/
Eisenhower’s Warning (Farewell Address, January 17, 1961) Eisenhower’s Warning (Farewell Address, January 17, 1961)

Eisenhower’s Warning (Farewell Address, January 17, 1961) - PowerPoint Presentation

calandra-battersby
calandra-battersby . @calandra-battersby
Follow
369 views
Uploaded On 2018-02-27

Eisenhower’s Warning (Farewell Address, January 17, 1961) - PPT Presentation

In the councils of government we must guard against the acquisition of unwarranted influence whether sought or unsought by the militaryindustrial complex The potential for the disastrous rise of misplaced power exists and will persist ID: 637998

nsa power investigation government power nsa government investigation law 024 2013 application people security youtube foreign federal authorized national

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Eisenhower’s Warning (Farewell Address..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Eisenhower’s Warning(Farewell Address, January 17, 1961)

In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.

We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.

YouTube LinkSlide2

JFK’s Warning(American Newspaper Publishers Association Speech, April 27, 1961)

The

very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control.

YouTube linkSlide3

They Keep Pictures of All Mail(from Federal Warrant Application)Slide4

Your Car Is Watching You(Proposed DOT regulation

, but over 90% of new cars already comply)Slide5

They Tap All Telecommunications(from Wired presentation in 2005)Slide6

Digital Call Content Is Recorded(The Guardian, May 4, 2013)Slide7

PRISM Program(Washington Post 7/10/13

)Slide8

User Friendly Spying Tools(Der Spiegel 12/30/13

)Slide9

NSA Spies on Everyone

Russ

Tice, former ONI, DIA, and NSA employee, on

June

19,

2013

:

“They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial”

“But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people.”Slide10

NSA Storage Capacities(Affidavit of former NSA Engineer in EFF lawsuit)Slide11

Storage Capacities

1,024

megabytes is a

gigabyte

1,024

gigabytes is a terabyte.

1,024

terabytes is a petabyte.

1,024

petabytes is an

exabyte

.

1,024

exabytes

is a

zettabyte

.

Global Internet traffic may reach a

zettabyte

in a few years

1,024

zettabytes

is a

yottabyte

. Slide12

Every device is compromised(from 48-page NSA presentation)Slide13

Even your iPhone(from NSA presentation)Slide14

NSA Hardware Toolbox(Der Spiegel, 12/29/13

)Slide15

QUANTUM(Der Spiegel 12/30/13)Slide16

Martial Law in the Digital World(Latest Snowden revelations

)

TURMOIL system monitors everything

TURBINE system injects packets to infect and attack

QUANTUM series of injection payloads

Government has the key to nearly every digital door, constantly watches and enters any interesting device, and leaves packets on those devices

Often does this by falsely impersonating/taking over other machines

“Interdiction:” euphemism for non-digital interception efforts (physical changes to your devices)

All outside any notion of lawSlide17

Felonies vs. Court Orders18 U.S.C. § 1030

NSA intrusions into personal computers are probably felonies

Aaron Swartz (1986-2013) Slide18

Section 215 of the Patriot Act

50

U.S.C. § 1861(a) Application for order; conduct of investigation

generally

(1) Subject to paragraph (3), the Director of the Federal Bureau of Investigation or a designee . . . may make an application for an order requiring the production of any tangible things (including books, records, papers, documents, and other items) for an investigation to . . . protect against international terrorism

.

. . .

Each

application under this

section . . . .

(2) shall include—

(A) a statement of facts showing that there are reasonable grounds to believe that

the tangible things sought are relevant

to an authorized investigation . . . to protect against international terrorism . . . such things being presumptively relevant to an authorized investigation if the applicant shows in the statement of the facts that they pertain to—

(

i

) a foreign power or an agent of a foreign power;

(ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or

(iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation . . .”Slide19

NSA Defines “Relevance”(from Administration White Paper Aug. 2013)Slide20

Privacy and Civil Liberties Oversight Board Report, January 23, 2014Slide21

Even Your Life Is Subject to “Balancing”(from DOJ White Paper)Slide22

Congress Knew and Did Nothing

(from

Admin White Paper Aug. 2013

)Slide23
Slide24

Staged Lies?

Sen. Wyden: Does the NSA collect

“any type

of

data

at all

on millions or

hundreds

of

millions

of

Americans?”

Gen. Clapper: “

No sir.”

Daily Show:

No spy should have that much of a tell

YouTube linkSlide25

Defrauding the Courts: Special Operations Division (SOD)Slide26

The Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.Slide27

It’s SimpleGovernment should figure out who the bad guys are, not treat everyone as a bad guy.

A specific application, showing someone is a bad guy, is required before collecting information.

We need a radical shift toward government transparencySlide28

Modern Policy: Everything Is Secret(DOJ FOIA Manual)Slide29

Modern Policy: No One Can SueStanding Doctrine

Can’t challenge spending

Can’t challenge legal violations not targeted at you

No one can sue at all

Made up entirely by judgesSlide30

Gait Surveillance(National Physical Laboratory (UK))

Not science fiction anymoreSlide31

Will the Only Limits to Government Power Be Engineering Feasibility?

Technology is outrunning law

Your tax dollars are funding this

Three choices:

(1) Government knows all, we know nothing

(2) Everyone can access everything public

(3) Slow down the technology juggernautSlide32

Pro-Surveillance State Propaganda(Disney Shutterbug Program)Slide33

Constantly Expanding Surveillance(Washington Post, Feb. 18, 2014

)Slide34

Planning for Prison CampsSlide35

Planning for Prison Camps (II)(e-pages 146, 193)Slide36

DHS Is Arming for War at Home(from Forbes magazine)Slide37

600,000 AK-47 Magazines?(Federal Procurement Website, Aug. 13, 2013

)Slide38

De-sensitivity Training for DHS?(DHS-funded training exercise)

YouTube footageSlide39

Law Enforcement Targets, Inc.Slide40

Other Worrisome Signs

NPS behavior during the shutdown (Yellowstone)

SWAT teams for financial crimes (credit cards, student loans)

Repeated government drills with those seeking limits on

government portrayed

as terrorists (

here

)

Total collapse of

“take

care that the laws be faithfully

executed” (U.S. Const., Art. 1, § 5)Slide41

What politician stood against this development?Slide42

Obama’s “Civilian National Security Force”

“We cannot rely only on our military in order to achieve the national security goals that we’ve set. We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded . . .

YouTubeSlide43

The Normalcy Bias

We are apt to shut our eyes against a painful truth, and listen to the song of that siren till she transforms us into beasts. Is this the part of wise men, engaged in a great and arduous struggle for liberty? Are we disposed to be of the number of those who, having eyes, see not, and, having ears, hear not, the things which so nearly concern their temporal salvation? For my part, whatever anguish of spirit it may cost, I am willing to know the whole truth; to know the worst, and to provide for it

.

Patrick Henry (1775)Slide44

Doing Nothing Won’t Work

Find out just what any people will quietly submit to and you

have

found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or with both

.”

Frederick

Douglass

(1857)Slide45

We can fix this

"There is something on earth greater than arbitrary or despotic power. The lightning has its power, and the whirlwind has its power, and the earthquake has its power; but there is something among men more capable of shaking despotic thrones than lightning, whirlwind, or earthquake, and that is, the excited and aroused indignation of the whole civilized world."

Daniel WebsterSlide46

Referendum IdeasExpress sense that Fourth Amendment protects electronic communications and data

Ban agencies from possessing data collected without a warrant (KS bill)

Ban support, participation or assistance with federal agencies asserting such powers (

WA

, CA bills)Slide47

Willing to Help?Spread this presentation by downloading it and forwarding or presenting it yourself (

www.buchal.com

)

I will go anywhere in the Metro area to give it

County Initiatives and Referenda

Help organize a large demonstration bringing Ron Paul or liberty speakers to Oregon