, the new research shows a two-degree Celsius rise in global temperature — the previously agreed upon “safe” level of climate change — “would be a catastrophe for sea-level rise.”

Hansen’s new study also shows how complicated and unpredictable climate change can be. Even as global ocean temperatures rise to their highest levels in recorded history, some parts of the ocean, near where ice is melting exceptionally fast, are actually cooling, slowing ocean circulation currents and sending weather patterns into a frenzy. Sure enough, a persistently cold patch of ocean is starting to show up just south of Greenland, exactly where previous experimental predictions of a sudden surge of freshwater from melting ice expected it to be. Michael Mann, another prominent climate scientist, recently said of the unexpectedly sudden Atlantic slowdown, “This is yet another example of where observations suggest that climate model predictions may be too conservative when it comes to the pace at which certain aspects of climate change are proceeding.”

Since storm systems and jet streams in the United States and Europe partially draw their energy from the difference in ocean temperatures, the implication of one patch of ocean cooling while the rest of the ocean warms is profound. Storms will get stronger, and sea-level rise will accelerate. Scientists like Hansen only expect extreme weather to get worse in the years to come, though Mann said it was still “unclear” whether recent severe winters on the East Coast are connected to the phenomenon.

And yet, these aren’t even the most disturbing changes happening to the Earth’s biosphere that climate scientists are discovering this year. For that, you have to look not at the rising sea levels but to what is actually happening within the oceans themselves.

Water temperatures this year in the North Pacific have never been this high for this long over such a large area — and it is already having a profound effect on marine life.

Eighty-year-old Roger Thomas runs whale-watching trips out of San Francisco. On an excursion earlier this year, Thomas spotted 25 humpbacks and three blue whales. During a survey on July 4th, federal officials spotted 115 whales in a single hour near the Farallon Islands — enough to issue a boating warning. Humpbacks are occasionally seen offshore in California, but rarely so close to the coast or in such numbers. Why are they coming so close to shore? Exceptionally warm water has concentrated the krill and anchovies they feed on into a narrow band of relatively cool coastal water. The whales are having a heyday. “It’s unbelievable,” Thomas told a local paper. “Whales are all over
the place.”

Last fall, in northern Alaska, in the same part of the Arctic where Shell is planning to drill for oil, federal scientists discovered 35,000 walruses congregating on a single beach. It was the largest-ever documented “haul out” of walruses, and a sign that sea ice, their favored habitat, is becoming harder and harder to find.

Marine life is moving north, adapting in real time to the warming ocean. Great white sharks have been sighted breeding near Monterey Bay, California, the farthest north that’s ever been known to occur. A blue marlin was caught last summer near Catalina Island — 1,000 miles north of its typical range. Across California, there have been sightings of non-native animals moving north, such as Mexican red crabs.

Salmon
Salmon on the brink of dying out. Michael Quinton/Newscom

No species may be as uniquely endangered as the one most associated with the Pacific Northwest, the salmon. Every two weeks, Bill Peterson, an oceanographer and senior scientist at the National Oceanic and Atmospheric Administration’s Northwest Fisheries Science Center in Oregon, takes to the sea to collect data he uses to forecast the return of salmon. What he’s been seeing this year is deeply troubling.

Salmon are crucial to their coastal ecosystem like perhaps few other species on the planet. A significant portion of the nitrogen in West Coast forests has been traced back to salmon, which can travel hundreds of miles upstream to lay their eggs. The largest trees on Earth simply wouldn’t exist without salmon.

But their situation is precarious. This year, officials in California are bringing salmon downstream in convoys of trucks, because river levels are too low and the temperatures too warm for them to have a reasonable chance of surviving. One species, the winter-run Chinook salmon, is at a particularly increased risk of decline in the next few years, should the warm water persist offshore.

“You talk to fishermen, and they all say: ‘We’ve never seen anything like this before,’ ” says Peterson. “So when you have no experience with something like this, it gets like, ‘What the hell’s going on?’ ”

Atmospheric scientists increasingly believe that the exceptionally warm waters over the past months are the early indications of a phase shift in the Pacific Decadal Oscillation, a cyclical warming of the North Pacific that happens a few times each century. Positive phases of the PDO have been known to last for 15 to 20 years, during which global warming can increase at double the rate as during negative phases of the PDO. It also makes big El Niños, like this year’s, more likely. The nature of PDO phase shifts is unpredictable — climate scientists simply haven’t yet figured out precisely what’s behind them and why they happen when they do. It’s not a permanent change — the ocean’s temperature will likely drop from these record highs, at least temporarily, some time over the next few years — but the impact on marine species will be lasting, and scientists have pointed to the PDO as a global-warming preview.

“The climate [change] models predict this gentle, slow increase in temperature,” says Peterson, “but the main problem we’ve had for the last few years is the variability is so high. As scientists, we can’t keep up with it, and neither can the animals.” Peterson likens it to a boxer getting pummeled round after round: “At some point, you knock them down, and the fight is over.”

India
Pavement-melting heat waves in India. Harish Tyagi/EPA/Corbis

Attendant with this weird wildlife behavior is a stunning drop in the number of plankton — the basis of the ocean’s food chain. In July, another major study concluded that acidifying oceans are likely to have a “quite traumatic” impact on plankton diversity, with some species dying out while others flourish. As the oceans absorb carbon dioxide from the atmosphere, it’s converted into carbonic acid — and the pH of seawater declines. According to lead author Stephanie Dutkiewicz of MIT, that trend means “the whole food chain is going to be different.”

The Hansen study may have gotten more attention, but the Dutkiewicz study, and others like it, could have even more dire implications for our future. The rapid changes Dutkiewicz and her colleagues are observing have shocked some of their fellow scientists into thinking that yes, actually, we’re heading toward the worst-case scenario. Unlike a prediction of massive sea-level rise just decades away, the warming and acidifying oceans represent a problem that seems to have kick-started a mass extinction on the same time scale.

Jacquelyn Gill is a paleoecologist at the University of Maine. She knows a lot about extinction, and her work is more relevant than ever. Essentially, she’s trying to save the species that are alive right now by learning more about what killed off the ones that aren’t. The ancient data she studies shows “really compelling evidence that there can be events of abrupt climate change that can happen well within human life spans. We’re talking less than a decade.”

For the past year or two, a persistent change in winds over the North Pacific has given rise to what meteorologists and oceanographers are calling “the blob” — a highly anomalous patch of warm water between Hawaii, Alaska and Baja California that’s thrown the marine ecosystem into a tailspin. Amid warmer temperatures, plankton numbers have plummeted, and the myriad species that depend on them have migrated or seen their own numbers dwindle.

Significant northward surges of warm water have happened before, even frequently. El Niño, for example, does this on a predictable basis. But what’s happening this year appears to be something new. Some climate scientists think that the wind shift is linked to the rapid decline in Arctic sea ice over the past few years, which separate research has shown makes weather patterns more likely to get stuck.

A similar shift in the behavior of the jet stream has also contributed to the California drought and severe polar vortex winters in the Northeast over the past two years. An amplified jet-stream pattern has produced an unusual doldrum off the West Coast that’s persisted for most of the past 18 months. Daniel Swain, a Stanford University meteorologist, has called it the “Ridiculously Resilient Ridge” — weather patterns just aren’t supposed to last this long.

What’s increasingly uncontroversial among scientists is that in many ecosystems, the impacts of the current off-the-charts temperatures in the North Pacific will linger for years, or longer. The largest ocean on Earth, the Pacific is exhibiting cyclical variability to greater extremes than other ocean basins. While the North Pacific is currently the most dramatic area of change in the world’s oceans, it’s not alone: Globally, 2014 was a record-setting year for ocean temperatures, and 2015 is on pace to beat it soundly, boosted by the El Niño in the Pacific. Six percent of the world’s reefs could disappear before the end of the decade, perhaps permanently, thanks to warming waters.

Since warmer oceans expand in volume, it’s also leading to a surge in sea-level rise. One recent study showed a slowdown in Atlantic Ocean currents, perhaps linked to glacial melt from Greenland, that caused a four-inch rise in sea levels along the Northeast coast in just two years, from 2009 to 2010. To be sure, it seems like this sudden and unpredicted surge was only temporary, but scientists who studied the surge estimated it to be a 1-in-850-year event, and it’s been blamed on accelerated beach erosion “almost as significant as some hurricane events.”

Turkey
Biblical floods in Turkey. Ali Atmaca/Anadolu Agency/Getty

Possibly worse than rising ocean temperatures is the acidification of the waters. Acidification has a direct effect on mollusks and other marine animals with hard outer bodies: A striking study last year showed that, along the West Coast, the shells of tiny snails are already dissolving, with as-yet-unknown consequences on the ecosystem. One of the study’s authors, Nina Bednaršek, told Science magazine that the snails’ shells, pitted by the acidifying ocean, resembled “cauliflower” or “sandpaper.” A similarly striking study by more than a dozen of the world’s top ocean scientists this July said that the current pace of increasing carbon emissions would force an “effectively irreversible” change on ocean ecosystems during this century. In as little as a decade, the study suggested, chemical changes will rise significantly above background levels in nearly half of the world’s oceans.

“I used to think it was kind of hard to make things in the ocean go extinct,” James Barry of the Monterey Bay Aquarium Research Institute in California told the Seattle Times in 2013. “But this change we’re seeing is happening so fast it’s almost instantaneous.”

Thanks to the pressure we’re putting on the planet’s ecosystem — warming, acidification and good old-fashioned pollution — the oceans are set up for several decades of rapid change. Here’s what could happen next.

The combination of excessive nutrients from agricultural runoff, abnormal wind patterns and the warming oceans is already creating seasonal dead zones in coastal regions when algae blooms suck up most of the available oxygen. The appearance of low-oxygen regions has doubled in frequency every 10 years since 1960 and should continue to grow over the coming decades at an even greater rate.

So far, dead zones have remained mostly close to the coasts, but in the 21st century, deep-ocean dead zones could become common. These low-oxygen regions could gradually expand in size — potentially thousands of miles across — which would force fish, whales, pretty much everything upward. If this were to occur, large sections of the temperate deep oceans would suffer should the oxygen-free layer grow so pronounced that it stratifies, pushing surface ocean warming into overdrive and hindering upwelling of cooler, nutrient-rich deeper water.

Enhanced evaporation from the warmer oceans will create heavier downpours, perhaps destabilizing the root systems of forests, and accelerated runoff will pour more excess nutrients into coastal areas, further enhancing dead zones. In the past year, downpours have broken records in Long Island, Phoenix, Detroit, Baltimore, Houston and Pensacola, Florida.

Evidence for the above scenario comes in large part from our best understanding of what happened 250 million years ago, during the “Great Dying,” when more than 90 percent of all oceanic species perished after a pulse of carbon dioxide and methane from land-based sources began a period of profound climate change. The conditions that triggered “Great Dying” took hundreds of thousands of years to develop. But humans have been emitting carbon dioxide at a much quicker rate, so the current mass extinction only took 100 years or so to kick-start.

With all these stressors working against it, a hypoxic feedback loop could wind up destroying some of the oceans’ most species-rich ecosystems within our lifetime. A recent study by Sarah Moffitt of the University of California-Davis said it could take the ocean thousands of years to recover. “Looking forward for my kid, people in the future are not going to have the same ocean that I have today,” Moffitt said.

As you might expect, having tickets to the front row of a global environmental catastrophe is taking an increasingly emotional toll on scientists, and in some cases pushing them toward advocacy. Of the two dozen or so scientists I interviewed for this piece, virtually all drifted into apocalyptic language at some point.

For Simone Alin, an oceanographer focusing on ocean acidification at NOAA’s Pacific Marine Environmental Laboratory in Seattle, the changes she’s seeing hit close to home. The Puget Sound is a natural laboratory for the coming decades of rapid change because its waters are naturally more acidified than most of the world’s marine ecosystems.

The local oyster industry here is already seeing serious impacts from acidifying waters and is going to great lengths to avoid a total collapse. Alin calls oysters, which are non-native, the canary in the coal mine for the Puget Sound: “A canary is also not native to a coal mine, but that doesn’t mean it’s not a good indicator of change.”

Though she works on fundamental oceanic changes every day, the Dutkiewicz study on the impending large-scale changes to plankton caught her off-guard: “This was alarming to me because if the basis of the food web changes, then . . . everything could change, right?”

Alin’s frank discussion of the looming oceanic apocalypse is perhaps a product of studying unfathomable change every day. But four years ago, the birth of her twins “heightened the whole issue,” she says. “I was worried enough about these problems before having kids that I maybe wondered whether it was a good idea. Now, it just makes me feel crushed.”

Katharine Hayhoe
Katharine Hayhoe speaks about climate change to students and faculty at Wayland Baptist University in 2011. Geoffrey McAllister/Chicago Tribune/MCT/Getty

Katharine Hayhoe, a climate scientist and evangelical Christian, moved from Canada to Texas with her husband, a pastor, precisely because of its vulnerability to climate change. There, she engages with the evangelical community on science — almost as a missionary would. But she’s already planning her exit strategy: “If we continue on our current pathway, Canada will be home for us long term. But the majority of people don’t have an exit strategy. . . . So that’s who I’m here trying to help.”

James Hansen, the dean of climate scientists, retired from NASA in 2013 to become a climate activist. But for all the gloom of the report he just put his name to, Hansen is actually somewhat hopeful. That’s because he knows that climate change has a straightforward solution: End fossil-fuel use as quickly as possible. If tomorrow, the leaders of the United States and China would agree to a sufficiently strong, coordinated carbon tax that’s also applied to imports, the rest of the world would have no choice but to sign up. This idea has already been pitched to Congress several times, with tepid bipartisan support. Even though a carbon tax is probably a long shot, for Hansen, even the slim possibility that bold action like this might happen is enough for him to devote the rest of his life to working to achieve it. On a conference call with reporters in July, Hansen said a potential joint U.S.-China carbon tax is more important than whatever happens at the United Nations climate talks in Paris.

One group Hansen is helping is Our Children’s Trust, a legal advocacy organization that’s filed a number of novel challenges on behalf of minors under the idea that climate change is a violation of intergenerational equity — children, the group argues, are lawfully entitled to inherit a healthy planet.

A separate challenge to U.S. law is being brought by a former EPA scientist arguing that carbon dioxide isn’t just a pollutant (which, under the Clean Air Act, can dissipate on its own), it’s also a toxic substance. In general, these substances have exceptionally long life spans in the environment, cause an unreasonable risk, and therefore require remediation. In this case, remediation may involve planting vast numbers of trees or restoring wetlands to bury excess carbon underground.

Even if these novel challenges succeed, it will take years before a bend in the curve is noticeable. But maybe that’s enough. When all feels lost, saving a few species will feel like a triumph.

“What are we supposed to do, just have dirt around our house on four acres?”: Rich Californians Balk At limits, Increase Water Use By 9%

In Uncategorized on June 24, 2015 at 4:02 pm

Riley, a Labrador Retriever, plays in a pool at a residence in Rancho Santa Fe, California. (Sandy Huffaker/The Washington Post)

Oldspeak:”I think we’re being overly penalized, and we’re certainly being overly scrutinized by the world… You could put 20 houses on my property, and they’d have families of at least four. In my house, there is only two of us, so they’d be using a hell of a lot more water than we’re using.” -Gay Butler, Interior Designer, Rancho Santa Fe, California

“Interesting piece. While the attitudes of people like this well-to-do party member are abominable and ignorant, They are completely predictable and logical, for persons reared, nurtured, educated, and benefiting disproportionately unquestioning, within a system of infinite growth and consumption. These people have internalized the world view of their oppressor; Inverted Corptalitarian Kleptocracy or Industrial Civilization.  What’s left unsaid is how these people reflect, the nature of the life-extinguishing culture and environment in which they live. Also unsaid is how insignificant the actions of these people and most people is when compared to the actions of our most spoiled and privileged “citizens”:  energy, agribusiness, and water bottling corporations who consume and poison more water than any actually citizen could, and have had none of the usage restrictions placed on them, that have been placed on humans. No questioning of the suicidal implications of this decision. No attention is drawn to the ongoing and ever expanding extraction and destruction of irreplaceably essential resources for a “profit” by said “citizens”. In the context of the destruction of our world, we have to at least wonder, is profit worth most all that lives on earth?” -OSJ

Written By Rob Kuznia @ The Washington Post:

Drought or no drought, Steve Yuhas resents the idea that it is somehow shameful to be a water hog. If you can pay for it, he argues, you should get your water.

People “should not be forced to live on property with brown lawns, golf on brown courses or apologize for wanting their gardens to be beautiful,” Yuhas fumed recently on social media. “We pay significant property taxes based on where we live,” he added in an interview. “And, no, we’re not all equal when it comes to water.”

Yuhas lives in the ultra-wealthy enclave of Rancho Santa Fe, a bucolic Southern California hamlet of ranches, gated communities and country clubs that guzzles five times more water per capita than the statewide average. In April, after Gov. Jerry Brown (D) called for a 25 percent reduction in water use, consumption in Rancho Santa Fe went up by 9 percent.

But a moment of truth is at hand for Yuhas and his neighbors, and all of California will be watching: On July 1, for the first time in its 92-year history, Rancho Santa Fe will be subject to water rationing.

“It’s no longer a ‘You can only water on these days’ ” situation, said Jessica Parks, spokeswoman for the Santa Fe Irrigation District, which provides water service to Rancho Santa Fe and other parts of San Diego County. “It’s now more of a ‘This is the amount of water you get within this billing period. And if you go over that, there will be high penalties.’ ”

So far, the community’s 3,100 residents have not felt the wrath of the water police. Authorities have issued only three citations for violations of a first round of rather mild water restrictions announced last fall. In a place where the median income is $189,000, where PGA legend Phil Mickelson once requested a separate water meter for his chipping greens, where financier Ralph Whitworth last month paid the Rolling Stones $2 million to play at a local bar, the fine, at $100, was less than intimidating.

All that is about to change, however. Under the new rules, each household will be assigned an essential allotment for basic indoor needs. Any additional usage — sprinklers, fountains, swimming pools — must be slashed by nearly half for the district to meet state-mandated targets.

Residents who exceed their allotment could see their already sky-high water bills triple. And for ultra-wealthy customers undeterred by financial penalties, the district reserves the right to install flow restrictors — quarter-size disks that make it difficult to, say, shower and do a load of laundry at the same time.

In extreme cases, the district could shut off the tap altogether.

The restrictions are among the toughest in the state, and residents of Rancho Santa Fe are feeling aggrieved.

“I think we’re being overly penalized, and we’re certainly being overly scrutinized by the world,” said Gay Butler, an interior designer out for a trail ride on her show horse, Bear. She said her water bill averages about $800 a month.

“It angers me because people aren’t looking at the overall picture,” Butler said. “What are we supposed to do, just have dirt around our house on four acres?”

Rancho Santa Fe residents are hardly the only Californians facing a water crackdown. On Friday, the state said it would impose sharp cutbacks on senior water rights dating back to the Gold Rush for the first time in four decades, a move that primarily hits farmers. And starting this month, all of California’s 400-plus water districts are under orders to reduce flow by at least 8 percent from 2013 levels.

Top water users such as Rancho Santa Fe are required to cut consumption by 36 percent. Other areas in the 36-percent crosshairs include much of the Central Valley, a farming region that runs up the middle of the state, and Orange County, a ritzy Republican stronghold between San Diego and Los Angeles.

“I call it the war on suburbia,” said Brett Barbre, who lives in the Orange County community of Yorba City, another exceptionally wealthy Zip code.

Barbre sits on the 37-member board of directors of the Metropolitan Water District of Southern California, a huge water wholesaler serving 17 million customers. He is fond of referring to his watering hose with Charlton Heston’s famous quote about guns: “They’ll have to pry it from my cold, dead hands.”

“California used to be the land of opportunity and freedom,” Barbre said. “It’s slowly becoming the land of one group telling everybody else how they think everybody should live their lives.”

Jurgen Gramckow, a sod farmer north of Los Angeles in Ventura County, agrees. He likens the freedom to buy water to the freedom to buy gasoline.

“Some people have a Prius; others have a Suburban,” Gramckow said. “Once the water goes through the meter, it’s yours.”

Yuhas, who hosts a conservative talk-radio show, abhors the culture of “drought-shaming” that has developed here since the drought began four years ago, especially the aerial shots of lavish lawns targeted for derision on the local TV news.

“I’m a conservative, so this is strange, but I defend Barbra Streisand’s right to have a green lawn,” said Yuhas, who splits his time between Rancho Santa Fe and Los Angeles. “When we bought, we didn’t plan on getting a place that looks like we’re living in an African savanna.”

Others are embarrassed by such defiance. Parks of the Sante Fe Irrigation District said she was mortified when the report came out earlier this month showing that Rancho Santa Fe had increased its water use — the only community in the region to do so.

“I kind of take it personally,” she said last week as she toured the community in an SUV bearing the water district’s logo.

Parks said she doesn’t know exactly what happened, but she has heard rumors that some people jacked up their water use in a misguided attempt to increase their baseline before rationing kicks in. With sprinkler restrictions already in place, she said the dynamic between local gardeners and her small team of enforcers is getting interesting.

“Everyone seems now to know what our cars look like,” she said. In Fairbanks Ranch, a gated community, “whenever one of our trucks go in, the gardeners all seem to call each other — text-message each other — to let them know that we’ve arrived. So then all of a sudden we see water kind of draining off the property but no sprinklers on.”

Because the restrictions that took effect in September didn’t register, the district further tightened the screws this month. Sprinkler days were reduced from three a week to two, while car-washing and garden fountains were banned altogether.

Holly Manion, a real estate agent who has lived on the Ranch, as it’s often called, for most of her 62 years, supports the restrictions. Although Manion cherishes the landscape of manicured lawns and burbling fountains that has long defined the Ranch, she thinks the drought requires a new way of life that emphasizes water conservation.

“Just take a drive around the area. You’ll see lakes low, rivers dry and hillsides parched,” Manion said, adding that she is appalled by people who tolerate leaking sprinklers and the resulting cascades of wasted water.

“There are people, they aren’t being responsible,” she said. “They’re just thinking of their own lives.”

Ann Boon, president of the Rancho Santa Fe Association, insists that most residents are taking the drought seriously. She said she was shocked by the reported 9 percent increase, arguing that it “must be some anomaly.”

“Everybody has been trying to cut back,” she said.

For example, many Rancho Santa Fe residents have enthusiastically embraced drought-tolerant landscaping. Manion took advantage of a rebate to rip out much of the turf on her three-acre property and replace it with succulents and decomposed-granite pathways. She left only a small patch of grass for her two dogs to play on.

“It makes me happy when I look at it, because it’s thriving,” she said.

Butler said she, too, is replacing grass with drought-friendly native landscaping on her four acres, at a cost of nearly $80,000. (She’ll get a rebate for about $12,000.) But she came to the decision grudgingly, she said. And she defends the amount of water she and her neighbors need for their vast estates.

“You could put 20 houses on my property, and they’d have families of at least four. In my house, there is only two of us,” Butler said. So “they’d be using a hell of a lot more water than we’re using.”

Rancho Santa Fe resident Randy Woods was feeling burdened by his lush landscape and opted to downsize. The 60-something chief executive of a biotech company moved a year ago from a two-acre estate — replete with two waterfalls, two Jacuzzis, a swimming pool and an orchard — to a condo in the tiny core of town known as “the Village.”

Woods said some of his friends would like to do the same, largely to cut down on their bloated water bills. But they have encountered an unforeseen obstacle, he said: The drought has dampened demand for large estates in San ­Diego County.

Woods said his girlfriend is among those struggling to sell. Her home boasts a yard designed by Kate Sessions, a well-known landscape architect and botanist who died in 1940. But now, the rare palm tree specimens, the secret garden and the turret-shaped hedges are a liability rather than a selling point.

Another friend, Woods said, has seen the value of his nine-acre plot plummet from $30 million to $22 million.

As for Woods, his monthly water bill has shriveled from $500 to around $50.

“My friends,” he said, “are all jealous.”

Why Good News For The Ozone Layer Is Bad News For The Climate

In Uncategorized on September 29, 2014 at 12:19 am

2014 927 ozone fwOldspeak: “The “good news” arrived via the Associated Press on September 11: Thanks to the Montreal Protocol, atmospheric ozone is recovering. Scientists have been monitoring atmospheric ozone since 1989, the year the Montreal Protocol on Substances that Deplete Ozone (a protocol to the Vienna Convention for the Protection of the Ozone Layer) came into effect (it was negotiated in 1987). The scientists released their latest assessment on September 10, the subject of the Associated Press report….According to NASA scientist Paul A. Newman, ozone levels climbed 4 percent in mid-northern latitudes at about 30 miles up from 2000 to 2013… The very slight thickening of the ozone layer is, as claimed, due to the phase-out of CFCs and other bad ozone actors. But it’s also due to the increased concentration of carbon dioxide and other heat-trapping gases in the atmosphere. Greenhouse gases cool the upper stratosphere. As that region of the heavens cools, ozone is rebuilt. The good ozone news is thus bad climate news….Among the most powerful greenhouse gases are HFCs, the non-ozone-destroying substitute for CFCs. Some HFCs have a global warming potential (GWP) 10,000 times that of carbon dioxide (the most commonly used, R-134a, has a GWP of 1430). The growth in their use is clear… without global action, HFC use is expected to increase significantly over the next three or four decades with dire consequences for the climate…Pretending that miniscule improvement in atmospheric ozone levels is cause for celebration is not that big of a deal. The more serious problem is continuing to suggest that the Montreal Protocol is a model for international action on climate change. Dealing with CFCs and their problematic substitutes was, and is, infinitely easier than confronting climate chaos. Banning gases with especially high global warming potential (GWPs) is necessary, but nowhere near sufficient. Carbon emissions are the lifeblood of the global economy, of affluent life styles lived by the few but aspired to by the many. A vigorous climate convention requires far-reaching shifts in virtually every corner of daily life in the developed world.” -Steven Breyman

“This is what’s it’s come to in our sad state of affairs. Manufacturing a “victory” and “one of the great success stories of international collective action in addressing a global environmental change phenomenon.” out of something that actually signifies defeat and failure in addressing the global environmental change phenomenon. The reality, is the chemicals that were used to replace the chemicals found to deplete the ozone layer, are thousands of times more potent and harmful than carbon dioxide, the greenhouse gas most of our attention is focused on. The use of these chemicals are expected to increase significantly over the next 3 to 4 decades. How can this reality be couched as good news? Only in a reality where words, artfully and duplicitously weaved together, mean their complete opposite. An Orwellian world, where “War is Peace”, “Freedom is Slavery”, and “Ignorance is Strength”.  No matter how we choose to perceive reality, Earth’s 6th mass extinction keeps rolling along.” –OSJ

 

By Stephen Breyman @ Truthout:

We live in a world hungry for good environmental news. But that’s no excuse for journalistic or scientific spin passing as an unvarnished victory for the environment, nor for exaggeration of the value of a narrowly focused environmental treaty as a model for a universal agreement.

The “good news” arrived via the Associated Press on September 11: Thanks to the Montreal Protocol, atmospheric ozone is recovering. Scientists have been monitoring atmospheric ozone since 1989, the year the Montreal Protocol on Substances that Deplete Ozone (a protocol to the Vienna Convention for the Protection of the Ozone Layer) came into effect (it was negotiated in 1987). The scientists released their latest assessment on September 10, the subject of the Associated Press report.

Some background is in order. The Montreal Protocol is important on its own merits. A world of thinning atmospheric ozone is a world of increased skin cancer, eye problems and reduced agricultural yields and phytoplankton production. Every member state of the United Nations ratified the Protocol. But it is as a model for climate change negotiations and agreement that it takes on greater importance. The successful negotiation of the Montreal Protocol required agreement among policymakers, scientists and corporations, as will the replacement for the Kyoto Protocol.

The original Montreal Protocol achieved iconic status – Kofi Annan called it “perhaps the single most effective international agreement to date” – because it phased out production of five chlorofluorocarbons (CFCs) known to destroy atmospheric ozone. CFCs were most widely used as refrigerants, solvents, blowing agents and fire extinguishers, as are their substitutes today. There have been five effectiveness-improving amendments to the original Protocol.

The Protocol and its amendments were possible for five reasons:

First, given the phase-in of the phase-out (zero production and use of the five CFCs was not required until 1996) DuPont, the dominant firm in the business, had time to research and manufacture the economical and less destructive substitute hydrochlorofluorocarbons (HCFCs), and the nondestructive hydrofluorocarbons (HFCs), even though it had to be pushed hard to do so. Lacking a chlorine atom, HFCs do not attack the ozone layer. HFCs and HCFCs are also less persistent in the atmosphere than CFCs, from two to 40 years for the former, to up to 150 years for the latter.

Second, CFCs were going off patent, so it was in DuPont’s interest to protect the multibillion-dollar market by developing HCFCs and HFCs.

Third, the science was clear on the Antarctic ozone hole, with but a handful of companies, led by DuPont, working to deny it.

Fourth, other ozone killers – several halons and some other CFCs – were not phased out until 2010.

Fifth, mandated phaseout of HCFCs does not begin until 2015, with zero production and consumption required by 2030.

The Montreal Protocol came to be because it posed a minor challenge to the profits of but a few firms, allowed time for new substitutes to come to market, and permitted use of less dangerous ozone-destroying chemicals, or those posing no threat at all.

Now back to the alleged good news report: According to NASA scientist Paul A. Newman, ozone levels climbed 4 percent in mid-northern latitudes at about 30 miles up from 2000 to 2013. (The tiny change for the better explains why it is hard to see much if any improvement between 1989 and 2010, or between 2006 and 2010, in the photos above.) The Associated Press does not tell us about ozone concentrations at other latitudes or other altitudes (except for 50 miles up, but no specific improvement figure is reported; this probably means the improvement was less than 4 percent elsewhere in the upper atmosphere).

The improvement is a “victory for diplomacy and for science, and for the fact that we were able to work together,” said Nobel Prize chemist Mario Molina, one of the scientists who first made the connection between certain chemicals and ozone depletion. Achim Steiner, executive director of the UN Environment Program, hailed the slight recovery of atmospheric ozone as “one of the great success stories of international collective action in addressing a global environmental change phenomenon.” Political scientist Paul Wapner said the latest findings were “good news in an often-dark landscape.”

The very slight thickening of the ozone layer is, as claimed, due to the phase-out of CFCs and other bad ozone actors. But it’s also due to the increased concentration of carbon dioxide and other heat-trapping gases in the atmosphere. Greenhouse gases cool the upper stratosphere. As that region of the heavens cools, ozone is rebuilt. The good ozone news is thus bad climate news.

2014 927 chart 1Among the most powerful greenhouse gases are HFCs, the non-ozone-destroying substitute for CFCs. Some HFCs have a global warming potential (GWP) 10,000 times that of carbon dioxide (the most commonly used, R-134a, has a GWP of 1430). The growth in their use is clear in the graph below; without global action, HFC use is expected to increase significantly over the next three or four decades with dire consequences for the climate, according to MIT atmospheric scientist Susan Solomon. (Source: TEAP/EPA/UNEP)

Ready for more double-edged good news? The Obama administration appears intent on phasing out HFCs (just in time for the UN gathering and Peoples Climate March in NYC), and a chemical that is nondestructive to ozone, with only four times the global warming potential of carbon dioxide – the hydrofluoroolefin HFO-1234YF, also known as 2,3,3,3-Tetrafluoropropene – is ready to go as the latest substitute for CFCs.

The plan (as under the Montreal Protocol) is to give giant producers (including DuPont and Honeywell which own most of the patents) and massive users (including, Coca Cola, Pepsi Cola, Target and Kroger’s) time to phase in HFO-1234YF. The European Union directive that automotive air conditioners use refrigerants with global warming potential (GWPs) of 150 or lower had most European car makers begin shifting to HFO-1234YF in 2011 (a total ban on more powerful climate-changing chemicals comes in 2017). General Motors has been using HFO-1234YF in Chevys, Buicks, GMCs and Cadillacs since 2013. Chrysler reportedly plans to transition to HFO-1234YF as well.

Given the history of CFCs and their substitutes, at least some adverse effects from HFO-1234YF production and use, and some glitches in the transition are likely. German automakers worry that HFO-1234YF is both too expensive and too flammable (they’re investigating the use of carbon dioxide). In case of fire following a collision, HFO-1234YF releases highly corrosive and toxic hydrogen fluoride gas. One report had it that Daimler Benz engineers witnessed combustion in two-thirds of simulated head-on crashes. Considering the requirement that auto repair shops retool their air conditioning service equipment to use HFO-1234YF, it’s likely they’ll stick with the HFC R134a as long as possible. India is so far uninterested in moving toward replacing R134a by HFO-1234YF (China is working with the United States to jointly reduce emissions of HFCs). Canada, Mexico and the United States intend to propose amendments to the Montreal Protocol to command the phase-out of HFC production.

Pretending that miniscule improvement in atmospheric ozone levels is cause for celebration is not that big of a deal. The more serious problem is continuing to suggest that the Montreal Protocol is a model for international action on climate change. Dealing with CFCs and their problematic substitutes was, and is, infinitely easier than confronting climate chaos. Banning gases with especially high global warming potential (GWPs) is necessary, but nowhere near sufficient. Carbon emissions are the lifeblood of the global economy, of affluent life styles lived by the few but aspired to by the many. A vigorous climate convention requires far-reaching shifts in virtually every corner of daily life in the developed world.

Confronting ozone depletion permitted business as usual with but the smallest of tweaks that went unnoticed by most. Overcoming the ozone depletion denial industry was a trivial challenge compared to that posed by the forces arrayed to muddle climate science and stymie strong action.

Again: a climate change agreement that includes robust mitigation, a serious campaign to build resilience against a destabilized climate, and a foundation on the principle of climate justice requires genuine and widespread change.

Preventing catastrophic and irreversible climate change compels conversion of the complex systems of transportation, agriculture, generation of electricity, cooling and heating, waste management, manufacturing, technological innovation and more. It also requires transformation in developed countries’ sense of responsibility for past and future emissions. This is why we have yet to see one. Military budgets must be slashed and war machines stopped to free up the funds necessary for building clean green economies and to stop exacerbating the problem. How likely is that as the United States returns to Iraq for the third time in as many decades?

 

Peeling The Onion: Almost Everyone Involved In Developing Tor Was (Or Is) Funded By The US Government

In Uncategorized on July 21, 2014 at 11:35 pm

tor-privacy-roger-dingledine-nsa-pentagon

Oldspeak: “None are more hopelessly than those who falsely believe they are free-Goethe.

YEEEESH…  i can’t say i’m surprised.  i’m more gullible than i thought.  Turns out TOR was/is a great way for governments to identify and track people who value their anonymity .  And was developed originally for spooks. Needless to say, don’t use Tor if you want to communicate and browse the internet securely. Or maybe this story is bullshit too, who the shit knows at this point. Le Sigh… ” -OSJ

By Yasha Levine @ Pando:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”

—Roger Dingledine, co-founder of the Tor Network, 2004

***

In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity.

Internet privacy activists and organizations reacted to the news with shock. For the past decade, they had been promoting Tor as a scrappy but extremely effective grassroots technology that can protect journalists, dissidents and whistleblowers from powerful government forces that want to track their every move online. It was supposed to be the best tool out there. Tor’s been an integral part of EFF’s “Surveillance Self-Defense” privacy toolkit. Edward Snowden is apparently a big fan, and so is Glenn Greenwald, who says it “allows people to surf without governments or secret services being able to monitor them.”

But the German exposé  showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online.

To many in the privacy community, the NSA’s attack on Tor was tantamount to high treason: a fascist violation of a fundamental and sacred human right to privacy and free speech.

The Electronic Frontier Foundation believes Tor to be “essential to freedom of expression.” Appelbaum — a Wikileaks volunteer and Tor developer — considers volunteering for Tor to be a valiant act on par with Hemingway or Orwell “going to Spain to fight the Franco fascists” on the side of anarchist revolutionaries.

It’s a nice story, pitting scrappy techno-anarchists against the all-powerful US Imperial machine. But the facts about Tor are not as clear cut or simple as these folks make them out to be…

Let’s start with the basics: Tor was developed, built and financed by the US military-surveillance complex. Tor’s original — and current — purpose is to cloak the online identity of government agents and informants while they are in the field: gathering intelligence, setting up sting operations, giving human intelligence assets a way to report back to their handlers — that kind of thing. This information is out there, but it’s not very well known, and it’s certainly not emphasized by those who promote it.

Peek under Tor’s hood, and you quickly realize that just everybody involved in developing Tor technology has been and/or still is funded by the Pentagon or related arm of the US empire. That includes Roger Dingledine, who brought the technology to life under a series of military and federal government contracts. Dingledine even spent a summer working at the NSA.

If you read the fine print on Tor’s website, you’ll see that Tor is still very much in active use by the US government:

“A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.”

NSA? DoD? U.S. Navy? Police surveillance? What the hell is going on? How is it possible that a privacy tool was created by the same military and intelligence agencies that it’s supposed to guard us against? Is it a ruse? A sham? A honeytrap? Maybe I’m just being too paranoid…

Unfortunately, this is not a tinfoil hat conspiracy theory. It is cold hard fact.

Brief history of Tor

The origins of Tor go back to 1995, when military scientists at the Naval Research Laboratory began developing cloaking technology that would prevent someone’s activity on the Internet from being traced back to them. They called it “onion routing” — a method redirecting traffic into a parallel peer-to-peer network and bouncing it around randomly before sending it off to its final destination. The idea was to move it around so as to confuse and disconnect its origin and destination, and make it impossible for someone to observe who you are or where you’re going on the Internet.

Onion routing was like a hustler playing the three-card monte with your traffic: the guy trying to spy on you could watch it going under one card, but he never knew where it would come out.

The technology was funded by the Office of Naval Research and DARPA. Early development was spearheaded by Paul Syverson, Michael Reed and David Goldschlag — all military mathematicians and computer systems researchers working for the Naval Research Laboratory, sitting inside the massive Joint Base Anacostia-Bolling military base in Southeast Washington, D.C.

The original goal of onion routing wasn’t to protect privacy — or at least not in the way most people think of “privacy.” The goal was to allow intelligence and military personnel to work online undercover without fear of being unmasked by someone monitoring their Internet activity.

“As military grade communication devices increasingly depend on the public communications infrastructure, it is important to use that infrastructure in ways that are resistant to traffic analysis. It may also be useful to communicate anonymously, for example when gathering intelligence from public databases,” explained a 1997 paper outlining an early version of onion routing that was published in the Naval Research Labs Review.

In the 90s, as public Internet use and infrastructure grew and multiplied, spooks needed to figure out a way to hide their identity in plain sight online. An undercover spook sitting in a hotel room in a hostile country somewhere couldn’t simply dial up CIA.gov on his browser and log in — anyone sniffing his connection would know who he was. Nor could a military intel agent infiltrate a potential terrorist group masquerading as an online animal rights forum if he had to create an account and log in from an army base IP address.

That’s where onion routing came in. As Michael Reed, one of the inventors of onion routing, explained: providing cover for military and intelligence operations online was their primary objective; everything else was secondary:

The original *QUESTION* posed that led to the invention of Onion Routing was, “Can we build a system that allows for bi-directional communications over the Internet where the source and destination cannot be determined by a mid-point?” The *PURPOSE* was for DoD / Intelligence usage (open source intelligence gathering, covering of forward deployed assets, whatever). Not helping dissidents in repressive countries. Not assisting criminals in covering their electronic tracks. Not helping bit-torrent users avoid MPAA/RIAA prosecution. Not giving a 10 year old a way to bypass an anti-porn filter. Of course, we knew those would be other unavoidable uses for the technology, but that was immaterial to the problem at hand we were trying to solve (and if those uses were going to give us more cover traffic to better hide what we wanted to use the network for, all the better…I once told a flag officer that much to his chagrin).

Apparently solving this problem wasn’t very easy. Onion router research progressed slowly, with several versions developed and discarded. But in 2002, seven years after it began, the project moved into a different and more active phase. Paul Syverson from the Naval Research Laboratory stayed on the project, but two new guys fresh outta MIT grad school came on board: Roger Dingledine and Nick Mathewson. They were not formally employed by Naval Labs, but were on contract from DARPA and the U.S. Naval Research Laboratory’s Center for High Assurance Computer Systems. For the next several years, the three of them worked on a newer version of onion routing that would later become known as Tor.

Very early on, researchers understood that just designing a system that only technically anonymizes traffic is not enough — not if the system is used exclusively by military and intelligence. In order to cloak spooks better, Tor needed to be used by a diverse group of people: Activists, students, corporate researchers, soccer moms, journalists, drug dealers, hackers, child pornographers, foreign agents, terrorists — the more diverse the group that spooks could hide in the crowd in plain sight.

Tor also needed to be moved off site and disassociated from Naval research. As Syverson told Bloomberg in January 2014: “If you have a system that’s only a Navy system, anything popping out of it is obviously from the Navy. You need to have a network that carries traffic for other people as well.”

Dingledine said the same thing a decade earlier at the 2004 Wizards of OS conference in Germany:

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, ‘Oh, it’s another CIA agent.’ If those are the only people using the network.”

The consumer version of Tor would be marketed to everyone and — equally important — would eventually allow anyone to run a Tor node/relay, even from their desktop computer. The idea was to create a massive crowdsourced torrent-style network made up from thousands of volunteers all across the world.

At the very end of 2004, with Tor technology finally ready for deployment, the US Navy cut most of its Tor funding, released it under an open source license and, oddly, the project was handed over to the Electronic Frontier Foundation.

“We funded Roger Dingledine and Nick Mathewson to work on Tor for a single year from November 2004 through October 2005 for $180,000. We then served as a fiscal sponsor for the project until they got their 501(c)(3) status over the next year or two.  During that time, we took in less than $50,000 for the project,” EFF’s Dave Maass told me by email.

In a December 2004 press release announcing its support for Tor, EFF curiously failed to mention that this anonymity tool was developed primarily for military and intelligence use. Instead, it focused purely on Tor’s ability to protect free speech from oppressive regimes in the Internet age.

“The Tor project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online,” said EFF’s Technology Manager Chris Palmer.

Later on, EFF’s online materials began mentioning that Tor had been developed by the Naval Research Lab, but played down the connection, explaining that it was “in the past.” Meanwhile the organization kept boosting and promoting Tor as a powerful privacy tool:

“Your traffic is safer when you use Tor.”

Playing down Tor’s ties to the military…

The people at EFF weren’t the only ones minimizing Tor’s ties to the military.

In 2005, Wired published what might have been the first major profile of Tor technology. The article was written by Kim Zetter, and headlined: “Tor Torches Online Tracking.” Although Zetter was a bit critical of Tor, she made it seem like the anonymity technology had been handed over by the military with no strings attached to “two Boston-based programmers” — Dingledine and Nick Mathewson, who had completely rebuilt the product and ran it independently.

Dingledine and Mathewson might have been based in Boston, but they — and Tor — were hardly independent.

At the time that the Wired article went to press in 2005, both had been on the Pentagon payroll for at least three years. And they would continue to be on the federal government’s payroll for at least another seven years.

In fact, in 2004, at the Wizards of OS conference in Germany, Dingledine proudly announced that he was building spy craft tech on the government payroll:

“I forgot to mention earlier something that will make you look at me in a new light. I contract for the United States Government to built anonymity technology for them and deploy it. They don’t think of it as anonymity technology, although we use that term. They think of it as security technology. They need these technologies so they can research people they are interested in, so they can have anonymous tip lines, so that they can buy things from people without other countries knowing what they are buying, how much they are buying and where it is going, that sort of thing.”

Government support kept rolling in well after that.

In 2006, Tor research was funded was through a no-bid federal contract awarded to Dingledine’s consulting company, Moria Labs. And starting in 2007, the Pentagon cash came directly through the Tor Project itself — thanks to the fact that Team Tor finally left EFF and registered its own independent 501(c)(3) non-profit.

How dependent was — and is — Tor on support from federal government agencies like the Pentagon?

In 2007, it appears that all of Tor’s funding came from the federal government via two grants. A quarter million came from the International Broadcasting Bureau (IBB), a CIA spinoff that now operates under the Broadcasting Board of Governors. IBB runs Voice of America and Radio Marti, a propaganda outfit aimed at subverting Cuba’s communist regime. The CIA supposedly cut IBB financing in the 1970s after its ties to Cold War propaganda arms like Radio Free Europe were exposed.

The second chunk of cash — just under $100,000 — came from Internews, an NGO aimed at funding and training dissident and activists abroad. Tor’s subsequent tax filings show that grants from Internews were in fact conduits for “pass through” grants from the US State Department.

In 2008, Tor got $527,000 again from IBB and Internews, which meant that 90% of its funding came U.S. government sources that year.

In 2009, the federal government provided just over $900,000, or about 90% of the funding. Part of that cash came through a $632,189 federal grant from the State Department, described in tax filings as a “Pass-Through from Internews Network International.” Another $270,000 came via the CIA-spinoff IBB. The Swedish government gave $38,000, while Google gave a minuscule $29,000.

Most of that government cash went out in the form of salaries to Tor administrators and developers. Tor co-founders Dingledine and Mathewson made $120,000. Jacob Appelbaum, the rock star hacker, Wikileaks volunteer and Tor developer, made $96,000.

In 2010, the State Department upped its grant to $913,000 and IBB gave $180,000 — which added up to nearly $1 million out of a total of $1.3 million total funds listed on tax filings that year. Again, a good chunk of that went out as salaries to Tor developers and managers.

In 2011, IBB gave $150,00, while another $730,000 came via Pentagon and State Department grants, which represented more than 70% of the grants that year. (Although based on tax filings, government contracts added up to nearly 100% of Tor’s funding.)

The DoD grant was passed through the Stanford Research Institute, a cutting edge Cold War military-intel outfit. The Pentagon-SRI grant to Tor was given this description: “Basic and Applied Research and Development in Areas Relating to the Navy Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.”

That year, a new government funder came the scene: Swedish International Development Cooperation Agency (SIDA), Sweden’s version of USAID, gave Tor $279,000.

In 2012, Tor nearly doubled its budget, taking in $2.2 million from Pentagon and intel-connected grants: $876,099 came from the DoD, $353,000 from the State Department, $387,800 from IBB.

That same year, Tor lined up an unknown amount funding from the Broadcasting Board of Governors to finance fast exit nodes.

Tor at the NSA?

In 2013, the Washington Post revealed that the NSA had figured out various ways of unmasking and penetrating the anonymity of the Tor Network.

Since 2006, according to a 49-page research paper titled simply “Tor,” the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic on a “wide scale” — effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside. One type of attack, for example, would identify users by minute differences in the clock times on their computers.

The evidence came out of Edward Snowden’s NSA leaks. It appeared that the surveillance agency had developed several techniques to get at Tor. One of the documents explained that the NSA “pretty much guaranteed to succeed.”

Snowden’s leaks revealed another interesting detail: In 2007, Dingledine gave at a talk at the NSA’s HQ explaining Tor, and how it worked.

The Washington Post published the NSA’s notes from their meeting with Dingledine. They showed that Dingledine and the NSA mostly talked about the technical details of Tor — how the network works and some of its security/usability tradeoffs. The NSA was curious about “Tor’s customers,” and Dingledine ran down some of the types of people who could benefit from Tor: Blogger Alice, 8 yr. old Alice, Sick Alice, Consumer Alice, Oppressed Alice, Business Alice, Law Enforcement Alice…

Interestingly, Dingledine told the NSA that “the way TOR is spun is dependent on who the ‘spinee’ is” — meaning that he markets Tor technology in different ways to different people?

Interestingly, the Washington Post article described Dingledine’s trip to the NSA as “a wary encounter, akin to mutual intelligence gathering, between a spy agency and a man who built tools to ward off electronic surveillance.” Dingledine told the paper that he came away from that meeting with the feeling that the NSA was trying to hack the Tor network:

“As he spoke to the NSA, Dingledine said in an interview Friday, he suspected the agency was attempting to break into Tor, which is used by millions of people around the world to shield their identities.”

Dingledine may very well have been antagonistic during his meeting with the NSA. Perhaps he was protective over his Tor baby, and didn’t want its original inventors and sponsors in the US government taking it back. But whatever the reason, the antagonism was not likely borne out of some sort of innate ideological hostility towards the US national security state.

Aside from being on the DoD payroll, Dingledine has spends a considerable amount of his time meeting and consulting with military, intelligence and law enforcement agencies to explain why Tor’s so great, and instructing them on how to use it. What kind of agencies does he meet with? The FBI, CIA and DOJ are just a few… And if you listen to Dingledine explain these encounters in some of his public appearances, one does not detect so much as a whiff of antagonism towards intelligence and law enforcement agencies.

In 2013, during a talk at UC San Diego, Dingledine cheerfully recalled how an exuberant FBI agent rushed up to thank him during his recent trip to the FBI:

“So I’ve been doing a lot of talks lately for law enforcement. And pretty much every talk I do these days, sone FBI person comes up to me afterwards and says, ‘I use Tor everyday for my job. Thank you.’ Another example is anonymous tips — I was talking to the folks who run the CIA anonymous tip line. It’s called the Iraqi Rewards Program…”

Dingledine’s close collaboration with law enforcement aside, there’s the strangely glib manner in which he dismissed news about the NSA hacking into Tor. He seemed totally unconcerned by the evidence revealed by Snowden’s leaks, and played down the NSA’s capabilities in his comments to the Washington Post:

“If those documents actually represent what they can do, they are not as big an adversary as I thought.”

I reached out to Dingledine to ask him about his trip to the NSA and whether he warned the Tor community back in 2007 that he suspected the NSA was targeting Tor users. He didn’t respond.

How safe is Tor, really?

If Dingledine didn’t appear to be fazed by evidence of the NSA’s attack on Tor anonymity, it’s strange considering that an attack by a powerful government entity has been known to be one Tor’s principle weaknesses for quite some time.

In a 2011 discussion on Tor’s official listserv, Tor developer Mike Perry admitted that Tor might not be very effective against powerful, organized “adversaries” (aka governments) that are capable monitoring huge swaths of the Internet.

“Extremely well funded adversaries that are able to observe large portions of the Internet can probably break aspects of Tor and may be able to deanonymize users. This is why the core tor program currently has a version number of 0.2.x and comes with a warning that it is not to be used for “strong anonymity”. (Though I personally don’t believe any adversary can reliably deanonymize *all* tor users . . . but attacks on anonymity are subtle and cumulative in nature).

Indeed, just last year, Syverson was part of a research team that pretty much proved that Tor can no longer be expected to protect users over the long term.

“Tor is known to be insecure against an adversary that can observe a user’s traffic entering and exiting the anonymity network. Quite simple and efficient techniques can correlate traffic at these separate locations by taking advantage of identifying traffic patterns. As a result, the user and his destination may be identified, completely subverting the protocol’s security goals.”

The researchers concluded: “These results are somewhat gloomy for the current security of the Tor network.”

While Syverson indicated that some of the security issues identified by this research have been addressed in recent Tor versions, the findings only added to a growing list of other research and anecdotal evidence showing Tor’s not as safe as its boosters want you to think — especially when pitted against determined intelligence agencies.

Case-in-point: In December 2013, a 20-year-old Harvard panicked overachiever named Edlo Kim learned just how little protection Tor offered for would be terrorists.

To avoid taking a final exam he wasn’t prepared for, Kim hit up on the idea of sending in a fake bomb threat. То cover his tracks, he used Tor, supposedly the best anonymity service the web had to offer. But it did little mask his identity from a determined Uncle Sam. A joint investigation, which involved the FBI, the Secret Service and local police, was able to track the fake bomb threat right back to Kim — in less than 24 hours.

As the FBI complaint explained, “Harvard University was able to determine that, in the several hours leading up to the receipt of the e-mail messages described above, ELDO KIM accessed TOR using Harvard’s wireless network.” All that Tor did was make the cops jump a few extra steps. But it wasn’t hard, nothing that a bit of manpower with full legal authority to access network records couldn’t solve. It helped that Harvard’s network logging all metadata access on the network — sorta like the NSA.

Over the past few years, U.S. law enforcement has taken control and shutdown a series of illegal child porn and drug marketplaces operating on what should have been untraceable, hyper-anonymous servers running in the Tor cloud.

In 2013, they took down Freedom Hosting, which was accused of being a massive child porn hosting operation — but not before taking control of its servers and intercepting all of its communication with customers. The FBI did the same thing that same year with the online drug superstore Silkroad, which also ran its services in the Tor cloud. Although, rookie mistakes helped FBI unmask the identity of Dred Pirate Roberts, it is still a mystery how they were able to totally take over and control, and even copy, a server run in the Tor cloud — something that is supposed to be impossible.

Back in 2007, a Swedish hacker/researcher named Dan Egerstad showed that just by running a Tor node, he could siphon and read all the unencrypted traffic that went through his chunk of the Tor network. He was able to access logins and passwords to accounts of NGOs, companies, and the embassies of India and Iran. Egerstad thought at first that embassy staff were just being careless with their info, but quickly realized that he had actually stumbled on a hack/surveillance operation in which Tor was being used to covertly access these accounts.

Although Egerstad was a big fan of Tor and still believes that Tor can provide anonymity if used correctly, the experience made him highly suspicious.

He told Sydney Morning Herald that he thinks many of the major Tor nodes are being run by intelligence agencies or other parties interested in listening in on Tor communication.

“I don’t like speculating about it, but I’m telling people that it is possible. And if you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they’re using lots of bandwidth, they’re heavy-duty servers and so on. Who would pay for this and be anonymous? For example, five of six of them are in Washington D.C.…”

Tor stinks?

Tor supporters point to a cache of NSA documents leaked by Snowden to prove that the agency fears and hates Tor. A 2013 Guardian story based on these docs — written by James Ball, Bruce Schneier and Glenn Greenwald — argues that agency is all but powerless against the anonymity tool.

…the documents suggest that the fundamental security of the Torservice remains intact. One top-secret presentation, titled ‘Tor Stinks’, states: “We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

Another top-secret presentation calls Tor “the king of high-secure, low-latency internet anonymity”.

But the NSA docs are far from conclusive and offer conflicting bits of evidence, allowing for multiple interpretations. But the fact is that the NSA and GCHQ clearly have the capability to compromise Tor, but it might take a bit of targeted effort.

One thing is clear: the NSA most certainly does not hate or fear Tor. And some aspects about Tor are definitely welcomed by the NSA, in part because it helps concentrate potential “targets” in one convenient location.

Tor Stinks… But it Could be Worse

• Critical mass of targets use Tor. Scaring them away might be counterproductive.

• We can increase our success rate and provide more client IPs for individual Tor users.

• We will never get 100% but we don’t need to provide true IPs for every target every time they use Tor.

Tor network is not as difficult to capture as it may seem…

In 2012, Tor co-founder Roger Dingledine revealed that the Tor Network is configured to prioritize speed and route traffic through through the fastest servers/nodes available. As a result, the vast bulk of Tor traffic runs through several dozen of the fastest and most dependable servers: “on today’s network, clients choose one of the fastest 5 exit relays around 25-30% of the time, and 80% of their choices come from a pool of 40-50 relays.”

Dingledine was criticized by Tor community for the obvious reason that funneling traffic through a handful of fast nodes made surveilling and subverting Tor much easier. Anyone can run a Tor node — a research student in Germany, a guy with FIOS connection in Victorville (which is what I did for a few months), an NSA front out of Hawaii or a guy working for China’s Internet Police.

There’s no way of knowing if the people running the fastest most stable nodes are doing it out of goodwill or because it’s the best way to listen in and subvert the Tor network. Particularly troubling was that Snowden’s leaks clearly showed the NSA and GCHQ run Tor nodes, and are interested in running more.

And running 50 Tor nodes doesn’t seem like it would be too difficult for any of the world’s intelligence agencies — whether American, German, British, Russian, Chinese or Iranian. Hell, if you’re an intelligence agency, there’s no reason not to run a Tor node.

Back in 2005, Dingledine admitted to Wired that this was a “tricky design question” but couldn’t provide a good answer to how they’d handle it. In 2012, he dismissed his critics altogether, explaining that he was perfectly willing to sacrifice security for speed — whatever it took to take get more people to use Tor:

This choice goes back to the original discussion that Mike Perry and I were wrestling with a few years ago… if we want to end up with a fast safe network, do we get there by having a slow safe network and hoping it’ll get faster, or by having a fast less-safe network and hoping it’ll get safer? We opted for the “if we don’t stay relevant to the world, Tor will never grow enough” route.

Speaking of spooks running Tor nodes…

If you thought the Tor story couldn’t get any weirder, it can and does. Probably the strangest part of this whole saga is the fact that Edward Snowden ran multiple high-bandwidth Tor nodes while working as an NSA contractor in Hawaii.

This only became publicly known last May, when Tor developer Runa Sandvik (who also drew her salary from Pentagon/State Department sources at Tor) told Wired’s Kevin Poulsen that just two weeks before he would try to get in touch with Glenn Greenwald, Snowden emailed her, explaining that he ran a major Tor node and wanted to get some Tor stickers.

Stickers? Yes, stickers.

Here’s Wired:

In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”–a 2 gbps server named “TheSignal”–and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn’t say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).

Snowden’s request for Tor stickers turned into something a bit more intimate. Turned out that Sandvik was already planning to go to Hawaii for vacation, so she suggested they meet up to talk about communication security and encryption.

She wrote Snowden back and offered to give a presentation about Tor to a local audience. Snowden was enthusiastic and offered to set up a crypto party for the occasion.

So the two of them threw a “crypto party” at a local coffee shop in Honolulu, teaching twenty or so locals how to use Tor and encrypt their hard drives. “He introduced himself as Ed. We talked for a bit before everything started. And I remember asking where he worked or what he did, and he didn’t really want to tell,” Sandvik told Wired.

But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.

How All Of Us Are Helping Build A Participatory Totalitarianism

In Uncategorized on June 10, 2014 at 5:51 pm
social-media-state-corporate-surveillance-privacy

In the new public-private surveillance state, we’re so at home with Big Brother that we’re not just passively watched–we actively display ourselves

We are not passive objects of the surveillance state. We are active subjects of our own YouTube channels

 

Oldspeak: “We see, then, that modern technology has led to the concentration of economic and political power, and to the development of a society controlled (ruthlessly in the totalitarian states, politely and inconspicuously in the democracies) by Big Business and Big Govern­ment. But societies are composed of individuals and are good only insofar as they help individuals to real­ize their potentialities and to lead a happy and creative life. How have individuals been affected by the tech­nological advances of recent years? Here is the answer to this question given by a philosopher-psychiatrist, Dr. Erich Fromm:

 

        Our contemporary Western society, in spite of its material, intellectual and political progress, is in­creasingly less conducive to mental health, and tends to undermine the inner security, happiness, reason and the capacity for love in the individual; it tends to turn him into an automaton who pays for his human failure with increasing mental sickness, and with despair hidden under a frantic drive for work and so-called pleasure.

        Our “increasing mental sickness” may find expres­sion in neurotic symptoms. These symptoms are con­spicuous and extremely distressing. But “let us beware,” says Dr. Fromm, “of defining mental hygiene as the prevention of symptoms. Symptoms as such are not our enemy, but our friend; where there are symp­toms there is conflict, and conflict always indicates that the forces of life which strive for integration and happiness are still fighting.” The really hopeless victims of mental illness are to be found among those who appear to be most normal. “Many of them are normal because they are so well adjusted to our mode of existence, because their human voice has been si­lenced so early in their lives, that they do not even struggle or suffer or develop symptoms as the neurotic does.” They are normal not in what may be called the absolute sense of the word; they are normal only in relation to a profoundly abnormal society. Their per­fect adjustment to that abnormal society is a measure of their mental sickness. These millions of abnormally normal people, living without fuss in a society to which, if they were fully human beings, they ought not to be adjusted, still cherish “the illusion of indi­viduality,” but in fact they have been to a great extent deindividualized. Their conformity is developing into something like uniformity. But “uniformity and free­dom are incompatible. Uniformity and mental health are incompatible too. . . . Man is not made to be an automaton, and if he becomes one, the basis for mental health is destroyed.” –Adolous Huxley

“Share Everything”. “Broadcast Yourself” “Stay Connected”….  Relentlessly, we’re peppered with the propaganda and it is extremely seductive and powerful. Encouraged to incessantly create and consume “content” fashioned from our lives and the lives of others. Preying on the paradoxically profound narcissism/insecurity our maladjustment civilization breeds and selling it via the new virtues of ‘convenience’ and ‘personalization’, our privacy, liberty and ownership of our selves is freely given away to our controllers. Which they then use to surveil, sell, and profit handsomely from. The Stasi had it all wrong. Making the tools of totalitarianism ones that the populace loves, uses of its own free will and can’t live with out, makes things INFINITELY easier. How comfortable are you in your “Velvet Prison”? “Ignorance is Strength.” “Freedom is Slavery.” “War is Peace.”-OSJ

 

By John Feffer @ Foreign Policy In Focus:

According to the Chinese zodiac, the heavens circle around every 12 years. The Year of the Snake, the creature that sheds its skin to emerge anew, marks a time of great transformation. Indeed, for the last quarter century, the world has experienced three profound shifts at 12-year intervals, beginning with the Year of the Snake in 1989.

On June 4, 1989, on one side of the globe, Poles were participating in their first semi-free elections in more than 40 years, which—though few suspected at the time—sounded the death knell for Communism in East-Central Europe. Meanwhile, on the same day on the other side of the globe, the Chinese government was cracking down on the Tiananmen Square protests and ensuring that Communism would continue there as an official ideology for at least another 25 years.

Twelve years later, the Year of the Snake returned, and the ground shifted radically beneath our feet once again. This time, the 9/11 attacks brought the two sides of the world together as both China and Poland threw their weight behind the U.S.-led war on terror. Poland, presided over by a former Communist who’d embraced market reforms, even went so far as to host one of the “black sites” that the Bush administration set up to interrogate suspects gathered up through extraordinary rendition. China, presided over by a current Communist who’d also embraced market reforms, used the opportunity of 9/11 to ramp up operations against separatists in Xinjiang and secure “unprecedented” counter-terrorism information sharing with the United States.

And then last year, the Year of the Snake came around again, and this time it was Edward Snowden who caused a seismic shift in our understanding of everyday reality. We thought that we’d seen through the efforts of the Communist state to control our minds and the efforts of the corporate state to control our desires. But it turned out that we really didn’t know the full extent to which intelligence services and corporate entities had invaded our private spaces. Nor had we understood our own complicity in this brave new world. It wasn’t just states like Warsaw and Beijing that had joined forces with Washington against non-state actors. We had all become informers under this new regime, whether we liked it or not.

The old metaphor for surveillance was the Panopticon: the warden, sitting at the hub of a penitentiary, could see what all the inmates were doing along the perimeter of the structure. Then came the Big Brother of the Cold War era: a state apparatus that used informers, propaganda, and interrogations to infiltrate every crevice of society.

Today’s metaphor is still Big Brother—but it’s the TV show, not the sinister presence of the George Orwell novel. In this reality TV show, the public watches what goes on inside a house fully monitored by surveillance cameras. But here’s the twist: we are both voyeurs and exhibitionists, for we have also turned the cameras on ourselves so that the surveillance can be mutual. We don’t just like to watch, like Chance the gardener in Jerzy Kosinski’s Being There. We like to be watched as well.

It’s time to update Socrates for the era of selfies and YouTube: the unwatched life is not worth living.

The novel that out-Orwells Orwell in its depiction of this new reality is The Circle by Dave Eggers, in which characters willingly wear cameras that track their every movement and broadcast to an ever-increasing number of social media followers. The novel exaggerates only slightly what we are already doing through Facebook and Twitter and Instagram, or what is being done to us through our cell phones and our credit card purchases and our Google searches.

To rein in Big Corporations and even out the inequities of Big Politics, activists have long clamored for participatory democracy. What we didn’t expect was that Big Corporations and Big Politics would team up in what I’ve previously called the “surveillance blitz” to create a new phenomenon: participatory totalitarianism.

If we look at the three seismic shifts that have taken place between 1989 and today, they all center around the state and its ability to maintain its authority in the post-modern world. In 1989, the Communist states failed in their effort to manage the economy through five-year plans and artificially fixed prices. In both post-Communist Poland and post-Deng China, the market became the arbiter of production and consumption, restricting the state largely to redistribution (with a bit more capacity for strategic investments in China). Privatization and austerity budgeting in the capitalist world also whittled away what remained of the welfare state’s ability to intervene in the economy. This was the neo-liberal victory in what had been an epic 20th-century war, though many skirmishes continue to this day and a second grand battle may yet take place in the wake of the global financial crisis.

In 2001, states faced a second major challenge from al-Qaeda, though more as an idea than an actual military force. Al-Qaeda is an unusual hybrid of the globalized and the localized. It grew out of a specific context (the mujahedeen’s attacks on the Soviet army in Afghanistan) and has taken on a different character in each national context where it has taken root (Yemen, Syria, North Africa). Al-Qaeda is a franchise not unlike McDonald’s, offering a universal product (a global caliphate) that can be adapted to the cultural preferences of local consumers just as McDonald’s sells its well-known French fries with the McAloo Tikki burger in Mumbai or the McArabia Chicken sandwich in Doha. To use the awkward phrase from academia, al-Qaeda is a “glocalized” phenomenon. It thus has represented both a global and a local challenge to the state—offering a vision of subsuming the state into something larger and, from below, attacking the state’s monopoly on violence. It’s no wonder that states as different as Poland and China found common cause in fighting against al-Qaeda.

And now, after 2013, the state is suffering yet another challenge to its authority. After the revelations of Snowden, the sociologist Zygmunt Bauman and his colleagues point out, “It may not be going too far to suggest that what we still call national security has been colonized by a new nobility of intelligence agencies operating in an increasingly autonomous transnational arena.” National security, as the phrase suggests, has been the responsibility of the nation-state. But intelligence agencies, led by the disproportionately powerful NSA, have skirted the traditional mechanisms of the state to operate across borders and with little oversight. Members of Congress, even though many have branded Snowden a traitor, havepushed for changes in the way the NSA does business domestically. The leaders of Germany and Brazil who discovered to their dismay that they too have been punked by the NSA—U.S. spies listened in on the communications of both Angela Merkel and Dilma Rousseff—are also pushing at an international level for reform.

The state’s status has deteriorated over the decades. It no longer provides the “iron rice bowl.” Its monopoly on violence has been challenged by non-state actors, and many states have failed or are near failure as a result. And intelligence-gathering organs have metastasized beyond the control of the traditional nation-state in order to sift through the rapidly expanding universe of global data to stop plots while they are still twinkles in the eyes of the conspirators (shades of Minority Report).

If surveillance was monaural during the Cold War and became stereophonic in the immediate aftermath of 9/11, it is now quadrophonic. It can’t be reduced to the activity of a single state or even a particular government-industrial complex. We are all now embedded in a veritable matrix of surveillance. It has become surround sound.

In the Communist era, Hungarian writer Miklos Haraszti wrote about what he called the “velvet prison.” Under state socialism, he observed, the vast majority of artists accommodated to the strictures imposed from above. “We learn to live with discipline,” hewrote. “We are at home with it. It is a part of us, and soon we will hunger for it because we are unable to create without it.”

We are at home in the new surveillance state, for we barely register all the cameras, all the targeted advertising, all the intrusions into what had previously been considered sacred private space. We are not passive objects of observation. We are active subjects of our own YouTube channels.

This is not inevitable. States like Germany and Brazil are fighting back. Organizations like the Electronic Frontier Foundation are fighting back. Whistleblowers and journalists are fighting back. So, perhaps when the next Year of the Snake rolls around and we are preparing to shed our skin once again, we will see a shift in the other direction—toward a new economy, a new kind of politics, a new definition of security, and a new way to interact with our fellow citizens that relies on mutual solidarity and not mutual surveillance.

Genuine Leisure Is No More: Modern Day Leisure Is Too Much Like Work

In Uncategorized on March 29, 2014 at 7:34 pm

Leisure in the ancient world did not mean time off, but was an activity in it’s own right. Illustration: Happiness by Harriet Russell http://www.harrietrussell.co.uk

Oldspeak: “Leisure for us, in other words, is a mere interlude in the productive process, a moment to unwind or recharge before the next bout of work. Indeed, a good deal of modern leisure is indistinguishable from work. We play squash in order to stay fit, party in order to network, invest quality time in our children in order to keep them sweet. No wonder a life of leisure fills us with dread! …. How can we recover genuine leisure? A first step would be to recall the original meaning of the term. Leisure in the ancient world – schole in Greek, otium in Latin – was not just time off work, but a distinct form of activity in its own right. It was what was done freely, for its own sake, rather than for the sake of something else. Leisure was a privilege of landed gentlemen. Slaves proverbially lacked it, as to a lesser degree did paid labourers, whose waking hours were devoted to servicing the needs of others.

Athenians called work of this sort ‘banausic’ or ‘mechanical’, words suggestive of servility and stultification. “We call those arts mechanical which tend to deform the body,” wrote Aristotle, “and likewise all paid employments, for they absorb and degrade the mind.” -Edward Skidelsky

“We’ve been so perfectly acclimated to the sick society we’ve created, we actually believe we’re NOT DOiNG ENOUGH. More, more, more, we’re driven to do more, more extremely, faster, harder, louder, bigger, swaggier. There is no connection of the infinite growth model & ever more consumption to the exhaustion of all vital resources and by extension life on earth a.k.a mass extinction. How much is enough ‘stuff’? Ask yourself, why are we being told that idleness is to be avoided at all costs; that if you’re not “productive” you’re not therefore valuable.  We must let go of our emotion-backed obsessions to be productive ALL THE TiME.  We must realize that we are not our “productivity”, or the “value” of it. We must stop trying to profit from our leisure. We must just let it be. We must reduce our slave-like connections to our devices; the new overseers, scheduling every second of our lives with some multitasked, partially comprehended, quickly forgotten activities that absorb and degrade our minds. it would do us well to reclaim our humanity, spontaneity, untethered to the matrix selves.  Don’t freely surrender your YOU time to forces dedicated to draining and profiting from your life energy. Don’t let you’re leisure time be privatized by the vulture capitalist forces that pay you to use your life energy for their gain.  Breath deeply. Meditate.  Do Yoga. Disconnect. Focus on powering down and really building and maintaining your vital life energy. Balance your consumptive activities with non consumptive ones. You will heal yourself.  it’s sooooo much better than pills, energy drinks & self-help books. Reject your subservience to the Cult of Productivity.  Resist the savage inhuman slavery that’s being passed off as “success”.  You’ll live a calmer, longer, less stressed, more balanced life.” -OSJ

By Edward Skidelsky @ The Ecologist:

To be without leisure and do everything for the sake of something else, is to be only half alive, writes Edward Skidelsky.

Conventional wisdom holds that we must work more. The unemployed should be employed. People in part-time jobs should be in full-time jobs. And even those in full-time employment should work harder in order to keep pace with the industrious Indians and Chinese.

I think this is topsy-turvy. The great mystery of our time is not that we don’t work harder: it’s that we continue to work as hard as we do. When I say ‘we’, I refer, of course, to the working population. There are many people in our society – the unemployed and partially employed – who would dearly like to work more. But there are equally many people who would dearly like to work less. This is a deeply irrational state of affairs.

The obvious solution is for all adults to work, but to work shorter hours. It is only our devotion to the principle of the 40-hour week that condemns a large (and growing) sector of the population to the grim fate of unemployment.

Wealthy, but not joyful
We belong, let us recall, to one of the wealthiest societies that has ever existed in human history. Yet we have failed to realise the chief benefit of wealth: leisure. This should surprise us more than it does. In the past it was generally assumed that as people became richer they would work less.

The great economist John Maynard Keynes shared this assumption. In his essay of 1929, entitled Economic Possibilities for our Grandchildren, he predicted that standards of living in the affluent world would rise between four and eight times over the following 100 years, leading to a decline of working time to 15 hours a week, or just 3 hours a day. Liberated from the burden of toil, ordinary people would be able to share in the spontaneous, joyful kind of existence once the privilege of the lucky few.

I see us free”, Keynes wrote, “to return to some of the most sure and certain principles of religion and traditional virtue – that avarice is a vice, that the exaction of usury is a misdemeanour and the love of money is detestable, that those walk most truly in the paths of virtue and sane wisdom who take least thought for the morrow. We shall once more value ends above means and prefer the good to the useful. We shall honour those who can teach us how to pluck the hour and the day virtuously and well, the delightful people who are capable of taking direct enjoyment in things, the lilies of the field who toil not, neither do they spin.

Still working 40 hours a week. Why?
Well, it hasn’t happened like that. Keynes got one thing right though: standards of living in the affluent world have indeed risen about fourfold. But hours of work have not fallen anything like as much. Today in Britain we work on average about 40 hours a week (down from 50 hours in 1930), but nowhere near the 15 hours Keynes foresaw. Why?

My father Robert and I wrote a book last year called How Much is Enough? in which we tried to solve this “Keynes problem”. We considered various explanations: the inequalities of power in the labour market, the increasingly uneven distribution of wealth and incomes, and the power of advertising to kindle dormant passions of envy and vanity.

But according to some of our reviewers, we overlooked the obvious explanation for the failure of Keynes’ prophesy. Human beings, they said, want to work long hours, because they are frightened or nauseated by the prospect of endless leisure.

Here is Alasdair Palmer, writing in The Telegraph: “The Skidelskys have nothing substantial to say about boredom – and it is why their analysis is doomed from the start. The reason why most people keep striving long after they have satisfied all elementary needs is not, as the Skidelskys claim, that they mistakenly think that money is the ultimate value. It is simply that striving for it keeps boredom at bay… Boredom is the serpent in the Skidelskys’ garden of idle delights – and you can be sure that, were we ever to achieve it, that serpent would soon eject us from it.

Modern day leisure is too much like work
Now I don’t deny that many of us would be bored by a life of leisure, and carry on working primarily in order to avoid that prospect. But that is only because we do not know what leisure really is, or might become. We talk, revealingly, of ‘taking a break’ over the weekend or over summer.

Leisure for us, in other words, is a mere interlude in the productive process, a moment to unwind or recharge before the next bout of work. Indeed, a good deal of modern leisure is indistinguishable from work. We play squash in order to stay fit, party in order to network, invest quality time in our children in order to keep them sweet. No wonder a life of leisure fills us with dread!

How can we recover genuine leisure? A first step would be to recall the original meaning of the term. Leisure in the ancient world – schole in Greek, otium in Latin – was not just time off work, but a distinct form of activity in its own right. It was what was done freely, for its own sake, rather than for the sake of something else. Leisure was a privilege of landed gentlemen. Slaves proverbially lacked it, as to a lesser degree did paid labourers, whose waking hours were devoted to servicing the needs of others.

Athenians called work of this sort ‘banausic’ or ‘mechanical’, words suggestive of servility and stultification. “We call those arts mechanical which tend to deform the body,” wrote Aristotle, “and likewise all paid employments, for they absorb and degrade the mind.”

True leisure vs recreation
The Greeks were well aware that slaves and workmen had to rest, perhaps even ‘unwind’ occasionally, but for them that was something altogether distinct from leisure. ‘Recreation’, as we might now call it, was simply the flipside of work, a necessary respite from its pain and constraint. Leisure in the true sense had nothing restorative about it. It took place beyond the work/recreation cycle; it was human activity unleashed from any external purpose.

Leisure could thus be strenuous in the highest degree – far more strenuous than work – without losing its leisure character. The modern identification of leisure with recreation, as embodied in the ‘leisure centre’, simply shows how far the concept has strayed from its original and deeper meaning.

Leisure in the ancient world took many forms. For most Athenians, it was synonymous with athletics and oratory, the conventional occupations of the propertied elite. But for a dissident minority, leisure meant philosophia, love of wisdom – an activity quite unlike the academic discipline that now bears its name. Philosophia was free, open-ended speculation, unconstrained by dogma or money.

Plato contrasted it with litigation, in which the goal is to win one’s case, and win it quickly. (“Law is philosophy on a stopwatch,” said a friend of mine who had recently switched from one occupation to the other.) For Aristotle, philosophy was a celestial activity, the closest we come to the contemplative bliss of the gods.

Not just a Western ideal
Leisure is not just a Western ideal: it crops up wherever a minority is freed from the necessity of earning a living. The Chinese cultivated the arts of leisure with a whimsy absent from the more strenuous Greco-Roman version. Here is Shen Fu, a failed scholar of the early 19th century, reminiscing about happier times: “We would spend the whole day doing nothing but criticising poetry and talking about painting. My friends were like swallows on the rafters, coming and going as they pleased. Yün even sold her hairpins to buy wine without a second thought, because we did not want to give up lightly such a beautiful time and place. But now we are all parted like clouds blown by the wind. The jade is broken, the incense buried! I cannot bear to look back.”

These visions of leisure, Western and Eastern, are in many ways repugnant to us. Aristotle’s gentleman philosophers would have lived on the labour of slaves – “human tools”, as he charmingly calls them – while Shen Fu, a local government secretary, received an income that was almost certainly made up largely of bribes. How can an ideal of life erected upon such murky foundations hold any appeal for us today?

Freedom from drudgery
I share these worries. Yet when all is said and done, what else matters, ultimately, apart from leisure? To be without leisure, to do everything for the sake of something else, is to be only half alive. Imagine a man who works long hours at a boring job to pay the school fees; eats brown rice not because he likes it but because it is good for him; reads books in order to increase his stock of knowledge and culture; and keeps fit for the sake of his ‘erotic capital’.

Such a man is perpetually looking forward to a consummation he can never, in the nature of the case, enjoy. As Keynes put it, “he does not love his cat, but his cat’s kittens; nor, in truth, the kittens, but only the kittens’ kittens, and so on forward forever to the end of cat-dom.” He will die before he has ever really lived.

Nor should we be overly troubled by accusations of elitism. True, some can enjoy leisure only if others dig the coal and wash the dishes, but in a technological age there is no need for those others to be human beings. Mechanical work can, and should, be done by machines. “Human slavery is wrong, insecure, and demoralising,” wrote Oscar Wilde in his visionary essay The Soul of Man under Socialism. “On mechanical slavery, on the slavery of the machine, the future of the world depends.” We now have machinery sufficient to free the affluent world from drudgery. It is only our failure of political organisation and ethical imagination that holds us back.


Edward Skidelsky is a lecturer in philosophy at Exeter University, and author, together with his father, Robert, of How Much is Enough: Money and the Good Life (Allen Lane).

 

 

 

 

 

 

“Take Back The Streets”: Civil Rights Report Finds Police Worldwide Criminalize Dissent, Assert New Powers in Crackdown on Protests

In Uncategorized on October 17, 2013 at 1:17 pm

https://i0.wp.com/i2.cdn.turner.com/cnn/dam/assets/111115095413-occupy-evict-story-top.jpg

Oldspeak: “In a major new report, the International Network of Civil Liberties Organizations details a global crackdown on peaceful protests through excessive police force and the criminalization of dissent. The report, “Take Back the Streets: Repression and Criminalization of Protest Around the World,” warns of a growing tendency to perceive individuals exercising a fundamental democratic right — the right to protest — as a threat requiring a forceful government response. The case studies detailed in this report show how governments have reacted to peaceful protests in the United States, Israel, Canada, Argentina, Egypt, Hungary, Kenya, South Africa and Britain. The report’s name comes from a police report filed in June 2010 when hundreds of thousands of Canadians took to the streets of Toronto to nonviolently protest the G-20 summit. A senior Toronto police commander responded to the protests by issuing an order to “take back the streets.” Within a span of 36 hours, more than 1,000 people — peaceful protesters, journalists, human rights monitors and downtown residents — were arrested and placed in detention…” – Amy Goodman & Juan Gonzalez

“Ever notice how when you see news of protest, in any particular protest/rebellion/revolution around the world, the police look the same? Dark colored. Armored. Heavily armed. Deploying chemical weapons. And brutal, usually without provacation from peaceful demonstrators.  The response of the State to peace and lawful dissent is violence, brutality, repression and mass arrests. The global control grid is continually growing, taking shape. We can take solace in the fact that our planet cannot continue to support the energy demands needed to maintain it. it is inevitable that the continued unsustainable  growth and complexity of this apparatus will at some point cause it to collapse on itself. in addition to extinguishing life on earth as we know it.” –OSJ

By Amy Goodman & Juan Gonzalez @ Democracy Now:

JUAN GONZÁLEZ: We turn now to a major new report detailing the global crackdown on peaceful protests, both through excessive police force and the criminalization of dissent. The report is called “Take Back the Streets: Repression and Criminalization of Protest Around the World.” It was put out by the International Network of Civil Liberties Organizations. The name of the report, “Take Back the Streets,” comes from a police report filed in June 2010, when hundreds of thousands of Canadians took to the streets of Toronto to nonviolently protest the G-20 summit. A senior Toronto police commander responded to the protests by issuing an order to, quote, “take back the streets.” Within a span of 36 hours, over a thousand people—peaceful protesters, journalists, human rights monitors and downtown residents—were arrested and placed in detention.

AMY GOODMAN: According to the report, what happened in Canada is emblematic of government conduct in the face of protest around the world: the tendency to perceive individuals exercising a fundamental democratic right—the right to protest—as a threat requiring a forceful government response. The case studies detailed in this report show how governments have reacted to peaceful protests in the United States, in Israel, Canada, Argentina, Egypt, Hungary, Kenya, South Africa and Britain.

For more, we’re joined by co-editor of the report, Abby Deshman, a lawyer and program director with the Canadian Civil Liberties Association. We’re also joined by Anthony Romero. He is executive director of the American Civil Liberties Union, author of the book In Defense of Our America: The Fight for Civil Liberties in the Age of Terror. And still with us, Hossam Bahgat—he is the founder and executive director of the Egyptian Initiative for Personal Rights.

We welcome you all to Democracy Now! Abby, talk about the report.

ABBY DESHMAN: Sure. This is a collaboration between multiple domestic human rights and civil liberties organizations, that we’ve really come together to group our domestic work, group our national work and identify trends in how we feel the governments are responding to democratic dissent and protest in the streets. And, you know, gathering together this number of practitioners to really provide practitioners’ notes shows that there are very disturbing trends. People are taking to the streets across the world, and governments are responding with excessive use of force, criminalization and repression.

JUAN GONZÁLEZ: Well, when you say “disturbing trends,” governments have never looked kindly on dissent within their borders or by their own citizens. What do you see as new about what is occurring now? Because I remember years back when we at Democracy Now! covered the Seattle World Trade Organization protests live, there clearly were some new tactics by both the nonviolent protesters as well as the government response.

ABBY DESHMAN: Well, partly what’s new—I mean, at least for me; I’m young in this game—but partly what’s new is massive uprising in the streets. I think we are seeing, in the past three, five years, record numbers of people, in recent memory, taking to the streets. And we are seeing new police tactics—the numbers of arrests, the massive, hundreds of people rounded up at a time. There are new policing weapons: long-range acoustic devices, sonic cannon, excessive amounts of tear gas being used in Egypt. These are trends that are currently surfacing in multiple countries.

AMY GOODMAN: Anthony Romero, talk about the United States.

ANTHONY ROMERO: Well, it’s important to put the United States in the global context. And normally when we think about protest and freedom of speech, we think that’s been a right that’s been well established and well respected. And yet, you point out the difficulties we’ve seen with the WTO protesters, the protesters with the Occupy movement and, in particular, this case study that we highlight in Puerto Rico, a place where most Americans don’t think of Puerto Rico as part of the United States, but it is. The Constitution applies. Over four—close to four million American citizens live there. And yet, you have the second-largest police department in the nation, only second to New York City Police Department, and the massive levels of repression and shutdown of—of arrests, of tear-gassing, of beating of students, of labor leaders, the level of impunity that lasted for years, until the ACLU filed a report, lobbied our Justice Department, filed a lawsuit, and then the Justice Department stepped in, only recently, to try to put the Puerto Rico Police Department under better control of rule of law.

JUAN GONZÁLEZ: And this whole tactic of picking people up en masse and then holding them, supposedly while protests continue, basically pulling them out without any real charges just to get them off the streets?

ANTHONY ROMERO: We saw that New York, right? I mean, that’s how they—that’s how they dealt with many of the protests here in New York, especially after the conventions—during the conventions, where they corralled record numbers of people, arrested them in record time, in ways that were just astonishing, held them often incommunicado for 24, 36, 48 hours—a form of preventive detention, if you will.

And I think one of the things we have to bear in mind is like, look, our government is shut down. Our government is not working. People are frustrated. People may take to the streets as an important part of demonstrating their unrest, their unhappiness with our government. And so, how we protect the rights of individuals to protest and to dissent is critically important, especially in our democracy, that’s so fundamentally broken down and at loggerheads at the moment. The people—it’s the government of the people, by the people and for the people. And when the government doesn’t respond to the people, the people have to take the government back.

JUAN GONZÁLEZ: But to follow up on this, because what the police departments do is they don’t mind having to deal with lawsuits later on. You know, years later they end up paying these settlements to protesters who had their civil liberties violated, but at that moment they’re able to effectively shut down the dissent. So, I’m wondering how can you, as a civil liberties lawyer, find—what ways can the courts be utilized to prevent these kinds of occurrences from repeating themselves over and over again?

ANTHONY ROMERO: I think part of it, you have to—even in cases where they infringe on civil liberties and freedom of speech and expression, you have to sue, to use that as a deterrent for further police departments, to shame them, to cost taxpayers money. We have to work with police departments, those that are open to it, to hear what their concerns are for public safety. They have real concerns around public safety; they can be addressed.

We also have to make sure that we don’t allow the excessive use of less lethal force. I mean, one of the things we’ve seen in the reports on Puerto Rico, as much in Egypt and Canada and Argentina, has been the increased use of police of certain weapons, of certain tactics, which they say is less lethal, but they end up in deaths. We have deaths in the arrests in Puerto Rico. We have deaths in Argentina. We certainly have deaths in places like Egypt. And so we have to make sure that we hold the police accountable for those—for those actions.

AMY GOODMAN: And then the issue of surveillance, like our last headline today—

ANTHONY ROMERO: Yeah.

AMY GOODMAN: —this undercover officer in the infamous West Side Highway videotape of the motorcycle gang and the guy with the SUV, that one of these officers, it turns out, was—one of these motorcycle riders was an officer, undercover, and he was undercover in Occupy Wall Street, as well—

ANTHONY ROMERO: Yeah.

AMY GOODMAN: —picked up at Grand Central.

ANTHONY ROMERO: When you look at the fact that it’s not just what they do at the protest itself, but prior to the protests the surveillance, prior to the protests the infiltration. We have police departments who brazenly brag about sending in undercover cops to pretend they’re part of the protest movements as a way to derail them or to shape them in the ways they want. All of this, in the context after 9/11, where any activity that disagrees with the government is—often vehemently, is seen as potential terrorist activity or a potential terrorist plot, the powers of the government to use of surveillance, infiltration, the police tactics, they all have to be seen as one part of an effort to shut down and to dispel dissent. We see it. We see the fact that there’s a quell on public dissent. Muslims are less likely to express themselves now. We hear that from our clients. We hear that from our—some of the litigation we bring. And so, it’s a very pernicious part that’s very, very real and often not uncovered until we put out reports like this.

JUAN GONZÁLEZ: And, Abby, the Canadian example of the G-20 summit, what most surprised you in terms of as you were unearthing what happened there and the civil liberties violations?

ABBY DESHMAN: Well, actually, how high the police orders went. You know, we thought that this was a coordinated response. We saw that there was consistency, a really defined point in time when the policing turned during the G-20. We then had confirmation that there were orders all the way from the top, that these were not random acts by individual commanders panicking under situations, that these really were decisions that were taken by very senior police leaders to violate not only the rights of citizens, but their own policies and procedures about how to deal with protests, and really that they were taking notes from an international scene where this had happened before. We had not seen this technique in Canada. It was clear that it had happened at previous G-20 summits, and they were importing these policies.

AMY GOODMAN: Hossam Bahgat, we were just talking about the level of repression in Egypt, but fit this into this global context.

HOSSAM BAHGAT: Yes. While Egypt might be an extreme case, of course, because we have sort of crossed the threshold from just the violent repression of protests to mass and deliberate killings, really the trend in Egypt fits with the trend identified by the report in all of these case studies. We see, as Abby and Anthony mentioned, that the mass protests are not, of course, a new phenomenon, but they are taking new shapes. And whether it’s the Arab uprisings, the protests in Turkey and Brazil, the anti-austerity mass protests in Europe, the Occupy movement here, they are going to continue.

And we see the right to protest publicly and the right to dissent as an essential part of democracy. There is an attempt on the other side, by governments, to reduce the democratic rights of individuals to just voting, to being called in once every few years to cast a vote and then be sent home and leave the governance to the people that have been elected. The people refuse. The people see that, in many countries, the democratic institutions—and we’re talking in the United States here, but the democratic institutions around the world are not working and are not necessarily reflecting the wills of the people. And the people are going to continue to take their demands, yes, through channels like the media and civil society and labor unions and others, but they are going to go on the street, and they are going to protest publicly. And states need to know that they have a responsibility not just to protect this right, but to even enable people to express these rights, because the only other alternative—the killings that we’re seeing in Egypt or the killings that even started in Syria as just violence in the face of peaceful protests and turned into civil wars—these are recipes for only pushing the situation into very, very dangerous directions. And the violent response only leads to even violent protests.

JUAN GONZÁLEZ: Yeah, and, Abby, I wanted to ask you—much was made, obviously, in Egypt and during the Arab Spring of the impact of social media and the use of the Internet by dissidents to mobilize, to communicate. In your report, did you dwell into the responses of government officials in terms of how they responded to the change in tactics of the popular movements?

ABBY DESHMAN: Yeah, absolutely. Police do say that they need new tactics because people can mobilize more quickly. Things are going out on Twitter, and then a large crowd forms. Things are very mobile on the ground. But the truth is, in my experience, during the G-20, we knew exactly what was going to happen, because it was on the Internet, it was on social media. The protesters themselves had classified their protests in terms of levels of risk. So I actually am very skeptical of those claims that they need new powers in order to try to police these new forms of protest. We knew exactly what was going to happen during the G-20 protests. They followed that pattern. The police simply weren’t prepared and then violated rights as their reaction.

AMY GOODMAN: And how should the state deal with violence?

ABBY DESHMAN: Well, the state does need to respond to violence. But I would say the state overresponds to violence, particularly in protests. So, there may be one or two or even 10 or 30 people in a crowd of thousands, tens of thousands, that commit property damage, that commit violent acts. The state often takes that as an authority to abrogate the rights of every single person in that crowd. They need to respond to violence. They need to protect the rights of all the other people in that crowd who are peacefully protesting and exercising their democratic rights. Their role is to facilitate protest, not to find excuses to shut it down.

AMY GOODMAN: What about the U.S. cutting military aid to Egypt, Hossam? How does that play into what the military government does with the protesters? Does it change?

HOSSAM BAHGAT: I mean, in Egypt, especially after the massacres, of course, our position was that there should be investigations, there should be an independent fact finding, and there should be accountability. And until that takes place and until the government also accepts responsibility for these killings, there should be a suspension of the provision of any arms or tools of repression from any country in the world. We’re not just talking about the U.S. military assistance. And any resumption of the sale of weapons or the provision of weapons or tools of repression to the Egyptian government must be conditioned on accepting the retraining and provision of, you know, new tools for riot control, but that business should not continue just as usual when it comes to Egypt.

Especially when—exactly like Abby said, the problem is now, in all of these demonstrations that we are seeing, in the report, all around the world, there is—there is always a few protesters that are going to use violence. The trend we’re seeing now is that governments use this to dub the entire protest—20,000, 30,000—as non-peaceful or as violent. And that leads to two things: One, the peaceful participants that are not using violence are, again, lumped together with the others and are deprived of their rights as peaceful protesters; and even those that do engage in stone throwing or other violence are robbed of all their other rights, including their right to life, of course. And the states are just using this as an excuse, sometimes through infiltration by provocateurs into these protests, in order to just remove entire protests outside the realm of protection of law.

JUAN GONZÁLEZ: I’d like to get back to Anthony Romero in terms of this whole idea of the Obama administration finally doing something in Egypt to cut off some of the military aid to the—to the coup leaders. How has the Obama administration dealt with the increasing repression by local police on public protesters? Has there been any—any actions by the Justice Department to try to rein this in, or have they basically been supportive?

ANTHONY ROMERO: They’ve basically been supportive. I mean, to be clear, the ACLU doesn’t take positions on foreign policy or the U.S. aid to Egypt, but we do look very closely about how our government, federal government, works with state and local governments. And the level of collusion between the federal agents, the FBI, and local police departments has become very troubling, the way they track and the way they monitor and do surveillance on Muslims. So, one of the key cases we have now is in New York City with the New York City Police Department, but it involves the FBI and the federal government. You see it in the immigration context, if you pull the camera back a little further back, where you find the FBI and the DOJ and Department of Homeland Security working with local sheriffs and police.

AMY GOODMAN: You have a case against Arpaio in Arizona.

ANTHONY ROMERO: Oh, it’s exactly that.

AMY GOODMAN: The sheriff, Joe Arpaio.

ANTHONY ROMERO: The sheriff, Arpaio, who resists a federal order from a federal judge to have a monitor and to have any type of accountability. But Arpaio was created by the policies of Janet Napolitano. I mean, Arpaio is not just a one—

AMY GOODMAN: When she was governor or head of the Department of Homeland Security?

ANTHONY ROMERO: Well, I would say more in the Department of Homeland Security, because it’s exactly that type of collusion that she encouraged—the 287(g) programs, the Secure Communities programs, that insisted that federal government officials work with local law enforcement officials. Now, Sheriff Arpaio has gone off the farm, but the fact is that there are too many local police departments that are working with the federal government on things like surveillance, on immigration, on dissent, on protest. And so, I think actually part of the responsibility does come from the federal government.

STORMBREW, Shifting Shadow, Flying Pig, QUANTUM: NSA/GCHQ Programs “degrade/deny/disrupt Tor Network access”, Major Email Providers, Petrobas, SWiFT, Huawei Corp, Riyad Bank; Targeted For Surveillance

In Uncategorized on October 8, 2013 at 3:05 pm

https://i0.wp.com/htmlimg3.scribdassets.com/14kqsxcu2o2ts0gn/images/1-31eec3cee3.jpgOldspeak: “The above slide perfectly illustrates the true face of the corporatocracy. Government agencies, working in lockstep with “”key corporate partners” to achieve “total information awareness” and act as “thought police”.  Storing, analysing and evaluating all digital communications and information. The Cyberwarriors over at NSA/GCHQ are busy canibalizing.   Feeding on the information of presidents, banking corporations, energy corporations, information corporations, and you. While talking heads blabber about manufactured crises, Big Brother is Watching. Searching for new sources of toxic energy to burn to sustain itself…  Sacrificing, barrel by barrel, the world it’s slowly destroying . Developing detailed dossiers on all persons connected to anything digital. To watch everything, always, until our all but certain demise…” –OSJ

There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized. -George Orwell

Related Stories:

Attacking Tor: How The NSA Targets Users Online Anonymity

Brazilian TV show says U.S. spied on state-run Petrobras oil firm, cites NSA documents

XKeyscore Is Watching You: NSA Tool Collects Nearly Everything A Internet User Does

UPSTREAM, They Know Much More About You Than You Think

By Ryan Gallager @  Slate:

The National Security Agency is keen to portray its surveillance efforts as primarily focused on detecting and preventing possible terror attacks. But a new trove of freshly leaked secret documents suggests that the agency also uses its powerful spying apparatus to infiltrate and monitor multinational companies.

On Sunday, Brazilian TV show Fantastico published previously undisclosed details based on documents obtained by Guardian journalist Glenn Greenwald from former NSA contractor Edward Snowden. The 13-minute news segment focused on the revelation that, according to the leaked files, the NSA apparently targeted Brazil’s state-run Petrobras oil producer for surveillance—undermining a recent statement by the agency that it “does not engage in economic espionage in any domain.” The Petrobras detail has been picked up internationally, and is likely to cause a serious stir in Brazil. (The country is still reeling from the revelation last week that the NSA spied on its president.) But Fantastico delivered several other highly significant nuggets that deserve equal attention.

Aside from targeting Petrobras, Fantastico revealed that in a May 2012 presentation reportedly used by the agency to train new recruits how to infiltrate private computer networks, Google is listed as a target. So are the French Ministry of Foreign Affairs and SWIFT, a financial cooperative that connects thousands of banks and is supposed to help “securely” facilitate banking transactions made between more than 200 countries. Other documents show that the NSA’s so-called STORMBREW program—which involves sifting Internet traffic directly off of cables as it is flowing past—is being operated with the help of a “key corporate partner” at about eight key locations across the United States where there is access to “international cables, routers, and switches.” According to a leaked NSA map, this surveillance appears to be taking place at network junction points in Washington, Florida, Texas, at two places in California, and at three further locations in or around Virginia, New York, and Pennsylvania.

Further afield, the NSA has apparently targeted the computer networks of Saudi Arabia’s Riyad Bank and Chinese technology company Huawei for surveillance, the documents show. The agency also operates a program called SHIFTINGSHADOW that appears to collect communications and location data from two major cellphone providers in Afghanistan through what it describes as a “foreign access point.” The targeting of China’s Huawei and phone operators in Afghanistan is perhaps unsurprising, given fears about Huawei’s links to the Chinese government and potential terror attacks on U.S. interests emanating from Afghanistan. But the potential infiltration of Google, in particular, is a controversial development, and the Internet giant will no doubt be demanding answers from the U.S. government.

(Google declined a request for comment. James Clapper, the Director of National Intelligence, has put out a statement not directly addressing any of the latest revelations but saying that the United States “collects foreign intelligence—just as many other governments do—to enhance the security of our citizens and protect our interests and those of our allies around the world.”)

Equally notable, Fantastico displayed a number of leaked secret documents that help shed light on recent reports about efforts made by the NSA and its British counterpart GCHQ to break encryption. In a joint scoop last week, the New York Times, ProPublica, and the Guardian claimed that the spy agencies had “cracked much of the online encryption relied upon by hundreds of millions of people” to protect their online data. However, it was not clear from the reports exactly what encryption protocols had been “cracked” and the tone of the scoops, as I noted at the time, seemed excessively alarmist.

Now, documents published by Fantastico appear to show that, far from “cracking” SSL encryption—a commonly used protocol that shows up in your browser as HTTPS—the spy agencies have been forced to resort to so-called “man-in-the-middle” attacks to circumvent the encryption by impersonating security certificates in order to intercept data.

Prior to the increased adoption of SSL in recent years, government spies would have been able to covertly siphon emails and other data in unencrypted format straight off of Internet cables with little difficulty. SSL encryption seriously dented that capability and was likely a factor in why the NSA started the PRISM Internet surveillance program, which involves obtaining data from Internet companies directly.

However, in some cases GCHQ and the NSA appear to have taken a more aggressive and controversial route—on at least one occasion bypassing the need to approach Google directly by performing a man-in-the-middle attack to impersonate Google security certificates. One document published by Fantastico, apparently taken from an NSA presentation that also contains some GCHQ slides, describes “how the attack was done” to apparently snoop on SSL traffic. The document illustrates with a diagram how one of the agencies appears to have hacked into a target’s Internet router and covertly redirected targeted Google traffic using a fake security certificate so it could intercept the information in unencrypted format.

Documents from GCHQ’s “network exploitation” unit show that it operates a program called “FLYING PIG” that was started up in response to an increasing use of SSL encryption by email providers like Yahoo, Google, and Hotmail. The FLYING PIG system appears to allow it to identify information related to use of the anonymity browser Tor (it has the option to query “Tor events”) and also allows spies to collect information about specific SSL encryption certificates. GCHQ’s network exploitation unit boasts in one document that it is able to collect traffic not only from foreign government networks—but  from airlines, energy companies, and financial organizations, too.

Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate‘s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.

How We Are Gentrified, Impoverished And Silenced – If We Allow it

In Uncategorized on July 30, 2013 at 8:25 pm

Oldspeak: “We live in an age, where “we have made the unthinkable normal and the normal unthinkable…” –John Pilger. Neo-feudalism. Globalization. Global corporate governance. Exploding global poverty.  Global secret surveillance. Assassination by Presidential Decree. Slave Labor. Unprecedented inequality and wealth concentration. Ubiquitous violence & militarization. Expanding prison populations.  Food and water shortages. Universal government corruption. Failing ponzi scheme masquerading as global economy.  Privatization of all things public. Failing Ecosystem.  etc, etc, etc… These things cannot continue to be seen as normal.  We need to swell the ranks of the “creatively maladjusted”, people who cannot bring themselves to be acclimated to the insanity being passed off as sanity in our civilization. Apocalyptic Thought is necessary no more than ever. ” –OSJ

By John Pilger @ New Statesman:

I have known my postman for more than 20 years. Conscientious and goodhumoured, he is the embodiment of public service at its best. The other day, I asked him, “Why are you standing in front of each door like a soldier on parade?”
“New system,” he replied. “I am no longer required simply to post the letters through the door. I have to approach every door in a certain way and put the letters through in a certain way.”
“Why?”
“Ask him.”
Across the street was a solemn young man, clipboard in hand, whose job was to stalk postmen and see they abided by the new rules, no doubt in preparation for privatisation. I told the stalker my postman was admirable. His face remained flat, except for a momentary flicker of confusion.
In Brave New World Revisited, Aldous Huxley describes a new class conditioned to a normality that is not normal “because they are so well adjusted to our mode of existence, because their human voice has been silenced so early in their lives, that they do not even struggle or suffer or develop symptoms as the neurotic does”.
Surveillance is normal in the Age of Regression – as Edward Snowden revealed. Ubiquitous cameras are normal. Subverted freedoms are normal. Effective public dissent is now controlled by the police, whose intimidation is normal.
The traducing of noble terms such as “democracy”, “reform”, “welfare” and “public service” is normal. Prime ministers lying openly about lobbyists and war aims is normal. The export of £4bn worth of British arms, including crowd control ammunition, to the medieval state of Saudi Arabia, where apostasy is a capital crime, is normal.
The wilful destruction of efficient, popular public institutions such as the Royal Mail is normal. A postman is no longer a postman, going about his decent work; he is an automaton to be watched, a box to be ticked. Aldous Huxley described this regression as insane and our “perfect adjustment to that abnormal society” a sign of the madness.
Are we “perfectly adjusted” to all of this? No, not yet. People defend hospitals from closure, UK Uncut forces bank branches to close and six brave women climb the highest building in western Europe to show the havoc caused by the oil companies in the Arctic. There, the list begins to peter out.
At this year’s Manchester International Festival, Percy Bysshe Shelley’s epic Masque of Anarchy – all 91 verses written in rage at the massacre of Lancashire people protesting against poverty in 1819 – was an acclaimed piece of theatre, and utterly divorced from the world outside. In January, the Greater Manchester Poverty Commission had disclosed that 600,000 Mancunians were living in “extreme poverty” and that 1.6 million, or nearly half the population of the city, were at risk of “sliding into deeper poverty”.
Poverty has been gentrified. The Park Hill Estate in Sheffield was once an edifice of public housing – but unloved by many for its Le Corbusier brutalism, poor maintenance and lack of facilities. With its English Heritage Grade II listing, it has been renovated and privatised. Two-thirds of the refurbished flats, reborn as modern apartments, are selling to “professionals” such as designers, architects and a social historian. At the sales office you can buy designer mugs and cushions. This façade offers not a hint that, ravaged by the government’s “austerity” cuts, Sheffield has a social housing waiting list of 60,000.
Park Hill is a symbol of the two-thirds society that is Britain today. The gentrified third do well, some of them extremely well, a third struggle to get by on credit and the rest slide into poverty.
Although the majority of the British people are working class – whether or not they see themselves that way – a gentrified minority dominates parliament, senior management and the media. David Cameron, Nick Clegg and Ed Miliband are their authentic representatives. They fix the limits of political life and debate, aided by gentrified journalism and the “identity” industry. The greatest ever transfer of wealth upwards is a given. Social justice has been replaced by meaningless “fairness”.
While promoting this normality, the BBC rewards a senior functionary with a pay-off of almost £1m. Although it regards itself as the media equivalent of the Church of England, the corporation now has ethics comparable with those of the “security” companies G4S and Serco, which have “overcharged” on public services by tens of millions of pounds. In other countries, this is called corruption.
Like the fire sale of the power utilities, water and the railways, the sale of Royal Mail is to be achieved with bribery and the collaboration of the union leadership, regardless of vocal outrage. At the start of his 1983 documentary series Questions of Leadership, Ken Loach shows trade union firebrands exhorting the masses. The same men are then shown, older and florid, adorned in the ermine of the House of Lords. In the recent Queen’s Birthday Honours, the former general secretary of the TUC Brendan Barber received his knighthood.
How long can the British watch the uprisings across the world and do little apart from mourn the long-dead Labour Party? The Edward Snowden revelations show the infrastructure of a police state emerging in Europe, especially Britain. Yet people are more aware than ever before; and governments fear popular resistance – which is why truth-tellers are isolated, smeared and pursued.
Momentous change almost always begins with the courage of people taking back their own lives against the odds. There is no other way now. Direct action. Civil disobedience. Unerring. Read Shelley: “Ye are many – they are few.” And do it.
John Pilger’s new film, “Utopia”, will be previewed at the National Film Theatre, London, in the autumn

Emergency “Continuity Of Government” Plans Currently In Effect Suspend Normal Laws & Legal Process: Is This The REAL Reason For Government Spying On Americans?

In Uncategorized on June 11, 2013 at 4:54 pm

https://theoldspeakjournal.files.wordpress.com/2013/06/be4f0-shadow_govt_logo.jpgOldspeak: “The United States has been in a declared state of emergency from September 2001, to the present… That declared state of emergency has continued in full force and effect from 9/11 to the present. President Bush kept it in place, and President Obama has also… Simply by proclaiming a national emergency… President Bush activated some 500 dormant legal provisions, including those allowing him to impose censorship and martial law… Of the 54 National Security Presidential Directives issued by the [George W.] Bush Administration to date, the titles of only about half have been publicly identified. There is descriptive material or actual text in the public domain for only about a third. In other words, there are dozens of undisclosed Presidential directives that define U.S. national security policy and task government agencies, but whose substance is unknown either to the public or, as a rule, to Congress.”  –Washington’s Blog

“Viewed in the context of the government behaviours being exhibited: Indefinite detention, summary executive order executions,  general contempt for,  zealous prosecution of and jailing of journalists, suppression of dissent, state censorship, suspended rights to petition, assemble & speak, state propaganda, compromised system checks and balances, constant mass surveillance; this makes a lot of sense. We’re in living under a form of stealth martial law. How else would our government feel justified and within the law to do enact all these extra-constitutional measures? The “threat of terrorism” has been used to activate hundreds of little known “emergency” legal provisions. Without debate in pubic or  knowledge of the public… Why are we not entitled to know about our Shadow Government that seems to be making so much secret & anti-democratic policy?” –OSJ

By Washington’s Blog:

Are Emergency Plans Meant Only for Nuclear War the Real Justification for Spying?

To understand the scope and extent of government spying on all Americans – and the reasons for such spying – you have to understand what has happened to our Constitutional form of government since 9/11.

State of Emergency

The United States has been in a declared state of emergency from September 2001, to the present. Specifically, on September 11, 2001, the government declared a state of emergency. That declared state of emergency was formally put in writing on 9/14/2001:

A national emergency exists by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States.

NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, by virtue of the authority vested in me as President by the Constitution and the laws of the United States, I hereby declare that the national emergency has existed since September 11, 2001 . . .

That declared state of emergency has continued in full force and effect from 9/11 to the present. President Bush kept it in place, and President Obama has also.

For example, on September 9, 2011, President Obama declared:

CONTINUATION OF NATIONAL EMERGENCY DECLARED BY PROC. NO. 7463

Notice of President of the United States, dated Sept. 9, 2011, 76 F.R. 56633, provided:

Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C. 1622(d), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of
September 11, 2001, and the continuing and immediate threat of
further attacks on the United States.

Because the terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and authorities
adopted to deal with that emergency must continue in effect
beyond September 14, 2011. Therefore, I am continuing in effect for an additional year the national emergency that was declared on September 14, 2001, with respect to the terrorist threat.

This notice shall be published in the Federal Register and
transmitted to the Congress.

The Washington Times wrote on September 18, 2001:

Simply by proclaiming a national emergency on Friday, President Bush activated some 500 dormant legal provisions, including those allowing him to impose censorship and martial law.

The White House has kept substantial information concerning its presidential proclamations and directives hidden from Congress. For example, according to Steven Aftergood of the Federation of American Scientists Project on Government Secrecy:

Of the 54 National Security Presidential Directives issued by the [George W.] Bush Administration to date, the titles of only about half have been publicly identified. There is descriptive material or actual text in the public domain for only about a third. In other words, there are dozens of undisclosed Presidential directives that define U.S. national security policy and task government agencies, but whose substance is unknown either to the public or, as a rule, to Congress.

Continuity of Government

Continuity of Government (“COG”) measures were implemented on 9/11. For example, according to the 9/11 Commission Report, at page 38:

At 9:59, an Air Force lieutenant colonel working in the White House Military Office joined the conference and stated he had just talked to Deputy National Security Advisor Stephen Hadley. The White House requested (1) the implementation of continuity of government measures, (2) fighter escorts for Air Force One, and (3) a fighter combat air patrol over Washington, D.C.

Likewise, page 326 of the Report states:

The secretary of defense directed the nation’s armed forces to Defense Condition 3, an increased state of military readiness. For the first time in history, all nonemergency civilian aircraft in the United States were grounded, stranding tens of thousands of passengers across the country. Contingency plans for the continuity of government and the evacuation of leaders had been implemented.

The Washington Post notes that Vice President Dick Cheney initiated the COG plan on 9/11:

From the bunker, Cheney officially implemented the emergency continuity of government orders . . .

(See also footnotes cited therein and this webpage.)

CNN reported that – 6 months later – the plans were still in place:

Because Bush has decided to leave the operation in place, agencies including the White House and top civilian Cabinet departments have rotated personnel involved, and are discussing ways to staff such a contingency operation under the assumption it will be in place indefinitely, this official said.

Similarly, the Washington Post reported in March 2002 that “the shadow government has evolved into an indefinite precaution.” The same article goes on to state:

Assessment of terrorist risks persuaded the White House to remake the program as a permanent feature of ‘the new reality, based on what the threat looks like,’ a senior decisionmaker said.

As CBS pointed out, virtually none of the Congressional leadership knew that the COG had been implemented or was still in existence as of March 2002:

Key congressional leaders say they didn’t know President Bush had established a “shadow government,” moving dozens of senior civilian managers to secret underground locations outside Washington to ensure that the federal government could survive a devastating terrorist attack on the nation’s capital, The Washington Post says in its Saturday editions.

Senate Majority Leader Thomas A. Daschle (D-S.D.) told the Post he had not been informed by the White House about the role, location or even the existence of the shadow government that the administration began to deploy the morning of the Sept. 11 hijackings.

An aide to House Minority Leader Richard A. Gephardt (D-Mo.) said he was also unaware of the administration’s move.

Among Congress’s GOP leadership, aides to House Speaker J. Dennis Hastert (Ill.), second in line to succeed the president if he became incapacitated, and to Senate Minority Leader Trent Lott (Miss.) said they were not sure whether they knew.

Aides to Sen. Robert C. Byrd (D-W. Va.) said he had not been told. As Senate president pro tempore, he is in line to become president after the House speaker.

Similarly, the above-cited CNN article states:

Senate Majority Leader Tom Daschle, D-South Dakota, said Friday he can’t say much about the plan.

“We have not been informed at all about the role of the shadow government or its whereabouts or what particular responsibilities they have and when they would kick in, but we look forward to work with the administration to get additional information on that.”

Indeed, the White House has specifically refused to share information about Continuity of Government plans with the Homeland Security Committee of the U.S. Congress, even though that Committee has proper security clearance to hear the full details of all COG plans.

Specifically, in the summer 2007, Congressman Peter DeFazio, on the Homeland Security Committee (and so with proper security access to be briefed on COG issues), inquired about continuity of government plans, and was refused access. Indeed, DeFazio told Congress that the entire Homeland Security Committee of the U.S. Congress has been denied access to the plans by the White House.

(Or here is the transcript).

The Homeland Security Committee has full clearance to view all information about COG plans.

DeFazio concluded: “Maybe the people who think there’s a conspiracy out there are right”.

University of California Berkeley Professor Emeritus Peter Dale Scott points out that – whether or not COG plans are still in effect – the refusal of the executive branch to disclose their details to Congress means that the Constitutional system of checks and balances has already been gravely injured:

If members of the Homeland Security Committee cannot enforce their right to read secret plans of the Executive Branch, then the systems of checks and balances established by the U.S. Constitution would seem to be failing.

To put it another way, if the White House is successful in frustrating DeFazio, then Continuity of Government planning has arguably already superseded the Constitution as a higher authority.

Indeed, continuity of government plans are specifically defined to do the following:

  • Top leaders of the “new government” called for in the COG would entirely or largely go into hiding, and would govern in hidden locations
  • Those within the new government would know what was going on. But those in the “old government” – that is, the one created by the framers of the Constitution – would not necessarily know the details of what was happening
  • Normal laws and legal processes might largely be suspended, or superseded by secretive judicial forums
  • The media might be ordered by strict laws – punishable by treason – to only promote stories authorized by the new government

See this, this and this.

Could the White House have maintained COG operations to the present day?

I don’t know, but the following section from the above-cited CNN article is not very reassuring:

Bush triggered the precautions in the hours after the September 11 strikes, and has left them in place because of continuing U.S. intelligence suggesting a possible threat.

Concerns that al Qaeda could have gained access to a crude nuclear device “were a major factor” in the president’s decision, the official said. “The threat of some form of catastrophic event is the trigger,” this official said.

This same official went on to say that the U.S. had no confirmation — “and no solid evidence” — that al Qaeda had such a nuclear device and also acknowledged that the “consensus” among top U.S. officials was that the prospect was “quite low.”

Still, the officials said Bush and other top White House officials including Cheney were adamant that the government take precautions designed to make sure government functions ranging from civil defense to transportation and agricultural production could be managed in the event Washington was the target of a major strike.

As is apparent from a brief review of the news, the government has, since 9/11, continuously stated that there is a terrorist threat of a nuclear device or dirty bomb. That alone infers that COG plans could, hypothetically, still be in effect, just like the state of emergency is still in effect and has never been listed.

Indeed,  President Bush said on December 17, 2005, 4 years after 9/11:

The authorization I gave the National Security Agency after Sept. 11 helped address that problem in a way that is fully consistent with my constitutional responsibilities and authorities.

The activities I have authorized make it more likely that killers like these 9/11 hijackers will be identified and located in time.

And the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.

The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist threats to the continuity of our government and the threat of catastrophic damage to our homeland.

During each assessment, previous activities under the authorization are reviewed. The review includes approval by our nation’s top legal officials, including the attorney general and the counsel to the president.

I have reauthorized this program more than 30 times since the Sept. 11 attacks [45 days times 30 equals approximately 4 years] and I intend to do so for as long as our nation faces a continuing threat from Al Qaeda and related groups.

The N.S.A.’s activities under this authorization are thoroughly reviewed by the Justice Department and N.S.A.’s top legal officials, including N.S.A.’s general counsel and inspector general.

In other words, it appears that as of December 2005, COG plans had never been rescincded, but had been continously renewed every 45 days.

In 2008, Tim Shorrock wrote at Salon:

A contemporary version of the Continuity of Government program was put into play in the hours after the 9/11 terrorist attacks, when Vice President Cheney and senior members of Congress were dispersed to “undisclosed locations” to maintain government functions. It was during this emergency period, Hamilton and other former government officials believe, that President Bush may have authorized the NSA to begin actively using the Main Core database for domestic surveillance [more on Main Core below]. One indicator they cite is a statement by Bush in December 2005, after the New York Times had revealed the NSA’s warrantless wiretapping, in which he made a rare reference to the emergency program: The Justice Department’s legal reviews of the NSA activity, Bush said, were based on “fresh intelligence assessment of terrorist threats to the continuity of our government.”

In 2007, President Bush issued Presidential Directive NSPD-51, which purported to change Continuity of Government plans. NSPD51 is odd because:

Beyond cases of actual insurrection, the President may now use military troops as a domestic police force in response to a natural disaster, a disease outbreak, terrorist attack, or to any ‘other condition.’ Changes of this magnitude should be made only after a thorough public airing. But these new Presidential powers were slipped into the law without hearings or public debate.

  • As a reporter for Slate concluded after analyzing NSPD-51:

I see nothing in the [COG document entitled presidential directive NSPD51] to prevent even a “localized” forest fire or hurricane from giving the president the right to throw long-established constitutional government out the window

  • White House spokesman Gordon Johndroe said that “because of the attacks of Sept. 11, 2001, the American public needs no explanation of [Continuity of Government] plans”

This is all the more bizarre when you realize that COG plans were originally created solely to respond to a decapitating nuclear strike which killed our civilian leaders.   (It was subsequently expanded decades before 9/11 into a multi-purpose plan by our good friends Dick Cheney and Donald Rumsfeld. See this, this and this.)

Does COG Explain the Pervasive Spying on Americans?

5 years ago, investigative reporter Christopher Ketcham disclosed the spying which was confirmed last week by  whistleblower Edward Snowden:

The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.

Given that Ketcham was proven right, let’s see what else he reported:

Given that Ketcham was right about the basics, let’s hear what else the outstanding investigative journalist said in 2008:

There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.”

***

According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger [for martial law ].

***

When COG plans are shrouded in extreme secrecy, effectively unregulated by Congress or the courts, and married to an overreaching surveillance state—as seems to be the case with Main Core—even sober observers must weigh whether the protections put in place by the federal government are becoming more dangerous to America than any outside threat.

Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with “social network analysis” and artificial intelligence modeling tools.

***

A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor antiwar protesters and environmental activists such as Greenpeace.

***

If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protesters, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.

A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, [current nominee to head the FBI, and former Deputy Attorney General] James Comey expressed concern over how this secret database was being used “to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time.” [Snowden and high-level NSA whistleblower William Binney have since confirmed this] …. A source regularly briefed by people inside the intelligence community adds: “Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that ‘Main Core’ database compromised the legality of the overall NSA domestic surveillance project.”

***

The veteran CIA intelligence analyst notes that Comey’s suggestion that the offending elements of the program were dropped could be misleading: “Bush [may have gone ahead and] signed it as a National Intelligence Finding anyway.” But even if we never face a national emergency, the mere existence of the database is a matter of concern. “The capacity for future use of this information against the American people is so great as to be virtually unfathomable,” the senior government official says.

In any case, mass watch lists of domestic citizens may do nothing to make us safer from terrorism. Jeff Jonas, chief scientist at IBM, a world-renowned expert in data mining, contends that such efforts won’t prevent terrorist conspiracies. “Because there is so little historical terrorist event data,” Jonas tells Radar, “there is not enough volume to create precise predictions.”

***

[J. Edgar Hoover’s] FBI “security index” was allegedly maintained and updated into the 1980s, when it was reportedly transferred to the control of none other than FEMA (though the FBI denied this at the time).

FEMA, however—then known as the Federal Preparedness Agency—already had its own domestic surveillance system in place, according to a 1975 investigation by Senator John V. Tunney of California. Tunney, the son of heavyweight boxing champion Gene Tunney and the inspiration for Robert Redford’s character in the film The Candidate, found that the agency maintained electronic dossiers on at least 100,000 Americans that contained information gleaned from wide-ranging computerized surveillance. The database was located in the agency’s secret underground city at Mount Weather, near the town of Bluemont, Virginia. [One of the main headquarter of COG operations.] The senator’s findings were confirmed in a 1976 investigation by the Progressive magazine, which found that the Mount Weather computers “can obtain millions of pieces [of] information on the personal lives of American citizens by tapping the data stored at any of the 96 Federal Relocation Centers”—a reference to other classified facilities. According to the Progressive, Mount Weather’s databases were run “without any set of stated rules or regulations. Its surveillance program remains secret even from the leaders of the House and the Senate.”

***

Wired magazine turned up additional damaging information, revealing in 1993 that [Oliver] North, operating from a secure White House site, allegedly employed a software database program called PROMIS (ostensibly as part of the REX 84 plan). PROMIS, which has a strange and controversial history, was designed to track individuals—prisoners, for example—by pulling together information from disparate databases into a single record. According to Wired, “Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon’s enemies list or Senator Joe McCarthy’s blacklist look downright crude.” Sources have suggested to Radar that government databases tracking Americans today, including Main Core, could still have PROMIS-based legacy code from the days when North was running his programs.

***

Marty Lederman, a high-level official at the Department of Justice under Clinton, writing on a law blog last year, wondered, “How extreme were the programs they implemented [after 9/11]? How egregious was the lawbreaking?” Congress has tried, and mostly failed, to find out.

***

We are at the edge of a cliff and we’re about to fall off,” says constitutional lawyer and former Reagan administration official Bruce Fein. “To a national emergency planner, everybody looks like a danger to stability. There’s no doubt that Congress would have the authority to denounce all this—for example, to refuse to appropriate money for the preparation of a list of U.S. citizens to be detained in the event of martial law. But Congress is the invertebrate branch.

***

UPDATE [from Ketcham]: Since this article went to press, several documents have emerged to suggest the story has longer legs than we thought. Most troubling among these is an October 2001 Justice Department memo that detailed the extra-constitutional powers the U.S. military might invoke during domestic operations following a terrorist attack. In the memo, John Yoo, then deputy assistant attorney general, “concluded that the Fourth Amendment had no application to domestic military operations.” (Yoo, as most readers know, is author of the infamous Torture Memo that, in bizarro fashion, rejiggers the definition of “legal” torture to allow pretty much anything short of murder.) In the October 2001 memo, Yoo refers to a classified DOJ document titled “Authority for Use of Military Force to Combat Terrorist Activities Within the United States.” According to the Associated Press, “Exactly what domestic military action was covered by the October memo is unclear. But federal documents indicate that the memo relates to the National Security Agency’s Terrorist Surveillance Program.” Attorney General John Mukasey last month refused to clarify before Congress whether the Yoo memo was still in force.

Americans have the right to know whether a COG program is  still in effect, and whether the spying on our phone calls and Internet usage stems from such COG plans. Indeed, 9/11 was a horrible blow, but it was not a decapitating nuclear strike on our leaders … so COG and the state of emergency should be lifted.

If COG plans are not still in effect, we have the right to demand that “enemies lists” and spying capabilities developed  for the purpose of responding to a nuclear war be discarded , as we have not been hit by nuclear weapons … and our civilian leaders – on Capitol Hill, the White House, and the judiciary – are still alive and able to govern.