In the councils of government we must guard against the acquisition of unwarranted influence whether sought or unsought by the militaryindustrial complex The potential for the disastrous rise of misplaced power exists and will persist ID: 637998
Download Presentation The PPT/PDF document "Eisenhower’s Warning (Farewell Address..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Eisenhower’s Warning(Farewell Address, January 17, 1961)
In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.
We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.
YouTube LinkSlide2
JFK’s Warning(American Newspaper Publishers Association Speech, April 27, 1961)
The
very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control.
YouTube linkSlide3
They Keep Pictures of All Mail(from Federal Warrant Application)Slide4
Your Car Is Watching You(Proposed DOT regulation
, but over 90% of new cars already comply)Slide5
They Tap All Telecommunications(from Wired presentation in 2005)Slide6
Digital Call Content Is Recorded(The Guardian, May 4, 2013)Slide7
PRISM Program(Washington Post 7/10/13
)Slide8
User Friendly Spying Tools(Der Spiegel 12/30/13
)Slide9
NSA Spies on Everyone
Russ
Tice, former ONI, DIA, and NSA employee, on
June
19,
2013
:
“They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial”
“But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people.”Slide10
NSA Storage Capacities(Affidavit of former NSA Engineer in EFF lawsuit)Slide11
Storage Capacities
1,024
megabytes is a
gigabyte
1,024
gigabytes is a terabyte.
1,024
terabytes is a petabyte.
1,024
petabytes is an
exabyte
.
1,024
exabytes
is a
zettabyte
.
Global Internet traffic may reach a
zettabyte
in a few years
1,024
zettabytes
is a
yottabyte
. Slide12
Every device is compromised(from 48-page NSA presentation)Slide13
Even your iPhone(from NSA presentation)Slide14
NSA Hardware Toolbox(Der Spiegel, 12/29/13
)Slide15
QUANTUM(Der Spiegel 12/30/13)Slide16
Martial Law in the Digital World(Latest Snowden revelations
)
TURMOIL system monitors everything
TURBINE system injects packets to infect and attack
QUANTUM series of injection payloads
Government has the key to nearly every digital door, constantly watches and enters any interesting device, and leaves packets on those devices
Often does this by falsely impersonating/taking over other machines
“Interdiction:” euphemism for non-digital interception efforts (physical changes to your devices)
All outside any notion of lawSlide17
Felonies vs. Court Orders18 U.S.C. § 1030
NSA intrusions into personal computers are probably felonies
Aaron Swartz (1986-2013) Slide18
Section 215 of the Patriot Act
50
U.S.C. § 1861(a) Application for order; conduct of investigation
generally
(1) Subject to paragraph (3), the Director of the Federal Bureau of Investigation or a designee . . . may make an application for an order requiring the production of any tangible things (including books, records, papers, documents, and other items) for an investigation to . . . protect against international terrorism
.
. . .
Each
application under this
section . . . .
(2) shall include—
(A) a statement of facts showing that there are reasonable grounds to believe that
the tangible things sought are relevant
to an authorized investigation . . . to protect against international terrorism . . . such things being presumptively relevant to an authorized investigation if the applicant shows in the statement of the facts that they pertain to—
(
i
) a foreign power or an agent of a foreign power;
(ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or
(iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation . . .”Slide19
NSA Defines “Relevance”(from Administration White Paper Aug. 2013)Slide20
Privacy and Civil Liberties Oversight Board Report, January 23, 2014Slide21
Even Your Life Is Subject to “Balancing”(from DOJ White Paper)Slide22
Congress Knew and Did Nothing
(from
Admin White Paper Aug. 2013
)Slide23Slide24
Staged Lies?
Sen. Wyden: Does the NSA collect
“any type
of
data
at all
on millions or
hundreds
of
millions
of
Americans?”
Gen. Clapper: “
No sir.”
Daily Show:
No spy should have that much of a tell
YouTube linkSlide25
Defrauding the Courts: Special Operations Division (SOD)Slide26
The Fourth Amendment
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.Slide27
It’s SimpleGovernment should figure out who the bad guys are, not treat everyone as a bad guy.
A specific application, showing someone is a bad guy, is required before collecting information.
We need a radical shift toward government transparencySlide28
Modern Policy: Everything Is Secret(DOJ FOIA Manual)Slide29
Modern Policy: No One Can SueStanding Doctrine
Can’t challenge spending
Can’t challenge legal violations not targeted at you
No one can sue at all
Made up entirely by judgesSlide30
Gait Surveillance(National Physical Laboratory (UK))
Not science fiction anymoreSlide31
Will the Only Limits to Government Power Be Engineering Feasibility?
Technology is outrunning law
Your tax dollars are funding this
Three choices:
(1) Government knows all, we know nothing
(2) Everyone can access everything public
(3) Slow down the technology juggernautSlide32
Pro-Surveillance State Propaganda(Disney Shutterbug Program)Slide33
Constantly Expanding Surveillance(Washington Post, Feb. 18, 2014
)Slide34
Planning for Prison CampsSlide35
Planning for Prison Camps (II)(e-pages 146, 193)Slide36
DHS Is Arming for War at Home(from Forbes magazine)Slide37
600,000 AK-47 Magazines?(Federal Procurement Website, Aug. 13, 2013
)Slide38
De-sensitivity Training for DHS?(DHS-funded training exercise)
YouTube footageSlide39
Law Enforcement Targets, Inc.Slide40
Other Worrisome Signs
NPS behavior during the shutdown (Yellowstone)
SWAT teams for financial crimes (credit cards, student loans)
Repeated government drills with those seeking limits on
government portrayed
as terrorists (
here
)
Total collapse of
“take
care that the laws be faithfully
executed” (U.S. Const., Art. 1, § 5)Slide41
What politician stood against this development?Slide42
Obama’s “Civilian National Security Force”
“We cannot rely only on our military in order to achieve the national security goals that we’ve set. We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded . . .
YouTubeSlide43
The Normalcy Bias
We are apt to shut our eyes against a painful truth, and listen to the song of that siren till she transforms us into beasts. Is this the part of wise men, engaged in a great and arduous struggle for liberty? Are we disposed to be of the number of those who, having eyes, see not, and, having ears, hear not, the things which so nearly concern their temporal salvation? For my part, whatever anguish of spirit it may cost, I am willing to know the whole truth; to know the worst, and to provide for it
.
Patrick Henry (1775)Slide44
Doing Nothing Won’t Work
“
Find out just what any people will quietly submit to and you
have
found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or with both
.”
Frederick
Douglass
(1857)Slide45
We can fix this
"There is something on earth greater than arbitrary or despotic power. The lightning has its power, and the whirlwind has its power, and the earthquake has its power; but there is something among men more capable of shaking despotic thrones than lightning, whirlwind, or earthquake, and that is, the excited and aroused indignation of the whole civilized world."
Daniel WebsterSlide46
Referendum IdeasExpress sense that Fourth Amendment protects electronic communications and data
Ban agencies from possessing data collected without a warrant (KS bill)
Ban support, participation or assistance with federal agencies asserting such powers (
WA
, CA bills)Slide47
Willing to Help?Spread this presentation by downloading it and forwarding or presenting it yourself (
www.buchal.com
)
I will go anywhere in the Metro area to give it
County Initiatives and Referenda
Help organize a large demonstration bringing Ron Paul or liberty speakers to Oregon