<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Center for a Stateless Society &#187; activism</title>
	<atom:link href="http://c4ss.org/content/tag/activism/feed" rel="self" type="application/rss+xml" />
	<link>http://c4ss.org</link>
	<description>building public awareness of left-wing market anarchism</description>
	<lastBuildDate>Sat, 24 Jan 2015 03:46:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.1</generator>
	<item>
		<title>Feminist Direct Action</title>
		<link>http://c4ss.org/content/27891</link>
		<comments>http://c4ss.org/content/27891#comments</comments>
		<pubDate>Tue, 03 Jun 2014 19:00:52 +0000</pubDate>
		<dc:creator><![CDATA[Valdenor Júnior]]></dc:creator>
				<category><![CDATA[Feature Articles]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[direct action]]></category>
		<category><![CDATA[Feminism]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=27891</guid>
		<description><![CDATA[Last week, SlutWalk took place all over Brazil. According to the São Paulo organizers, the event, occurring simultaneously in several cities in the country, aims to raise awareness about the fact that &#8220;women are not responsible for the violence they suffer; the survivor is never to blame — the aggressor is.&#8221; We should remember that...]]></description>
				<content:encoded><![CDATA[<p>Last week, SlutWalk took place all over Brazil. According to the São Paulo organizers, the event, occurring simultaneously in several cities in the country, aims to raise awareness about the fact that &#8220;women are not responsible for the violence they suffer; the survivor is never to blame — the aggressor is.&#8221;</p>
<p>We should remember that at the very core of the SlutWalk is the struggle against <i>slutshaming</i>, the practice of control of behavior based on systematic humiliation and intimidation of women that deviate from some standards of proper sexual conduct. The effect of that is a regulation of female sexuality even more rigorous than the male conduct, which normalizes gender inequality.</p>
<p>Coupled with that, there&#8217;s &#8220;rape culture:&#8221; cultural elements that, even from the point of view of “respectable” (non-criminal) society, normalize or relativize certain forms of rape and abuse of the (generally female) body. The result is that rape and abuse (physical and emotional) become tools of intimidation, punishment and, ultimately, correction of the female sexuality.</p>
<p>When we look at the whole picture, we can see the link between phenomena: slutshaming can and does serve as a springboard to the justification of abuse and rape. An example would be the labeling of certain women as &#8220;sluts&#8221; to then excuse or play down the violation of their intimacy and sexual dignity. After all, they had it coming because they were &#8220;asking for it,&#8221; and thus they are to blame. (See also <a href="http://c4ss.org/content/26086" target="_blank">this article</a>, in which I criticize the conflation of statistical probability with female moralizing.)</p>
<p>The profoundly anti-libertarian character of that practice is obvious: it&#8217;s an attack against the sexual freedom and consenting arrangements between independent adults. Ultimately, it can end up denying women their right to consent to male advances if they in any way deviate from certain rules of behavior.</p>
<p>Brazilian culture has historically been marked by sexism. In 1927, individualist anarchist amd labor organizer Maria Lacerda de Moura, one of the feminist pioneers in Brazil, wrote the article &#8220;Seduzidas e desonradas&#8221; (&#8220;Seduced and Dishonored&#8221;) for <i>O Combate</i> newspaper, where she denounced the double standard for morality and slutshaming. She focused on the value attributed to virginity and marriage, and the harsh penalties incurred by the deviants:</p>
<p style="padding-left: 30px;">&#8220;And poor that woman who forgets protocol.&#8221;</p>
<p style="padding-left: 30px;">&#8220;If now she is not lapidated, if now she is not buried alive like vestals, if now she is not stoned to death, if now she is not subjected to the tortures of the fanatic mobs of yesteryear, she is now treated to suicide: she is compelled to abandon independent life, because literature, press, and everyone else point their fingers to her, calling her &#8216;bastard,&#8217; &#8216;shameful,&#8217; &#8216;dishonored,&#8217; &#8216;dishonest,&#8217; opening up to her the doors of cheap prostitution in the streets. The victim is surrounded by the trail of misery, syphilis, brothels, humiliations, hospitals, and the common gutter.&#8221;</p>
<p style="padding-left: 30px;">&#8220;Wretched moral of colonels,* cowards, and cretins.&#8221;</p>
<p>In Maria Lacerda de Moura&#8217;s Brazil, pre-marriage virginity taboos still catalyzed sexist attitudes. In SlutWalk 2014&#8217;s Brazil, we have the spread of private pictures and videos, naked or having sex, via <em>WhatsApp</em>, quickly viralized and publicly exposed. It&#8217;s <i>revenge porn</i>, the “vengeance” of a former sex partner, that leaks private pictures and videos as if they were porn, often with explicit purpose of shaming the victim.</p>
<p>As in Maria Lacerda de Moura&#8217;s days, girls who were victim of this immoral and criminal dissemination are humilliated, intimidated, persecuted, and abused, unfolding a cycle of slutshaming. They are victims, but they are blamed and abuse is excused in their real life relationships or on the internet, something that can lead and has led to suicide. Times have changed, but that &#8220;wretched moral of colonels, cowards, and cretins&#8221; persists.</p>
<p>How can we change it? In the feminist tradition, direct action is extremely important in promoting bottom up social change, without resorting to the coercive state. <a href="http://charleswjohnson.name/essays/women-and-the-invisible-fist/" target="_blank">Charles Johnson</a> refers to solidarity and resistance forms employed by feminists historically to change social attitudes and promote help for women in need, such as &#8220;groups, speak-outs, culture-jamming, building grassroots networks of battered women&#8217;s shelters, rape crisis centers, and other feminist spaces&#8221; that originally had no connection to the government.</p>
<p>In this proud tradition of feminist direct action, updated to fight against the 21st century forms of slutshaming, we have six feminist 16-year old girls who created a prototype of application for smartphones named <i><a href="https://www.facebook.com/simplesmenteforyou?fref=ts" target="_blank">For You</a></i>.</p>
<p>The <a href="http://www.brasilpost.com.br/2014/05/16/for-you-app_n_5339900.html" target="_blank">idea</a> is to support teenage girls who have had their pictures leaked on the internet. The app creates a safe haven where they can meet other victims and debate themes related to revenge porn (complete with educational tabs on legislation, manifestos on how it isn&#8217;t their fault, victims’ testimonies, etc.), and have ambassadors set up local support groups that fight the intimidation the victims might suffer. In a <a href="https://www.youtube.com/watch?v=L8vXKyBqipY" target="_blank">video</a>, they explain how they want to use technology to raise awareness about online abuse and empower women.</p>
<p>&#8220;If they use apps to humilliate us, we fight back using apps to empower and organize ourselves,&#8221; says the motto of the group formed by Camila Ziron, Estela Machado, Hadassa Mussi, Larissa Rodrigues, and Letícia Santos. They are taking part in Technovation Challenge, a competition in which the winner group will take home $10,000 in financing and support for development.</p>
<p>Female liberation is being and will be achieved through education and the broadening of social cooperation networks. This brings us to a view of social feminist change focused on <a href="http://books.google.com.br/books?id=dqQrdsPEAoEC&amp;pg=PA67&amp;lpg=PA67&amp;dq=Can+Feminism+Be+Liberated+from+Governmentalism?&amp;source=bl&amp;ots=M-BenKzUZx&amp;sig=bxl4QOspl_CNcigTzhVFOvDnzDk&amp;hl=pt-PT&amp;sa=X&amp;ei=WawVU-KJCNGMkAeltICYBA&amp;ved=0CEEQ6AEwAw#v=onepage&amp;q=Can%20Feminism%20Be%20Liberated%20from%20Governmentalism%3F&amp;f=false" target="_blank">sociology, evolution, and micro-actions</a>. That is also how freedom from the state will be reached. Is that a coincidence? Not at all, for female emancipation is but a part of the progress toward a free society.</p>
<p>* “Colonels” are typical figures of local power in Brazil, the title having little to do with the military rank of the same name. Their system of rule has been called “<a href="https://en.wikipedia.org/wiki/Coronelismo" target="_blank">colonelism</a>” (“coronelismo”).</p>
<p><i>Translated from Portuguese into English by <a href="http://c4ss.org/content/author/erick-vasconcelos" target="_blank">Erick Vasconcelos</a>.</i></p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=27891&amp;md5=10271883d0c6ec682bafa09081e92295" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/27891/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F27891&amp;language=en_GB&amp;category=text&amp;title=Feminist+Direct+Action&amp;description=Last+week%2C+SlutWalk+took+place+all+over+Brazil.+According+to+the+S%C3%A3o+Paulo+organizers%2C+the+event%2C+occurring+simultaneously+in+several+cities+in+the+country%2C+aims+to+raise+awareness+about+the...&amp;tags=activism%2Canarchism%2CBrazil%2Cdirect+action%2CFeminism%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Weekly Abolitionist: Stop Caging Kids</title>
		<link>http://c4ss.org/content/27371</link>
		<comments>http://c4ss.org/content/27371#comments</comments>
		<pubDate>Mon, 19 May 2014 23:00:02 +0000</pubDate>
		<dc:creator><![CDATA[Nathan Goodman]]></dc:creator>
				<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[The Weekly Abolitionist]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[ageism]]></category>
		<category><![CDATA[children]]></category>
		<category><![CDATA[children's rights]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[justice]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[prison abolition]]></category>
		<category><![CDATA[prison state]]></category>
		<category><![CDATA[rape]]></category>
		<category><![CDATA[sexual abuse]]></category>
		<category><![CDATA[torture]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[youth rights]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=27371</guid>
		<description><![CDATA[This week marks the 2014 National Week of Action Against Incarcerating Youth. Across the country, actions will be held to protest everything from the criminalization of queer and disabled youth to the isolation of youth in solitary confinement. Ultimately, what activists are protesting is systematic child abuse by the state. Kids are being locked in...]]></description>
				<content:encoded><![CDATA[<p>This week marks the <a href="http://savethekidsgroup.org/?p=4177" target="_blank">2014 National Week of Action Against Incarcerating Youth</a>. Across the country, actions will be held to protest everything from the criminalization of <a href="http://www.americanprogress.org/issues/lgbt/report/2012/06/29/11730/the-unfair-criminalization-of-gay-and-transgender-youth/" target="_blank">queer</a> and <a href="http://www.pacer.org/jj/pdf/JJ-8.pdf" target="_blank">disabled</a> youth to the isolation of youth in solitary confinement. Ultimately, what activists are protesting is systematic child abuse by the state.</p>
<p>Kids are being locked in cages by the government all across the country. The consequences are devastating. According to a <a href="http://www.justicepolicy.org/images/upload/06-11_rep_dangersofdetention_jj.pdf" target="_blank">report</a> from the <a href="http://www.justicepolicy.org/index.html" target="_blank">Justice Policy Institute</a>:</p>
<blockquote><p>A recent literature review of youth corrections shows that detention has a profoundly negative impact on young people’s mental and physical well-being, their education, and their employment. One psychologist found that for one-third of incarcerated youth diagnosed with depression, the onset of the depression occurred after they began their incarceration, and another suggests that poor mental health, and the conditions of conﬁnement together conspire to make it more likely that incarcerated teens will engage in suicide and self-harm. Economists have shown that the process of incarcerating youth will reduce their future earnings and their ability to remain in the workforce, and could change formerly detained youth into less stable employees. Educational researchers have found that upwards of 40 percent of incarcerated youth have a learning disability, and they will face signiﬁcant challenges returning to school after they leave detention. Most importantly, for a variety of reasons to be explored, there is credible and signiﬁcant research that suggests that the experience of detention may make it more likely that youth will continue to engage in delinquent behavior, and that the detention experience may increase the odds that youth will recidivate, further compromising public safety.</p></blockquote>
<p>So the state is engaging in violence that scars young people physically and mentally, and hurts their economic prospects; and this practice may even increase rather than decrease the chance of future crime. Moreover, according to the same report, most of these youth are not even a threat to others, as &#8220;about 70 percent are detained for nonviolent offenses.&#8221;</p>
<p>Once incarcerated, youth are subjected to severe abuses. For example, many youth are isolated in solitary confinement, which is widely recognized as a form of psychological torture. According to the <a href="https://www.aclu.org/criminal-law-reform/growing-locked-down-youth-solitary-confinement-jails-and-prisons-across-united" target="_blank">American Civil Liberties Union</a>:</p>
<blockquote><p>Solitary confinement can cause extreme psychological, physical, and developmental harm. For children, who are still developing and more vulnerable to irreparable harm, the risks are magnified – particularly for kids with disabilities or histories of trauma and abuse. While confined, children are regularly deprived of the services, programming, and other tools that they need for healthy growth, education, and development.</p></blockquote>
<p>The impacts of solitary on adults are harmful enough. “It’s an awful thing, solitary,” wrote John McCain, “It crushes your spirit and weakens your resistance more effectively than any other form of mistreatment.” Subjecting youth to this kind of torture is monstrous.</p>
<p>Incarcerated youth are also all too often raped and sexually assaulted by guards. According to David Kaiser and Lovisa Stannow, &#8220;4.5 percent of juveniles in prison and 4.7 percent of those in jail reported such [sexual] victimization—rates that ought to be considered disastrously high.&#8221; Their risk was higher in youth detention centers, &#8220;minors held in juvenile detention suffered sexual abuse at twice the rate of their peers in adult facilities.&#8221; Most of this abuse is committed by guards employed and paid with tax dollars:</p>
<blockquote><p>Some 2.5 percent of all boys and girls in juvenile detention reported having been the victims of inmate-on-inmate abuse. This is not dramatically higher than the corresponding combined male and female rates reported by adults or juveniles in either prison or jail. The reason why the overall rate of sexual abuse (9.5 percent) was so much higher in juvenile detention than in other facilities is the frequency of sexual misconduct by staff. About 7.7 percent of those in juvenile detention reported sexual contact with staff during the preceding year. Over 90 percent of these cases involved female staff and teenage boys in custody.</p></blockquote>
<p>Government employees are committing child sexual abuse against caged victims. These guards are often repeat offenders. &#8220;In juvenile facilities, victims of sexual misconduct by staff members were more likely to report eleven or more instances of abuse than a single, isolated occurrence.&#8221; All of this data comes from research conducted by the government&#8217;s own Bureau of Justice Statistics.</p>
<p>The impacts of the state&#8217;s systematic caging and abuse of children are not equally distributed across the population. <a href="http://cclp.org/building_blocks.php" target="_blank">The Center for Children&#8217;s Law and Policy</a> documents many studies showing the racially disparate impacts of youth incarceration and juvenile justice policies. LGBTQ youth also face disproportionate impacts from the juvenile justice system. According to an article in <a href="http://www.thenation.com/article/36488/i-was-scared-sleep-lgbt-youth-face-violence-behind-bars" target="_blank">The Nation</a>:</p>
<blockquote><p>The road to incarceration begins in pretrial detention, before the youth even meets a judge. Laws and professional standards state that it&#8217;s appropriate to detain a child before trial only if she might run away or harm someone. Yet for queer youth, these standards are frequently ignored. According to UC Santa Cruz researcher Dr. Angela Irvine, LGBT youth are two times more likely than straight youth to land in a prison cell before adjudication for nonviolent offenses like truancy, running away and prostitution. According to Ilona Picou, executive director of Juvenile Regional Services, Inc., in Louisiana, 50 percent of the gay youth picked up for nonviolent offenses in Louisiana in 2009 were sent to jail to await trial, while less than 10 percent of straight kids were. &#8220;Once a child is detained, the judge assumes there&#8217;s a reason you can&#8217;t go home,&#8221; says Dr. Marty Beyer, a juvenile justice specialist. &#8220;A kid coming into court wearing handcuffs and shackles versus a kid coming in with his parents—it makes a very different impression.&#8221;</p></blockquote>
<p>Queer and transgender youth are treated differently by the justice system before they are even tried and convicted. Once incarcerated, they face brutal violence. From beatings to victim blaming to bigoted slurs from guards, queer and transgender youth are regularly abused in juvenile corrections facilities.</p>
<p>Some of America&#8217;s youth incarceration problem begins in the schools. &#8220;Zero-tolerance&#8221; policies in public schools criminalize violating school rules, producing what is often called the <a href="https://www.aclu.org/school-prison-pipeline" target="_blank">school to prison pipeline</a>. The racially disparate impacts of this school to prison pipeline are well documented, and they often criminalize minor infractions.</p>
<p>Outside of school, youth are often directly targeted by police thanks to ageist laws like <a href="http://reason.com/blog/2014/05/14/the-social-worker-with-a-gun" target="_blank">curfews</a>. Laws often restrict freedom of movement and bodily autonomy for youth, and justify this coercion through condescending and paternalistic platitudes. In a particularly appalling <a href="http://www.autostraddle.com/incarcerated-trans-teen-girl-is-still-in-adult-prison-despite-being-charged-with-no-crimes-237848/" target="_blank">recent case</a> of paternalism sending youth to prison, a transgender girl was sent to an adult prison without charges or trial, because the state had power over her as her &#8220;guardian.&#8221; The desire to protect youth provides ideological cover for the state to treat them even more abusively than it treats adults.</p>
<p>The American state is uniquely punitive in some respects. According to <a href="http://www.amnestyusa.org/our-work/issues/children-s-rights/juvenile-life-without-parole" target="_blank">Amnesty International</a>, &#8220;The United States is believed to stand alone in sentencing children to life without parole.&#8221; Amnesty identifies &#8220;at least 2,500 people in the US serving life imprisonment without the possibility of parole for crimes committed when they were under 18 years old.&#8221; Before turning 18, these youth were permanently separated from society, permanently sent to violent hellholes.</p>
<p>The essence of imprisonment as we know it is throwing away a human being, treating them as <a href="http://bcrw.barnard.edu/event/no-one-is-disposable-everyday-practices-of-prison-abolition/" target="_blank">disposable</a>. Prisoners are subjected to violence, abuse, and torture. They are held in austere and inhumane conditions. And they are kept out of the general public&#8217;s sight. They are punished rather than being made to make amends or provide restitution to victims. It&#8217;s bad enough to treat any human being this way. To treat children this way is unconscionable. Stop caging kids.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=27371&amp;md5=c569a09ef675c776eed54aa3887cf659" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/27371/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F27371&amp;language=en_GB&amp;category=text&amp;title=The+Weekly+Abolitionist%3A+Stop+Caging+Kids&amp;description=This+week+marks+the+2014+National+Week+of+Action+Against+Incarcerating+Youth.+Across+the+country%2C+actions+will+be+held+to+protest+everything+from+the+criminalization+of+queer+and+disabled+youth...&amp;tags=Action%2Cactivism%2Cageism%2Cchildren%2Cchildren%27s+rights%2Ccivil+liberties%2Chuman+rights%2Cjustice%2Claw%2CNorth+America%2Cpolice+state%2Cprison+abolition%2Cprison+state%2Crape%2Csexual+abuse%2Ctorture%2Cunited+states%2Cyouth+rights%2Cblog" type="text/html" />
	</item>
		<item>
		<title>La Sicurezza su Internet È Responsabilità Nostra</title>
		<link>http://c4ss.org/content/26406</link>
		<comments>http://c4ss.org/content/26406#comments</comments>
		<pubDate>Thu, 17 Apr 2014 11:00:47 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Italian]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26406</guid>
		<description><![CDATA[Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti. Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e...]]></description>
				<content:encoded><![CDATA[<p>Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti.</p>
<p>Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e polizia segreta raccolgono informazioni su ogni attività potenzialmente sovversiva. Nell’era di internet e dello spionaggio governativo, le agenzie di spionaggio raccolgono informazioni su di noi – per lo più offerta ingenuamente da noi stessi tramite i <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html">social media</a> – a livelli che avrebbero reso verde d’invidia l’NKVD di Stalin. Quando finirà tutto ciò non lo sa nessuno; intanto, meno informazioni utili si possono raccogliere e meno efficace è il controllo dello stato su di noi. Per quanto riguarda gli attivisti nel primo mondo, forme di comunicazione private o anonime potrebbe la soluzione ideale per evitare <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters">l’arresto preventivo</a>. In posti come la Siria, poi, diventa una <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html">questione di vita o di morte</a>.</p>
<p>All’inizio speravo che compagnie come Google sarebbero venute in soccorso implementando potenti sistemi di criptografia; purtroppo sembra sempre più improbabile che imprese in mano agli azionisti e intrecciate con il governo possano offrire servizi sicuri efficacemente. Se è vero che queste compagnie, che fanno grossi profitti e spendono grosse somme in attività lobbistiche, sono le meglio posizionate nella lotta contro lo spionaggio di stato, è anche vero che sono quelle che hanno più da perdere se non tirano dritto.</p>
<p>Lavabit di Ladar Levison <i>era</i> un servizio di email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/">quasi sicuro</a>. Ad agosto Levison lo ha chiuso <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png">citando interferenze e minacce da parte del governo</a>. Secondo speculazioni terze, Levison aveva ricevuto una lettera della Nsa che chiedeva di ottenere dati sui clienti, probabilmente Edward Snowden. Recentemente si è scoperto che un giudice aveva emesso un ordine rivolto ad ottenere la chiave d’accesso SSL dei servizi offerti da Lavabit. Questa chiave permette una connessione criptata sicura tra utente e server. Il suo possesso dà la possibilità al governo di accedere in tempo reale alle informazioni mandate al sito dagli utenti. Questo a sua volta avrebbe reso possibile il rastrellamento delle credenziali e l’accesso alle email criptate dei 400.000 utenti di Lavabit.</p>
<p>Con suo grande merito, Ladar Levison decise di chiudere Lavabit, negando l’accesso all’archivio in cui sono custoditi i messaggi dei suoi clienti. Il suo rifiuto di principio è un’eccezione. Levison non aveva azionisti a cui rendere conto; solo se stesso e i suoi clienti. Non possiamo aspettarci che grosse imprese come Google, che finge di stare dalla nostra parte mentre in realtà cerca di <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">favorire l’intrusione del governo</a>, decidano di sfidare realmente lo stato. Altri, come la Microsoft, sembrano <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasti di collaborare con l’NSA</a> e altre agenzie a tre lettere.</p>
<p>Cosa significa per noi? Siamo condannati ad abbassare la testa? No! Dobbiamo prendere la cosa nelle nostre mani. Ci sono molti sistemi di criptografia gratis, <a href="http://https://it.wikipedia.org/wiki/Open_source">open source</a> e a <a href="http://https://it.wikipedia.org/wiki/Standard_aperto">standard aperto</a>. Da quel che sappiamo, l’NSA è riuscita a penetrare i sistemi criptografati solo tramite la <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercizione</a> e la <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">sovversione</a>, non decodificando il codice. Molto probabilmente, <a href="http://https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">possiamo ancora fidarci della matematica</a>.</p>
<p>Quando un progetto è open source, il suo codice è disponibile allo scrutinio generale. Possiamo esaminarlo, possiamo sapere esattamente come fa quello che fa. La maggior parte di noi non ha le conoscenze tecniche per esaminare il codice di un programma prima di compilarlo, ma ci sono esperti e accademici fidati che <a href="http://https://www.eff.org/press/archives/2008/02/21-0">possono farlo e lo fanno per noi</a>. Così possiamo conoscere i potenziali punti deboli del software di criptografia e capire i limiti delle sua capacità. Quando comunichiamo usando <a href="http://https://it.wikipedia.org/wiki/Pretty_Good_Privacy">PGP</a>, ad esempio, usiamo uno standard aperto. Non abbiamo bisogno di affidare i nostri messaggi ad una compagnia che magari è stata costretta dal governo a compromettere la nostra riservatezza. Con PGP la chiave d’accesso è nelle tue mani; nessun altro può essere costretto a rivelarla. Il <a href="http://c4ss.org/content/19091">progetto Tor</a>, più complesso, non è altrettanto ben definito. Per via della sua natura distribuita, le possibilità di abuso aumentano, ma il progetto è open source e questi possibili abusi sono documentati, e dunque possiamo studiarne i limiti.</p>
<p>La conclusione è che siamo tutti dentro. Se decidiamo di servirci dei servizi offerti dalle grosse compagnie, dobbiamo tenere conto del fatto che potrebbero comprometterci da un momento all’altro: non con la forza bruta ma con la coercizione. Con il <a href="http://https://it.wikipedia.org/wiki/Software_proprietario">software proprietario</a> non c’è modo di valutare e prendere per buone le dichiarazioni dello sviluppatore. E quando usiamo un software open source dobbiamo renderci conto delle sue limitazioni e usarlo di conseguenza.</p>
<p>La sicurezza su internet è responsabilità nostra.</p>
<p><a href="http://pulgarias.wordpress.com/" target="_blank">Traduzione di Enrico Sanna</a>.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26406&amp;md5=684f2227bf74516d3345d01fff66cdc8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26406/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26406&amp;language=en_GB&amp;category=text&amp;title=La+Sicurezza+su+Internet+%C3%88+Responsabilit%C3%A0+Nostra&amp;description=Man+mano+che+apprendiamo+altri+dettagli+sullo+spionaggio+governativo%2C+appare+sempre+pi%C3%B9+sconsiderato+affidare+la+nostra+sicurezza+a+terze+parti.+Lo+stato+vuole+informazioni+sicure+sui+suoi+soggetti.+Fin+dal...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Weekly Abolitionist: A Good Week For Abolition</title>
		<link>http://c4ss.org/content/24509</link>
		<comments>http://c4ss.org/content/24509#comments</comments>
		<pubDate>Tue, 11 Feb 2014 00:00:26 +0000</pubDate>
		<dc:creator><![CDATA[Nathan Goodman]]></dc:creator>
				<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[The Weekly Abolitionist]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[colonialism]]></category>
		<category><![CDATA[prison]]></category>
		<category><![CDATA[prison abolition]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=24509</guid>
		<description><![CDATA[Last Friday was an exciting day for me as a prison abolitionist. On Friday afternoon, I listened to an absolutely stellar discussion with Reina Gossett and Dean Spade of the Sylvia Rivera Law Project on prison abolition. The highlights were too numerous to discuss them all here, but I&#8217;ll mention a few. One really excellent...]]></description>
				<content:encoded><![CDATA[<p>Last Friday was an exciting day for me as a prison abolitionist. On Friday afternoon, I listened to an absolutely stellar discussion with Reina Gossett and Dean Spade of the Sylvia Rivera Law Project on prison abolition. The highlights were too numerous to discuss them all here, but I&#8217;ll mention a few.</p>
<p>One really excellent point Dean Spade made essentially concerned a knowledge problem that impacts attempts at broad prison policy reform. Spade has worked as an attorney for many prisoners, particularly queer and transgender prisoners, and he pointed out that for many of them the particular prison conditions that would make their stay more survivable varied substantially. This means that seeking top down prison reforms is not likely to benefit the human rights of all oppressed and brutalized prisoners, and that therefore we should advocate for the needs expressed by individual prisoners while also seeking to abolish the system that cages and brutalizes them. At another point in the discussion Reina Gossett mentioned the important work that a group called <a href="http://t.co/4eQ8ZI3pTh%20">Creative Interventions</a> does as one example of how we intervene to stop violence without the state. The full discussion, as well as four great videos with Gossett and Spade that preceded it, is available <a href="http://bcrw.barnard.edu/event/no-one-is-disposable-everyday-practices-of-prison-abolition/">here</a>. I highly recommend watching the entire thing.</p>
<p>Towards the end of the conversation, Dean mentioned some resources for those who want to learn more about prison abolition. He recommended Angela Davis&#8217;s excellent book <a href="http://books.google.com/books/about/Are_Prisons_Obsolete.html?id=lYqtPcL9Q4AC">Are Prisons Obsolete</a>, as well as <a href="http://www.generationfive.org/wp-content/uploads/2013/07/G5_Toward_Transformative_Justice-Document.pdf">Towards Transformative Justice</a> [pdf], which was developed by activists with the group Generation Five. He also mentioned the organizations <a href="http://www.blackandpink.org/">Black and Pink</a>, the <a href="http://alp.org/">Audre Lorde Project</a> and their Safe OUTside the System Collective, <a href="http://www.fiercenyc.org/">FIERCE</a>, <a href="http://www.nooneisillegal.org/">No One Is Illegal</a>, and the <a href="http://ywepchicago.wordpress.com/">Young Women&#8217;s Empowerment Project</a>, all of which do work around prison abolition.</p>
<p>So that was Friday afternoon for me. On Friday evening I attended a presentation by Amanda Lickers, a Haudenosaunee woman who has been active in fighting against corporations that attempt to engage in fossil fuel extraction on indigenous land. Her website, <a href="http://reclaimturtleisland.com/">Reclaim Turtle Island</a>, documents the indigenous movements that are resisting this ongoing land theft and colonialism. Amanda has worked with <a href="http://www.submedia.tv/">submedia.tv</a> to produce a variety of videos on these grassroots movements and the police repression directed against them. She is also a prison abolitionist who has done some excellent prisoner support work, and throughout her talk she made many important points that should be relevant to prison abolitionists. For example, the colonialist roots of many governments&#8217; policing and prison systems. She showed <a href="http://www.submedia.tv/stimulator/2013/10/20/showdown-at-highway-134/">footage</a> documenting the Royal Colonial Mounted Police&#8217;s brutal attack on indigenous activists who were protecting their land from companies seeking to engage in fracking. She further noted that the RCMP is an institution founded to repress natives and secure colonial outposts. She also pointed out that the Canadian state&#8217;s laws criminalizing sex workers, some of which were recently struck down in court, were <a href="http://kwetoday.com/2013/12/21/bedfordscc-my-thoughts/">rooted in the Indian Act</a>. These moralist assaults on bodily autonomy and free association are rooted in colonialism. Moreover, Amanda pointed us to the cases of multiple indigenous activists who have been held in Canadian prisons, often in solitary confinement, for standing against land theft. This belies the common claims that prisons are necessary to protect us from theft. To the contrary, they often are used to repress those who seek to defend their lands from theft by powerful corporations and governments. <a href="http://reclaimturtleisland.com/2013/10/30/support-jailed-land-defenders-solidarity-w-mikmaq-warriors/">This post</a> at Reclaim Turtle Island provides one example of political prisoners being abused by the Canadian state for defending their land. Reclaim Turtle Island is currently doing a <a href="http://www.indiegogo.com/projects/reclaim-turtle-island">fundraiser</a> on Indiegogo to support their ongoing work against colonialist land theft by extractive industries.</p>
<p>Finally, I would be remiss if I didn&#8217;t mention the great news we had this week about Hank Magee. Police violently raided Magee&#8217;s home on suspicion that he was growing marijuana. Understandably, Hank Magee defended his home, and in the process a police officer was killed. Prosecutors attempted to charge Magee with capital murder, but last week a grand jury refused to indict. While Hank Magee still faces marijuana charges, he is free from the state&#8217;s cages for now. He&#8217;s with his family. My friend Jesse Fruhwirth <a href="http://ut4ps.tumblr.com/post/75827512660/rejoice-hank-magee-will-not-stand-trial-for-death-of">reported</a> on this story at his excellent blog <a href="http://ut4ps.tumblr.com/">Utah 4Ps</a>. Radley Balko has a <a href="http://www.washingtonpost.com/news/opinions/wp/2014/02/10/some-justice-in-texas-the-raid-on-henry-magee/">blog</a> up on the case at the Washington Post. And Jonathan Carp wrote up an <a href="http://c4ss.org/content/24410">op-ed</a> related to the case here at the Center for a Stateless Society.</p>
<p>I&#8217;m overjoyed that Hank&#8217;s free from prison walls. And I&#8217;m even happier to know that so many great people are acting to abolish the prison state itself.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=24509&amp;md5=ed50dbfe02f02e8d1ca8b6bce6294ef1" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/24509/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F24509&amp;language=en_GB&amp;category=text&amp;title=The+Weekly+Abolitionist%3A+A+Good+Week+For+Abolition&amp;description=Last+Friday+was+an+exciting+day+for+me+as+a+prison+abolitionist.+On+Friday+afternoon%2C+I+listened+to+an+absolutely+stellar+discussion+with+Reina+Gossett+and+Dean+Spade+of+the...&amp;tags=activism%2Ccolonialism%2Cprison%2Cprison+abolition%2Cblog" type="text/html" />
	</item>
		<item>
		<title>We Are All Agorists Now</title>
		<link>http://c4ss.org/content/23585</link>
		<comments>http://c4ss.org/content/23585#comments</comments>
		<pubDate>Fri, 31 Jan 2014 21:00:17 +0000</pubDate>
		<dc:creator><![CDATA[Grant A. Mincy]]></dc:creator>
				<category><![CDATA[Feature Articles]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[aggression]]></category>
		<category><![CDATA[agorism]]></category>
		<category><![CDATA[Ben Bernanke]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Central Bank]]></category>
		<category><![CDATA[Class Struggle]]></category>
		<category><![CDATA[corporate state]]></category>
		<category><![CDATA[counter-economics]]></category>
		<category><![CDATA[counter-power]]></category>
		<category><![CDATA[economics]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[free market]]></category>
		<category><![CDATA[Global Financial Crisis]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Janet Yellen]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[Too Big To Fail]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=23585</guid>
		<description><![CDATA[Transfer of Power Arguably the most powerful person in the United States (even rivaling the POTUS), Ben S. Bernanke, has left the Federal Reserve. Since 2006 he has sought to make the economy his marionette. Fed policies, under his direction, worked to manage a collapsed housing market, busted mortgage industry and the 2008 global financial crisis &#8211;...]]></description>
				<content:encoded><![CDATA[<p><strong>Transfer of Power</strong></p>
<p>Arguably the most powerful person in the United States (even rivaling the POTUS), <a title="Ben Bernanke" href="http://en.wikipedia.org/wiki/Ben_Bernanke">Ben S. Bernanke</a>, <a title="Ben Bernanke Leaves the Fed" href="http://www.bostonglobe.com/business/2014/01/05/bernanke-legacy-yet-determined/brBKsUvOhOW96sAmPIGUyL/story.html">has left t</a><a title="Ben Bernanke leaving the Fed" href="http://www.bostonglobe.com/business/2014/01/05/bernanke-legacy-yet-determined/brBKsUvOhOW96sAmPIGUyL/story.html">he Federal Reserve</a>. Since 2006 he has sought to make the economy his marionette. Fed policies, under his direction, worked to manage a <a title="United States Housing Bubble" href="http://en.wikipedia.org/wiki/United_States_housing_bubble">collapsed housing market</a>, <a title="Mortgage Industry of the United States" href="http://en.wikipedia.org/wiki/Mortgage_industry_of_the_United_States">busted mortgage industry</a> and the 2008 <a title="Global Financial Crisis" href="http://www.globalissues.org/article/768/global-financial-crisis">global financial crisis</a> &#8211; a manufactured crisis of the command and control mentality over the &#8220;free&#8221; market. Bernanke engineered perhaps the largest redistribution of wealth in American (if not world) history with <a title="Ben Bernanke Defends Bank Bailouts" href="http://www.politico.com/news/stories/0910/41698.html">massive bailouts</a> given to the financial sector &#8211; money stolen from the labor of millions and given to the &#8220;too big to fail&#8221; economic elite. Aside from the initial 700 billion dollar bailout, a Federal Reserve audit revealed the central bank provided a whopping <a title="The Fed Audit" href="http://www.sanders.senate.gov/newsroom/press-releases/the-fed-audit">16 trillion</a> in secret aid to support the corporate state apparatus. Bernanke has released his reign, transferring power to the first woman in United States history to head the Fed: <a title="Yellen Wins Backing of Senators to Lead Fed" href="http://www.nytimes.com/2014/01/07/business/economy/Yellen-Senate-Vote.html?hp&amp;_r=1">Janet Yellen</a>.</p>
<p>Yellen was confirmed by the United States Senate on January 6, 2014, further committing Washington to even more Keynesian policies from the central bank. As a Fed official, Yellen was a great advocate of keeping interest rates artificially close to zero, increased government spending, and the controversial <a title="Quantitative Easing: CNBC Explains" href="http://www.cnbc.com/id/43268061">Quantitive Easing</a> measures sought by the Fed to direct the American economy. Her rise to power will continue to favor the corporate state, even with <a title="Rumors of growth" href="http://www.economist.com/news/united-states/21593423-janet-yellen-prepares-take-over-fed-omens-are-good-year">rumors</a> of economic growth.</p>
<p>There have been numerous libertarian/Libertarian arguments against the central bank. It is not my wish to re-invent the wheel. Most of these arguments, however, stem from the political right &#8211; most notably <a title="End the Fed" href="http://en.wikipedia.org/wiki/End_the_Fed">Ron Paul</a> and even greater arguments from his mentor, <a title="The Case Against the Fed" href="http://mises.org/books/fed.pdf">Murray Rothbard</a>. There is surprisingly <em>little</em> noise from the <em>traditional</em> left &#8211; <a title="“The Distinctiveness of Left-Libertarianism” by Gary Chartier on C4SS Media" href="http://c4ss.org/content/17493">the libertarian or market left </a>- about the central bank, however. Even the famous American leftist and anarcho-syndicalist/libertarian-socialist <a title="American Anarchist" href="http://www.theamericanconservative.com/articles/american-anarchist/">Noam Chomsky</a> supports <a title="Noam Chomsky on &quot;The Federal Reserve&quot; (2013)" href="http://http://www.youtube.com/watch?v=OBQU8aaW90o">central banking</a>. Rather than re-invent the wheel, with this essay I hope to add to the small but sound left-libertarian opposition to the Federal Reserve.</p>
<p><strong>A Brief History of Central Banking in the United States</strong></p>
<p>Alexander Hamilton, the first Secretary of the Treasury, was among the first American politicians to argue for, and help develop, a central bank. Hamilton thought it would be irresponsible to place much democratic or economic control in the hands of the American populace. Hamilton and other federalists believed the country should be ruled by the economic ruling class – the elite, the educated and the privileged. Federalist John Jay put it as bluntly as possible: “Those who own the country ought to govern it.” Hamilton and company favored a strong national government, a broad interpretation of the constitution and put national unity above individualism and states rights. Their economic model, of course, was centrally planned with strict regulation of state economies. From this mindset the first central bank was born in 1791.</p>
<p>Hamilton&#8217;s bank, the <a title="First Bank of the United States" href="http://en.wikipedia.org/wiki/First_Bank_of_the_United_States">First Bank of the United States</a>, was kept out of the public arena and operated as a private financial institution. Hamilton&#8217;s main argument for the First Bank was that it would help repay the new nations war debt (Morgan 2012). Throughout its existence, however, the bank was met with popular backlash. Objections to the Federal Reserve today echo what was argued against the First Bank: It served moneyed interests (northern corporations), was a threat to property rights and restricted real economic growth (Morgan 2012). Some politicians of the time, notably Thomas Jefferson and James Madison, argued the bank was unconstitutional, that only congress, not a private bank, had the power to tax and print money. In 1811 the Bank was deconstructed as congress voted not to renew its charter (Morgan 2012).</p>
<p>In 1812 the United States found itself in the midst of another <a title="War of 1812" href="http://en.wikipedia.org/wiki/War_of_1812">war</a> and more national debt.  To deal with a growing financial crisis, Congress voted to charter the (larger) <a title="Second Bank of the United States" href="http://en.wikipedia.org/wiki/Second_Bank_of_the_United_States">Second Bank of the United States</a>. The Second Bank, at the moment of inception, was poorly managed (Scur 1960). A year and a half after it opened it almost collapsed, and would have, if not for <a title="Langdon Cheves" href="http://en.wikipedia.org/wiki/Langdon_Cheves">Langdon Cheves</a>. Cheves was the second president of the new central bank and effectively administered its operations. Still, popular sentiment about such a powerful, private institution raised concerns about the Second Banks existence (Scur 1960). This sentiment, and Andrew Jackson&#8217;s political clout, would ultimately dissolve this Second Bank in 1836.</p>
<p>The United States was free of central banking until yet another major war erupted. <a title="American Civil War" href="http://en.wikipedia.org/wiki/American_Civil_War">The Civil War</a>, and the need to pay for it, again began the quest for a National Bank. In 1863 the &#8220;<a title="National Banking System" href="http://en.wikipedia.org/wiki/National_Bank_Act">national banking system</a>&#8221; (not a central bank) was developed (MFED 2013). The new banking system, with a national charter, dictated that banks had to issue government-printed bills for their own notes, these notes had to be backed by federal bonds &#8211; the war effort was funded (Sylla 1969). In 1865, as the war waged on between the industrialized North and the agricultural South, state bank notes were taxed out of existence &#8211; a uniform national currency was established in the United States for the first time (MFED 2013).</p>
<p>With the civil war financed and &#8220;won&#8221; by the Union, and with a uniform currency, the United States experienced a <a href="http://www.minneapolisfed.org/community_education/student/centralbankhistory/glossary.cfm#bp">bank panic</a> in every decade afterward (MFED 2013), ah,&#8221;<a title="The Gilded Age" href="http://en.wikipedia.org/wiki/Gilded_Age">The Gilded Age</a>.&#8221; Economic panic began in 1873 due to runs on the <a title="Free banking" href="http://en.wikipedia.org/wiki/Free_banking">free banking system</a>. A &#8220;<a href="http://www.minneapolisfed.org/community_education/student/centralbankhistory/glossary.cfm#run">run</a>&#8221; occurs when a large number of customers pull their money from banks (MFED 2013). The runs would lead to more and more folks withdrawing their money, causing a system wide economic panic. <a title="Panic of 1893" href="http://en.wikipedia.org/wiki/Panic_of_1893">With the depression of 1893</a>, the <a title="Spanish-American War" href="http://en.wikipedia.org/wiki/Spanish%E2%80%93American_War">Spanish-American War</a> of 1898 and the deep <a title="Panic of 1907" href="http://en.wikipedia.org/wiki/Panic_of_1907">recession of 1907</a>, banking moguls and the United States Government again sought the establishment of a central bank (Sylla 1969), as opposed to letting the market equilibrate.</p>
<p>What followed was a series of Congressional acts that led to the establishment of the Federal Reserve Bank. <a title="Aldrich-Vreeland Act" href="http://en.wikipedia.org/wiki/Aldrich%E2%80%93Vreeland_Act">The Aldrich-Vreeland Act of 1908</a> established the <a title="National Monetary Commision" href="http://en.wikipedia.org/wiki/National_Monetary_Commission">National Monetary Commission</a>, charged with managing the nations finances, which called for government intervention in the economy, via currency development, during times of financial crisis (MFED 2013). The election of Democrat <a title="Woodrow Wilson" href="http://en.wikipedia.org/wiki/Woodrow_Wilson">Woodrow Wilson</a> brought with it the <a title="Federal Reserve Act" href="http://en.wikipedia.org/wiki/Federal_Reserve_Act">Federal Reserve Act of 1913</a>, and American involvement in <a title="World War I" href="http://en.wikipedia.org/wiki/Federal_Reserve_Act">World War I</a>. The <a title="Federal Reserve System" href="http://www.federalreserve.gov/otherfrb.htm">Federal Reserve System</a> was designed to be a government (not public) institution. The new central banking system was to work closely with the United States Treasury.</p>
<p>What followed the establishment of the Federal Reserve, after WWI, was the <a title="Roaring 20's" href="http://en.wikipedia.org/wiki/Roaring_Twenties">roaring twenties</a>, <a title="Economic Boom in the 1920's" href="http://www.bbc.co.uk/schools/gcsebitesize/history/mwh/usa/boomrev1.shtml">further industrialization</a>, the <a title="Great Depression" href="http://en.wikipedia.org/wiki/Great_Depression">Great Depression</a>, <a title="World War II" href="http://en.wikipedia.org/wiki/World_War_II">World War II</a>, <a title="The New Deal" href="http://en.wikipedia.org/wiki/New_Deal">The New Deal</a>, the rise of <a title="Keynesian Economics" href="http://en.wikipedia.org/wiki/Keynesian_economics">Keynesianism</a>, explicit <a title="Fiat Money" href="http://en.wikipedia.org/wiki/Fiat_money">fiat currency</a>, <a title="List of recessions" href="http://en.wikipedia.org/wiki/List_of_recessions_in_the_United_States">multiple recessions</a>, the <a title="Korean War" href="http://en.wikipedia.org/wiki/Korean_War">Korean War</a>, the <a title="Vietnam War" href="http://en.wikipedia.org/wiki/Vietnam_War">Vietnam War</a>, multiple <a title="Military Interventions" href="http://en.wikipedia.org/wiki/Timeline_of_United_States_military_operations">military interventions</a> overseas, <a title="Neo-Classical Economics" href="http://en.wikipedia.org/wiki/Neoliberalism">neoliberalism</a>, the rise, fall and decay of the <a title="Middle Class America" href="http://www.liberalamerica.org/2013/10/24/rise-fall-middle-class-america/">middle class</a>, <a title="Boom and Bust" href="http://en.wikipedia.org/wiki/Boom_and_bust">booms and busts</a>, <a title="Economic Bubbles" href="http://en.wikipedia.org/wiki/Economic_bubble">economic bubbles</a>, <a title="Artificial Scarcity And Artificial Abundance: A One-Two Punch" href="http://c4ss.org/content/23071">artificial scarcity, artificial abundance</a> and much more. In the wake of such history, the Federal Reserve has operated independently of the political process (MFED 2013). The Fed has become an independent centralized bank that is utilized to manage, and some would argue control, the United States economy.</p>
<p>The history of central banking is wrought with military conflict and depressed markets. States have long ignored moral objections to war, but economic restrictions have often halted violence. The printing press, however, allows governments to side step these restrictions. The century of the Fed has been a century of perpetual warfare. As <a title="Randolph Bourne" href="http://en.wikipedia.org/wiki/Randolph_Bourne">Randolph Bourne</a> <a title="War is the Health of the State" href="http://www.antiwar.com/bourne.php">wrote</a>, shortly after the creation of the Federal Reserve, &#8220;war is the health of the state.&#8221; Central banking, Keynesian policies, and states are indeed dependent on <a title="Jingoism" href="http://en.wikipedia.org/wiki/Jingoism">jingoism</a> and war. For in war governments flourish &#8211; allegiance to state blossoms, class struggle is stilled, spending keeps flowing, and worst of all, human beings, <a title="List of wars and anthropogenic disasters by death toll" href="http://en.wikipedia.org/wiki/List_of_wars_and_anthropogenic_disasters_by_death_toll">millions of us</a>, die. Liberty is fundamentally opposed to this aggression, as noted <a title="libertarians and war" href="http://libertarianstandard.com/2013/03/20/libertarians-and-war-a-bibliographical-essay/">here</a>, by <a title="Anthony Gregory" href="http://en.wikipedia.org/wiki/Anthony_Gregory">Anthony Gregory</a>.</p>
<p>Sadly, as attributed to Nixon: &#8220;<a title="We Are All Keynesians Now" href="http://en.wikipedia.org/wiki/We_are_all_Keynesians_now">We are all Keynesians now.</a>&#8221;</p>
<p><strong>Liberty and the &#8220;Progressive Era&#8221;</strong></p>
<p>United States history, like all history, can be defined as a <a title="Anatomy of the State" href="http://mises.org/document/1011">race between social power and state power</a>. It is outside the realm of this essay to describe all of the liberation movements that, in some context, sought the liberty of the true market form. Rather than try I will focus on the <a title="Progressive Era" href="http://en.wikipedia.org/wiki/Progressive_Era">Progressive Era</a>, which birthed the Federal Reserve.</p>
<p>The end of the Gilded Age was a period of great turmoil. It was good for business, the political class and those with a monopoly on capital, but the working class, people of color, women, political feminists, labor organizers, etc, realized they could not count on the national government to take their concerns, rights or liberty seriously. The Progressive Era did begin the <a title="Age of Refrom" href="http://en.wikipedia.org/wiki/The_Age_of_Reform">Age of Reform</a>, but this reform was not enacted to elevate the populace. Instead, reform was used to quiet popular uprisings, democratic social movements, and civil liberties &#8211; it was not intended to make fundamental changes to the established order (Zinn 2003).</p>
<p>The era has been termed &#8220;Progressive&#8221; because of the sheer number of laws that were passed. <a title="Upton Sinclair" href="http://en.wikipedia.org/wiki/Upton_Sinclair">Upton Sinclair</a>&#8216;s &#8220;<a title="The Jungle" href="http://en.wikipedia.org/wiki/The_Jungle">The Jungle</a>&#8221; sparked a <a title="Progressive Era Labor Movement" href="http://www.sparknotes.com/history/american/gildedage/section3.rhtml">labor movement</a> that accomplished passing the <a title="Meat Inspection Act" href="http://en.wikipedia.org/wiki/Federal_Meat_Inspection_Act">Meat Inspection Act</a>, social movements engaged the system to pass the <a title="The Hepburn Act" href="http://en.wikipedia.org/wiki/Hepburn_Act">Hepburn Act </a>which supported labor in railroads and pipelines (Zinn 2003), to name just a couple. Particular to the Federal Reserve, Woodrow Wilson&#8217;s presidency established the <a title="Federal Trade Commission" href="http://www.ftc.gov/">Federal Trade Commission</a> and the <a title="The Federal Reserve" href="http://en.wikipedia.org/wiki/Federal_Reserve_Bank">Central Bank</a>(s) itself. This was polished as progressive reform to control the growth of monopolies and to regulate the country&#8217;s money and banking system. Neither happened, in fact, power and influence of Wall Street only began to grow amidst giant surges of patriotism due to rising conflicts overseas. As noted by Emma Goldman (<a title="PATRIOTISM  A MENACE TO LIBERTY" href="http://dwardmac.pitzer.edu/Anarchist_Archives/goldman/aando/patriotism.html">on patriotism and allegiance to government</a>):</p>
<blockquote><p>But when the smoke was over, the dead buried, and the cost of the war came back to the people in an increase in the price of commodities and rent-that is, when we sobered up from our patriotic spree-it suddenly dawned on us  &#8230; that the lives, blood, and money of the American people were used to protect the interests of the American capitalists.</p></blockquote>
<p>Due to the work of early American libertarians such as <a title="Josiah Warren" href="http://en.wikipedia.org/wiki/Josiah_Warren">Josiah Warren</a>, <a title="Benjamin Tucker" href="http://en.wikipedia.org/wiki/Benjamin_Tucker">Benjamin Tucker</a>, <a title="Voltarine de Cleyre" href="http://en.wikipedia.org/wiki/Voltairine_de_Cleyre">Voltairine de Cleyre</a>, <a title="Emma Goldman" href="http://en.wikipedia.org/wiki/Emma_Goldman">Emma Goldman</a> and others, movements developed that questioned the concentration of power. The labor movement began picking up steam and the marginalized voices in society were becoming amplified. It is true that working people benefited from some of the reforms of the Progressive Era &#8211; but the reforms protected the political and economic class from working people, giving just enough to stem off a major rebellion (Zinn 2003). A middle class cushion was manufactured to stem off class conflict as <a title="Howard Zinn" href="http://en.wikipedia.org/wiki/Howard_Zinn">Howard Zinn</a> (2003) explains:</p>
<blockquote><p>Fundamental conditions did not change, however, for the vast majority of tenant farmers, factory workers, slum dwellers, miners, farm laborers, working men and women, black and white. <a title="Robert Wiebe" href="http://en.wikipedia.org/wiki/Robert_Wiebe">Robert Wiebe</a> sees in the Progressive movement an attempt by the system to adjust to changing conditions in order to achieve more stability. &#8216;Through rules with impersonal sanctions, it sought continuity and predictability in a world of endless change. It assigned far greater power to government . .. and it encouraged the centralization of authority.&#8217; <a title="Harold Faulkner" href="http://en.wikipedia.org/wiki/Harold_Falkner">Harold Faulkner</a> concluded that this new emphasis on strong government was for the benefit of &#8216;the most powerful economic groups.&#8217;</p></blockquote>
<p>With the help of the Federal Reserve, Wall Street was able to take firm control of the political system. The market, as it existed, was not able to disperse protests at the grassroots level (Zinn 2003). The economic ruling class championed these reforms, to stabilize the state capitalist system in a time of uncertainty (Zinn 2003). These reforms gave rise to the corporation state that exists today. As noted by individualist anarchist Benjamin Tucker: &#8220;Laissez Faire was very good sauce for the goose, labor, but was very poor sauce for the gander, capital.&#8221;</p>
<p>Social power is still racing against state power.</p>
<p><strong>The Liberated Market</strong></p>
<p>Enter, Janet Yellen, a grand proponent of quantitative easing in a depressed economy. The Federal Reserve, under her leadership, will continue to serve the politically connected and do very little for the average American. Even <a title="Meet Andrew Huszar" href="http://blogs.marketwatch.com/capitolreport/2013/11/14/meet-andrew-huszar-the-ex-fed-insider-who-hates-qe/">Andrew Huszar</a>, an ex-Fed official, in a <a title="Andrew Huszar: Confessions of a Quantitative Easer" href="http://online.wsj.com/news/articles/SB10001424052702303763804579183680751473884">piece for the Wall Street journal</a> described the programs Yellen champions as the &#8220;greatest backdoor Wall Street bailout of all time.”</p>
<p>For all the discussion in the United States today about the proper function and role of our federal government, how to manage the economy, how to <a title="Obama Takes on War on Poverty" href="http://www.euronews.com/2014/01/08/the-torch-has-passed-obama-takes-over-war-on-poverty-from-lbj/">battle poverty</a>, how to create jobs and so on and so on, what seems to be missing from national discussion is the <a title="The Resurgent Market" href="http://c4ss.org/content/23362">true beauty of markets</a>. A banking system, or piece of economic legislation, cannot fix the economy.</p>
<p>Economic systems are developed by the spontaneous order of society. The market is a product of inclined labor, derived from the dreams, aspirations, desires, passions and activities of free people. The market encompasses our places of exchange, but also the rest of human labor &#8211; social movements, federations, institutions, decision-making and all of human activity. This behavior cannot be managed from a centralized authority. The work of human beings, our inclined, creative labor, cannot be directed &#8211; it can only be realized in liberty.  The liberated market mechanism is the only cure for our past, current and future ills.</p>
<p>Today, in the era of <a title="too big to fail" href="http://en.wikipedia.org/wiki/Too_big_to_fail">too big to fail</a>, it is corporate monopolies and financial institutions that benefit from the public. As George W. Bush <a title="G. W. Bush Quote" href="http://www.youtube.com/watch?v=Tmi8cJG0BJo">said</a>: “I have abandoned free market principles to save the free market.” What he meant was: “I have again exploited the middle and working classes to serve our economic ruling class.” While Bernanke, with the power of the Federal Reserve, was redistributing wealth to the upper tiers of society, organized people, from a diverse history of social movements, began developing the tools for market liberation.</p>
<p>The true market form, how people engage their labor, exists outside of the state.  The market left speaks of exchange and labor in human terms. The liberated market allows for economic, social and environmental justice. Liberation champions a society that allows the free flow of information, science and progress, democratic values, and the fruits of  labor so these principles can spread without restriction. The liberated market allows us to determine how great we can be. The liberated, free(d) market allows plans by the many, not by the few &#8211; it renders Yellen, Bernanke and all bureaucrats of the political class obsolete.</p>
<p>With booms and big busts, giant bubbles, manipulation of the market, a giant national debt and a decaying dollar accompanying promises in future spending, a full economic collapse of the United States government is a very real possibility (see <a title="Thomas L. Knapp" href="http://c4ss.org/content/author/thomaslknapp">Thomas L. Knapp</a>: <a title="Government Spending: Two Steps Sideways, One Half-Step Back" href="http://c4ss.org/content/22936">Government Spending: Two Steps Sideways, One Half-Step Back</a>). This is scary, we all live here, we all have families here, we all have bills to pay and mouths to feed. Our way of life, however, is not at the mercy of the Federal Reserve or a conglomerate of folks in Washington. Though this realization is indeed scary, it should also be exciting. The market will finally have a chance to equilibrate. As <a title="With Detroit’s Bankruptcy, Anarchists Have Begun Project “Free Detroit” – Starting a Community" href="http://thestateweekly.com/with-detroits-bankruptcy-anarchists-have-begun-project-free-detroit-starting-a-community-2/">witnessed in Detroit</a>, free people can accomplish much with very little &#8211; and free people are already working on the solutions.</p>
<p>If we are to be serious about living in a peaceful and prosperous society, then we must also be serious about competing forms of currency, competing markets and the abandonment of the <em>command</em> and <em>control</em> mentality. Perhaps the Keynesians are right and government spending is the only way to prevent the collapse of state capitalism. What&#8217;s ignored by fans of the printing press is that state capitalism is unsustainable. If we all march off to battle there will be full employment, but nothing to eat. The only way out is the liberated market. In the words of <a title="Kevin Carson" href="http://en.wikipedia.org/wiki/Kevin_Carson">Kevin Carson</a>: &#8220;<a title="Getting Off the Hamster Wheel" href="http://c4ss.org/content/5884">In the end we’ve got to find some way off the hamster wheel.</a>&#8221;</p>
<p>Instead, may we work together and exchange services to <em>co-ordinate</em> and <em>cultivate</em> markets. The emergence of peer to peer currency, like <a title="P2P Bitcoin" href="http://bitcoin.org/en/">Bitcoin</a>, and the rise of voluntary exchange are sources of hope. The more we work around traditional power structures, the more we advance social power in our all too important race against the corporate state.</p>
<p>The creative labor of human beings will build markets, mutual aid, relief, decent societies and finally peace.  We can and will build a real and lasting peace that will make life on Earth worth living — a peace for every child of humanity. Free human beings will no longer die for governments and/or capital. The greatest moment in human civilization is within our grasp. It is time we reach out and attain liberty.</p>
<p>As Yellen continues, perhaps even enhances, the disastrous policies of the Fed, may we find solace and peace in the liberated market. May we soon, in liberty, say triumphantly: &#8220;We are all <a title="Agorism" href="http://agorism.info/">Agorists</a> now.&#8221;</p>
<p><strong>References:</strong></p>
<p>Chandavarkar, Anand G. Keynes and Central Banking. <a title="Keynes and Central Banking" href="http://www.jstor.org/discover/10.2307/29793427?uid=2&amp;uid=4&amp;sid=21103317796423">Indian Economic Review / Volume XX, No.2</a></p>
<p>Federal Reserve Bank of Minneapolis. (2013) A History of Central Banking in the United States.  <a href="http://www.minneapolisfed.org/community_education/student/centralbankhistory/bank.cfm">http://www.minneapolisfed.org/community_education/student/centralbankhistory/bank.cfm</a></p>
<p>Morgan, H. Wayne. (1956) The Origins and Establishment of the First Bank of the United States. <a title="Business History Review" href="http://journals.cambridge.org.proxy.lib.utk.edu:90/action/displayJournal?jid=BHR">Business History Review</a> / Volume 30 / Issue 04 / December 1956, pp 472-492</p>
<p>Scur, Leon M. (1960) The Second Bank of the United States and Inflation After the War of 1812. <a title="Journal of Political Economy" href="http://www.jstor.org.proxy.lib.utk.edu:90/action/showPublication?journalCode=jpoliecon">Journal of Political Economy</a>/<a title="Journal of Political Economy, Vol. 68, No. 2, Apr., 1960" href="http://www.jstor.org.proxy.lib.utk.edu:90/stable/i304795">Volume 68, No. 2</a></p>
<p>Sylla, Richard (1969). Federal Policy, Banking Market Structure and Capital Mobilization in the United States, 1863 &#8211; 1913. <a title="The Journal of Economic History" href="http://www.jstor.org.proxy.lib.utk.edu:90/action/showPublication?journalCode=jeconomichistory">The Journal of Economic History</a>/<a title="The Journal of Economic History, Vol. 29, No. 4, Dec., 1969" href="http://www.jstor.org.proxy.lib.utk.edu:90/stable/i337061">Volume 29, No. 4</a></p>
<p>Zinn, Howard (2003). <a title="A People's History" href="http://www.historyisaweapon.com/defcon1/socchal13.html">A People&#8217;s History of the United States: The Socialist Challenge</a>. Harper Perennial.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=23585&amp;md5=074afca187fb27a6bd9738ac3e1aa3c6" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/23585/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F23585&amp;language=en_GB&amp;category=text&amp;title=We+Are+All+Agorists+Now&amp;description=Transfer+of+Power+Arguably+the+most+powerful+person+in+the+United+States+%28even+rivaling+the+POTUS%29%2C+Ben+S.+Bernanke%2C+has+left%C2%A0the+Federal+Reserve.+Since+2006+he+has+sought+to+make...&amp;tags=activism%2Caggression%2Cagorism%2CBen+Bernanke%2CBitcoin%2CCentral+Bank%2CClass+Struggle%2Ccorporate+state%2Ccounter-economics%2Ccounter-power%2Ceconomics%2CFederal+Reserve%2Cfree+market%2CGlobal+Financial+Crisis%2CHistory%2CJanet+Yellen%2Cleft-libertarian%2Clibertarian%2CToo+Big+To+Fail%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Using PGP Encryption To Communicate Privately</title>
		<link>http://c4ss.org/content/21728</link>
		<comments>http://c4ss.org/content/21728#comments</comments>
		<pubDate>Wed, 13 Nov 2013 00:00:13 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Odds & Ends]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[technology]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=21728</guid>
		<description><![CDATA[There are many tools out there that allow you to communicate privately with varying levels of security. PGP (Pretty Good Privacy), specifically the OpenPGP standard, is a well tested and solid method of encrypting emails and messages, before transmission, to ensure that the only person who can read them is the intended recipient. I need...]]></description>
				<content:encoded><![CDATA[<p dir="ltr">There are many tools out there that allow you to communicate privately with varying levels of security. PGP (Pretty Good Privacy), specifically the OpenPGP standard, is a well tested and solid method of encrypting emails and messages, before transmission, to ensure that the only person who can read them is the intended recipient. I need not reiterate the importance of privacy, especially for activists in different regions around the world, including the USA, where domestic spying can and has been used to <a href="http://progressive.org/spying-on-ccupy-activists">attempt to thwart activist groups</a>. PGP is a reliable standard and the one used by <a href="http://www.huffingtonpost.com/2013/06/10/edward-snowden-glenn-greenwald_n_3416978.html" target="_blank">Edward Snowden in his communications with Glenn Greenwald</a>.</p>
<p>PGP relies on what is called “<a href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank">Public Key Cryptography</a>” to cipher and decipher messages. In times gone by, to send cryptographic messages to a recipient, an agreed upon key or method would need to be shared beforehand. This may have required meeting with the recipient in person to establish the &#8220;key&#8221; without fear of interception. If an encrypted letter was likely to be intercepted, it is just as likely that a letter detailing a secret decryption algorithm would be intercepted. This situation is clearly impractical in the current state of mass communication across the world with people you cannot easily meet in person.</p>
<p>Public Key Cryptography, or Asymmetric Key Cryptography, is a solution to this problem. First both parties wishing to engage in an encrypted conversation must generated key pairs. Each participant will generate a public and a private key using their PGP software (this only needs to be done once per person). The public key is the <a href="https://en.wikipedia.org/wiki/Cipher" target="_blank">cipher</a>. This is the key used to <a href="https://en.wikipedia.org/wiki/Encryption" target="_blank">encrypt a message</a>. The private key, which is mathematically related to the public key, is used to decipher the message. In reality, a <a href="https://en.wikipedia.org/wiki/Session_key" target="_blank">symmetric session key</a> is generated to encrypt each message. The session key itself is then encrypted with the public key and sent within the message.</p>
<p>How this works, practically,</p>
<ul>
<li><strong>Person A</strong> shares their public key with <strong>Person B</strong>.</li>
<li><strong>Person B</strong> uses this key to encrypt a message and send it back to <strong>Person A</strong>.</li>
<li><strong>Person A</strong> then uses their own private key to decrypt the message.</li>
<li><strong>Person B</strong>&#8216;s public key can be included in the return message or published publicly.</li>
</ul>
<p>The efficacy of modern cryptography relies on the fact that certain mathematical problems are extremely difficult to solve. Such problems used are <a href="http://www.claymath.org/posters/primes/">Prime factorisation</a> and <a href="http://www.linuxjournal.com/content/elliptic-curve-cryptography">elliptic curve relationship</a>; knowing this is not necessarily required to effectively use modern cryptography, but it is worth mentioning for those who may be interested.</p>
<p>A good analogy to this would be <strong>Person A</strong> sending <strong>Person B</strong> a lock-box with just a padlock, but no physical key. <strong>Person B</strong> then places a message inside the lock-box and locks it. From that point onward, <strong>Person A</strong> is the only one able to unlock the box with the key they have in their possession. Using this method, it is safe for anyone to have access one&#8217;s public key because all that it allows someone to do is encrypt messages to for that person. Only by compromising someone’s private key or failing to authenticate who you are communicating with will this secrecy and security be readily broken.</p>
<p dir="ltr">Now that there is a basic understanding of how PGP works, we will go through an easy method to implement it in email communications. Keep in mind that PGP will protect the privacy of communications, but not anonymity. An effective eavesdropper will still be able to know that you, <strong>Person A,</strong> has communicated with <strong>Person B</strong>. They will only be unaware of what is being communicated.</p>
<p>One of the easiest methods of setting up and using PGP is a browser plugin called <em>Mailvelope</em>. This is what I will be covering in the rest of the article. I suggest this because it does not require the installation of software to the PC, as it runs on the browser platform. This along with the fact that PC Email clients are in declining use is why I think <em>Mailvelope</em> is a worthy option. I will also link my public key and email at the end of the article, if you wish to practice sending and receiving encrypted email.</p>
<p dir="ltr"><em>Mailvelope</em> is currently only available for <em>Chrome.</em> It can be downloaded as an extension here: <a href="http://mailvelope.com/">http://mailvelope.com/</a></p>
<p>Once you have <em>Mailvelope</em> added to your browser, a padlock icon will appear in the top right next to the <em>Chrome</em> settings button.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh4.googleusercontent.com/S6YWne0MBqhLmYkvEWguPOCJxNq6VmGW3aee3Ft9zqojppka5dmQJkL79JXdmiBueVZxnGsE-CS3jXazWV1Xywr34fpIQYC8ReMZA01Yj5qx5evXMq8eMNmX" width="296px;" height="320px;" /></p>
</div>
<p>Left click on it and select &#8220;Options.&#8221; From here we need to generate a public/private key pair. This option will be in the left hand menu button.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/RbVs7p18ZUza1dGFSUK4WX5wkYf7u83xuJd_u8z5hWjFkNqrryfkheyZ6Nqc4g3jP_AWs5A3fvvZ54-A9myKzfzVPPBbQb57B-fUhknbycd13rrMkrRkdZvp" width="624px;" height="501px;" /></p>
</div>
<p>Input your details in the fields provided. Make sure the passphrase you use is <a href="http://xkcd.com/936/" target="_blank">both long and something you can remember</a>. If you forget this passphrase, you will no longer be able to encrypt or decrypt messages using that particular key pair. In the &#8220;Advanced&gt;&gt;&#8221; section, choose a keysize longer than 1024 bit for future&#8217;s sake. Once you have filled in the forms, click &#8220;Submit.&#8221;</p>
<p>Once you have completed this, go to the &#8220;Display Keys&#8221; option in the menu. From here you can &#8220;Export&#8221; your public key. You can choose to send it to another PGP user via email or you can export it as a block of text and shared via other means. Do not give out your private key &#8211; <strong>ever.</strong> Your public key is totally public and can be safely shared far and wide or <a href="http://pgp.mit.edu/" target="_blank">published</a> anywhere without worry &#8211; as promiscuously as you like. All the public key allows someone to do is send a message to you.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/10NHy50kHKvq6CGPE4nV6eZ0ocHJraDnJvkG4K7ZpokctRp0u5u8mKGdnxhP_nqru1W-TiNiBqV4CA6ycimW2IOsbDikcHZCb6GnbrQwmVzRLyucBJ13xS_N" width="591px;" height="361px;" /></p>
</div>
<p>In order to send encrypted messages to others, you must import their public key. You can do this by importing an &#8220;.asc file&#8221; with the public key or copying their public key block. When obtaining someone&#8217;s public key, make sure you have, to the best of your ability, ascertained that who you are speaking to is really who you are speaking to.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/FAri_V3bTJk-pP1762oJALVqFutQZv1Rfn_dH2MlzWMOZfzt6MZ5cR1VxfBItZn90Y4FixUmcr6upGF_wy7y1ylzAannkF8lok-Cz8Vuj0rOYCJBxlAY8BJV" width="624px;" height="425px;" /></p>
<p>&nbsp;</p>
</div>
<p>Now that you have your keys set up and have imported someone else&#8217;s public key, you need to know how to send an email.</p>
<p>Open up your email client. <em>Mailvelope</em> comes configured to support Gmail, Outlook.com, Yahoo Mail and GMX. For this Demonstration I will use Gmail:</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/nKvMTPRvMTMZhFWIcX4W0rU467VsXtBJsCtEPkeMCCpePxwU5VQuNQZh19ZljzUuZUO1cLvk35qSDiDnFw6bUGkbXWwhUl0LuPMLR7ZozVOmWslwbSuFMLAa" width="NaN" height="NaN" /></p>
</div>
<p>Go to compose an email. You will immediately notice a new &#8220;pencil and paper button&#8221; inside the compose box. First enter the recipient and subject, then, once you get to the body of the email, click this &#8220;pencil and paper button.&#8221;</p>
<p>Compose the email in the box that opened up &#8211; this prevents clear text email from being automatically saved as draft by your email provider and potentially compromising the secrecy of your message.</p>
<div style="text-align: center;"><a href="http://c4ss.org/wp-content/uploads/2013/11/PGP1Compose.png"><img class="alignnone  wp-image-22487" alt="" src="http://c4ss.org/wp-content/uploads/2013/11/PGP1Compose.png" width="605" height="369" /></a></div>
<p>Once you have written your message, click on the &#8220;padlock button,&#8221; choose the recipient&#8217;s public key from the drop-down menu, click &#8220;Add&#8221; and &#8220;Ok.&#8221; You then press the &#8220;Transfer button&#8221; to move the encrypted text back to the compose box. <em>Note that because PGP encrypts your message with a generated session key, then encrypts the session key with the recipient&#8217;s public key, it is possible to encrypt a message for multiple recipients.</em></p>
<div style="text-align: center;"><a href="http://c4ss.org/wp-content/uploads/2013/11/PGP2addingaddress.png"><img class="alignnone  wp-image-22488" alt="" src="http://c4ss.org/wp-content/uploads/2013/11/PGP2addingaddress.png" width="604" height="370" /></a></div>
<p>An encrypted block of text will look like this:</p>
<blockquote><p>&#8212;&#8211;BEGIN PGP MESSAGE&#8212;&#8211;<br />
Version: OpenPGP.js v.1.20130820<br />
Comment: http://openpgpjs.org<br />
wcBMAxLijeXaycuCAQgAl8n4g5ilhHXKoAqawIxn/bT3i8cZ4HP6JxtCZWWM<br />
rzjX75QFffr3U6OSByqpU+DRBmhd2zG0akzkImUqrkVmQbbZv4vqEpQMMwzh<br />
heX+MuZeUCXKAWTCGfcIMbeXKjpuqbuL0F8NkHeAkqFJ8hcMY8aYX3VtaRbQ<br />
oVdL5aPzMbS5kPxjtr1OY93dwy1jV7JvrYgpyuk4wpynfS1AfKpn2lDyCQGH<br />
sTxu6yqrJUDnnYrs0TkgLvkPXueggA8+yw7zDd3iQ5P2VeMWHH7EAUa+gFj7<br />
x/M3DtHsGvfdssiPP35PZrglHCsJGCTZScO+Re1M2IxZtnZNHfDU0V9lhX4i<br />
Q9JQAQlHtm8etEXlyvovsXDfIE2SdKgcj1bgx359V+zZsvPNyOtqfYEuyszM<br />
7i65cEqz9GdLGFusSYSFpespUCHC71zFmaHEGcmUpglLIvvX2W4=<br />
=g9Kk<br />
&#8212;&#8211;END PGP MESSAGE&#8212;&#8211;</p></blockquote>
<p>You can now send your message knowing that if intercepted, it will be unreadable.</p>
<p>When you receive an encrypted email, <em>Mailvelope</em> will detect this and overlay a &#8220;padlock and envelope symbol&#8221; over it. Clicking on this &#8220;padlock and envelope symbol&#8221; will prompt you to enter your passkey. Entering this will display the message in clear text for you to read.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh6.googleusercontent.com/cJ-ES7S7y5kkeKuxyc304hu2XYSwgmuOxJnY3MuLgBeEm_sKUUKdscKtKEd-WEsUHLRpX5qi8bsEtqMS3oy5CM1hbXbnfBDHi3IZvodApMuLlw0izsya8SU-" width="NaN" height="NaN" /></p>
</div>
<p>Now you should be fully capable of using PGP to encrypt and decrypt emails to and from your contacts.</p>
<p>If you wish to test <em>Mailvelope</em> out and don&#8217;t yet know anyone else with PGP set up, I have set up an email account to receive encrypted messages. The Email is: <a href="mailto:williamsheppard101@gmail.com">williamsheppard101@gmail.com</a></p>
<p>My public key can be found on the MIT server: <a href="http://pgp.mit.edu:11371/pks/lookup?op=get&amp;search=0x12E28DE5DAC9CB82">http://pgp.mit.edu:11371/pks/lookup?op=get&amp;search=0x12E28DE5DAC9CB82</a></p>
<p>I will respond to all encrypted emails I receive. <strong>Ensure you include your public key in the email.</strong></p>
<p>Below are a number of other tools that are worth noting, if <em>Mailvelope</em> does not suit your specific habits or setup.</p>
<p><strong>EnigMail for Thunderbird mail client</strong><br />
<a href="https://www.enigmail.net/home/index.php">https://www.enigmail.net/home/index.php</a><br />
A very clean and versatile addon for those who still use local mail clients, once it is set up it is arguably easier to use than mailvelope.</p>
<p><strong>PGP4win</strong><br />
<a href="http://www.gpg4win.org/download.html">http://www.PGP4win.org/download.html</a><br />
Comes with a number of utilities, including the certificate manager Kleopatra, which allows you to import and export encrypted messages, allowing you to copy send encrypted messages over other platforms.</p>
<p><strong>GNU Privacy Guard</strong><br />
<a href="http://www.gnupg.org/download/index.en.html">http://www.gnupg.org/download/index.en.html</a><br />
For Linux users, GPG can be downloaded from the distro&#8217;s repository, or a source package can be downloaded from the website.</p>
<p><strong>GPG Tools</strong><br />
<a href="https://gpgtools.org/">https://gpgtools.org/</a><br />
A PGP suite for Mac users.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/26104" target="_blank">Como usar criptografia PGP para comunicação privada</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=21728&amp;md5=b1a01985f7e9c6b08f8485a75eb73e4e" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/21728/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F21728&amp;language=en_GB&amp;category=text&amp;title=Using+PGP+Encryption+To+Communicate+Privately&amp;description=There+are+many+tools+out+there+that+allow+you+to+communicate+privately+with+varying+levels+of+security.+PGP+%28Pretty+Good+Privacy%29%2C+specifically+the+OpenPGP+standard%2C+is+a+well+tested+and...&amp;tags=activism%2Cencryption%2CPGP%2CPortuguese%2CStateless+Embassies%2Ctechnology%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Segurança Na Internet É Responsabilidade Nossa</title>
		<link>http://c4ss.org/content/22502</link>
		<comments>http://c4ss.org/content/22502#comments</comments>
		<pubDate>Tue, 12 Nov 2013 21:00:58 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22502</guid>
		<description><![CDATA[À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais. O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados...]]></description>
				<content:encoded><![CDATA[<p>À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais.</p>
<p>O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados buscaram informação pessoal acerca de seus cidadãos, especialmente em estados tirânicos, onde informantes e polícia secreta coletam informação acerca de qualquer e toda atividade potencialmente subversiva. Na era da Internet e do estado espreitador, agências de espionagem coletam informações acerca de nós que fariam a NKVD de Stalin morrer de inveja — muito dela ingenuamente entregue <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via mídia social</a>. Quando o estado espreitador será extinto depende do palpite de cada um mas, enquanto isso, quanto menos úteis forem os dados coletados a nosso respeito, menos eficaz será o controle do estado sobre nós. Para ativistas, o uso de comunicação privada ou anônima em países do primeiro mundo poderá ser a chave para evitar <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">prisão preventiva</a>. Em lugares como Síria, torna-se <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">questão de vida e morte</a>.</p>
<p>Inicialmente eu tive a esperança de que empresas como a Google acorreriam em socorro, por meio da implementação de poderosos sistemas de criptografia; infelizmente parece cada vez mais improvável que corporações comprometidas com acionistas e envolvidas com o governo possam criar, eficazmente, serviços da espécie. Embora essas grandes empresas, com seus alentados lucros e seus orçamentos para lobby, estejam provavelmente na melhor posição para revidar ao estado espreitador, são também as que mais têm a perder se não cooperarem ou fingirem cooperar.</p>
<p>A Lavabit, de Ladar Levison, <em>era</em> serviço de email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semisseguro</a>. Em agosto, Levison fechou a Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citando ameaças e interferência do governo</a>. Observadores especularam que Levison havia recebido uma Carta de Segurança Nacional exigindo dados de cliente, provavelmente do denunciante da Agência de Segurança Nacional &#8211; NSA Edward Snowden. Recentemente deslacrado documento de tribunal mostra ter sido expedido mandado para obtenção da chave do protocolo de segurança SSL do serviço Lavabit. Tal chave permite conexão segura criptografada entre usuário e servidor. Ter acesso a essa chave daria ao governo acesso em tempo real a informações enviadas ao site pelos usuários. Isso, por sua vez, permitiria ao governo coletar credenciais de login e ter acesso a emails criptografados dos 400.000 clientes da Lavabit.</p>
<p>Muito louvavelmente, Ladar Levison resolveu fechar a Lavabit — negando acesso às comunicações privadamente armazenadas dos clientes da empresa. Esse tipo de postura baseada em princípios éticos não é a regra. Levison não tinha acionistas aos quais prestar contas. Ele respondia a si próprio e a seus clientes. Não podemos esperar que grandes corporações tecnológicas como a Google, que projeta imagem pública de estar do nosso lado e em verdade tenta <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">dar divulgação ao intrometimento do governo</a>, efetivamente enfrente o governo quando compelidas por lei. Outras empresas, como a Microsoft, parecem <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasmadas com colaborar com a NSA</a> e outros órgãos governamentais de espionagem.</p>
<p>Ora bem, o que significa tudo isso para nós? Está tudo contra nós? Não! Temos que tomar o problema em nossas próprias mãos. Há uma multidão de projetos livres e de fonte aberta e padrões abertos para criptografia. Do que entendemos, a NSA tem quebrado criptografia por meio de <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coerção</a> e <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversão</a>, não por meio de tentativas de atacar cruamente os números e decifrar os códigos. Muito provavelmente, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">ainda podemos confiar na matemática</a>.</p>
<p>Quando um projeto é de fonte aberta, seu código fica aberto para escrutínio. Ele pode ser examinado pormenorizadamente e podemos saber exatamente como faz o que faz. Embora a maioria de nós não tenha conhecimento técnico para examinar o código de programa específico para esquadrinhá-lo antes de compilá-lo, pesquisadores e acadêmicos fidedignos <a href="https://www.eff.org/press/archives/2008/02/21-0">podem fazê-lo e esquadrinhá-los para nós</a>. Portanto, podemos estar cientes de vulnerabilidades em potencial do software de criptografia e saber os limites de suas aptidões. Quando nos comunicamos usando PGP, por exemplo, estamos usando padrão aberto. Não precisamos confiar nossa comunicação a uma empresa que poderá ter sido coagida pelo governo a comprometer nossa privacidade. Com PGP, estamos de posse de nossa<em>chave privada</em> e ninguém outro poderá ser forçado a entregá-la. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">O projeto Tor</a>, por causa de sua complexidade, não é tão claro. Por causa de sua natureza distribuída, há mais oportunidades de vulnerabilidade, mas o projeto é de fonte aberta e suas fraquezas em termos de exploração que dele tire proveito estão documentadas e, portanto, temos como entender seus limites.</p>
<p>As conclusões a que temos de chegar são no sentido de que estamos nisso juntos. Se resolvermos usar serviço de empresa que afirme ser tal serviço seguro, teremos de estar cientes de que o serviço poderá ser comprometido a qualquer momento — não por meio de força bruta, mas mediante força coercitiva. Com software de criptografia de fonte fechada não há como avaliar ou confiar nas afirmações do desenvolvedor. Quando usamos software de criptografia de fonte aberta, podemos tornar-nos conhecedores de suas limitações e usá-lo acordemente.</p>
<p>Segurança na Internet é responsabilidade nossa.</p>
<p>Artigo original afixado por <a title="Posts by William Sheppard" href="http://c4ss.org/content/22005" target="_blank">William Sheppard</a><a href="http://c4ss.org/content/22267" target="_blank"> em 26 de outubro de 2013</a>.</p>
<p>Traduzido do inglês por <a href="http://zqxjkv0.blogspot.com.br/2013/11/c4ss-internet-security-is-our.html" target="_blank">Murilo Otávio Rodrigues Paes Leme</a>.</p>
<p>&nbsp;</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22502&amp;md5=db1731b3190291346dc687c644538b70" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22502/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22502&amp;language=en_GB&amp;category=text&amp;title=Seguran%C3%A7a+Na+Internet+%C3%89+Responsabilidade+Nossa&amp;description=%C3%80+medida+que+ficamos+sabendo+de+cada+vez+mais+detalhes+acerca+da+espionagem+do+governo%2C+parece+cada+vez+mais+temer%C3%A1rio+confiar+nossa+seguran%C3%A7a+a+terceiros+empresariais.+O+estado+requer+que...&amp;tags=activism%2Cencryption%2Chacktivism%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Internet Security Is Our Responsibility</title>
		<link>http://c4ss.org/content/22005</link>
		<comments>http://c4ss.org/content/22005#comments</comments>
		<pubDate>Sat, 26 Oct 2013 18:00:13 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[Italian]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22005</guid>
		<description><![CDATA[As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses. The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in...]]></description>
				<content:encoded><![CDATA[<p lang="zxx">As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses.</p>
<p lang="zxx">The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in tyrannical states, where informants and secret police gather information on any and all potentially subversive activities. In the age of the Internet and the surveillance state, spy agencies collect information on us that would make Stalin&#8217;s NKVD green with envy &#8212; much of it naively handed over <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via social media</a>. When the surveillance state will be dismantled is anyone&#8217;s guess, but, in the meantime, the less useful data that can be collected on us the less effective the state&#8217;s control of us. For activists, use of private or anonymous communication in first world countries could be key to avoiding <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">pre-emptive arrest</a>, In places like Syria, it becomes a <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">matter of life and death</a>.</p>
<p lang="zxx">Initially, I had hoped companies like Google would come to the rescue by implementing powerful encryption systems; unfortunately it seems less and less likely that corporations beholden to shareholders and intertwined with government can effectively and securely create these services. While these big companies with their large profits and lobbying budgets are probably in the best position to fight back against the surveillance state, they  also have the most to lose if they don&#8217;t play along.</p>
<p lang="zxx">Ladar Levison&#8217;s Lavabit <em>was a</em> <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semi-secure</a> email service. In August, Levison shut down Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citing government threats and interference</a>. Observers speculated that Levison had received a National Security Letter demanding customer data, likely that of NSA whistleblower Edward Snowden. Recently unsealed court document show that a warrant was issued for the private SSL key for the Lavabit service. This key allows a secure encrypted connection between user and server. Having access to this key would give the government real time access to information being sent by users to the site. This in turn would allow them to scoop up log-in credentials and access the encrypted emails of any of Lavabit&#8217;s 400,000 customers.</p>
<p lang="zxx">Much to his credit, Ladar Levison decided to shut down Lavabit &#8212; denying access to the privately stored communications of its customers. This sort of principled stance is unexpected. Levison didn&#8217;t have shareholders to answer to. He answered to himself and his customers. We cannot expect large tech corporations like Google, who put forth the public image of being on our side and actually attempt to <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">publicize government intrusion</a>, to actually defy the government when compelled by law. Other players, such as Microsoft, appear to be <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">enthusiastic in their collaboration with the NSA</a> and other 3 letter agencies.</p>
<p lang="zxx">So what does this all mean for us? Is it all doom and gloom? No! We have to take this into our own hands. There are a multitude of free and open source projects and open standards for encryption. From what we understand, the NSA has broken encryption through <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercion</a> and <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversion</a>, not by raw attempts at bashing away at the numbers and cracking the codes. Most likely, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">we can still trust the mathematics</a>.</p>
<p lang="zxx">When a project is open source its code is open to scrutiny. It can be vetted and we can know exactly how it does what it does. While the majority of us do not have the technical know-how to look through the code of a specific program to vet it before compiling it,  trusted researchers and academics <a href="https://www.eff.org/press/archives/2008/02/21-0">can and do vet these for us</a>. Thus we can be aware of potential vulnerabilities of encryption software and know the limits of its capabilities. When we communicate with PGP, for example, we are using an open standard. We do not need to trust our communications to a company that may have been coerced by government to compromise our privacy. With PGP, you are  in possession of your <em>private key</em> and no one else can be made to hand it over. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">The Tor project</a>, due to its complexity, is not so clear cut. Because of its distributed nature, there are more opportunities for exploitation, but the project is open source and these potential exploits are documented so we are able to understand its limits.</p>
<p lang="zxx">The conclusions we must draw is that we are in this together. If we decide to use corporate service that claim to be secure, we must be aware that they could be compromised at any time &#8212; not through brute force, but coercive force. With closed source encryption software, there is no way to evaluate or trust the developer&#8217;s claims. When we use open source encryption software we must make ourselves aware of its limitations and use it accordingly.</p>
<p lang="zxx">Internet security is our responsibility.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/22502" target="_blank">Segurança Na Internet É Responsabilidade Nossa</a>.</li>
<li>Italian, <a href="http://c4ss.org/content/26406" target="_blank">La Sicurezza su Internet È Responsabilità Nostra</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22005&amp;md5=3bf3b15a706a898a9aa2a25cec4269f8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22005/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22005&amp;language=en_GB&amp;category=text&amp;title=Internet+Security+Is+Our+Responsibility&amp;description=As+we+learn+more+and+more+details+regarding+government+spying%2C+it+seems+more+and+more+foolhardy+to+trust+our+security+to+third+party+businesses.+The+state+requires+information+on+its...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Grand Jury: An Affront to Liberty and a Political Prisoner Machine</title>
		<link>http://c4ss.org/content/19254</link>
		<comments>http://c4ss.org/content/19254#comments</comments>
		<pubDate>Thu, 23 May 2013 19:00:40 +0000</pubDate>
		<dc:creator><![CDATA[Sebastian A. Stern]]></dc:creator>
				<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[grand jury]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[revolution]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[witch hunt]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=19254</guid>
		<description><![CDATA[On Tuesday, May 21, 2013, anarchist lawyer and activist Gerald &#8220;Jerry&#8221; Koch was taken into custody in New York City for refusing to testify before a grand jury regarding the 2008 Times Square Military Recruitment Center bombing. This is the second time Koch has been subpoenaed, after the government informed his lawyers that it was...]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter" src="http://s8.postimg.org/7t9bkhj1h/jerry.jpg" alt="Koch" width="300" height="199" /></p>
<p>On Tuesday, May 21, 2013, anarchist lawyer and activist <a href="jerryresists.net" target="_blank">Gerald &#8220;Jerry&#8221; Koch</a> was taken into custody in New York City for refusing to testify before a grand jury regarding the 2008 Times Square Military Recruitment Center bombing. This is the second time Koch has been subpoenaed, after the government informed his lawyers that it was believed that he was at a bar in 2008 or 2009 where a patron indicated knowledge of who had committed the bombing.</p>
<p>Koch is the latest victim in the Red and Black scare, a FBI campaign <a href="http://rt.com/usa/seattle-occupy-apartment-police-959/" target="_blank">which began in earnest shortly after the Occupy Oakland</a> demonstrations in 2011, where activists are being targeted for their political views and not on the basis of suspected criminal activity.</p>
<p>Another recent and prominent victim is libertarian Adam Kokesh, <a href="http://www.huffingtonpost.com/2013/05/21/adam-kokesh-arrested-video_n_3308644.html" target="_blank">who is being held for resisting arrest during an anti-drug war demonstration</a>. Kokesh may have been targeted due to publicity surrounding his upcoming &#8220;<a href="https://www.facebook.com/events/252728144871259/" target="_blank">Open Carry March</a>&#8221; on Washington, an action that remains controversial even among gun rights activists. One salient question is, in light of the <a href="http://www.huffingtonpost.com/2013/05/20/new-3d-gun_n_3308533.html" target="_blank">successful 3D printing</a> of a firearm (a movement initiated by Cody Wilson of Defense Distributed), whether this flamboyant open rebellion against state encroachment is even necessary.</p>
<p><strong>Witch Hunt</strong></p>
<p>Instead of McCarthy&#8217;s House Un-American Activities Committee of the &#8220;Cold&#8221; War, the Obama administration&#8217;s weapon of choice in the war on dissent is the eternally authoritarian grand jury.</p>
<p>This fresh abuse of power comes on the heels of numerous <a href="http://rt.com/usa/refusing-grand-jury-plante-196/" target="_blank">grand jury subpoenas of anarchists on spurious charges</a> in the Pacific Northwest. Young anarchist were targeted in a series of FBI and Joint Terrorism Task Force on July 25 of 2012 during an investigation into &#8220;acts of vandalism&#8221; that took place during the Seattle May Day protests just two months prior.</p>
<p>The search warrants issued required victims to provide agents with &#8220;anti-government or anarchist literature,&#8221; including flags, cell phones, hard drives, address books and black clothing.</p>
<p>Despite not being present or involved in the May Day march, Maddie Pfeiffer, Katherine “KteeO” Olejnik and Matt Duran were each imprisoned for almost six months for contempt of court after refusing to speak before the grand jury. They were mainly asked whether or not they knew other anarchists in their community and what their politics were.</p>
<p><strong>Manufacturing Political Prisoners</strong></p>
<p>Grand juries are when the state ostensibly believes you have knowledge of a crime and subpoenas you before a court &#8212; or else you face prison time. That&#8217;s right. If you don&#8217;t talk, have fun in prison. No evidence of wrongdoing required. Your freedom is revoked simply by failing to provide information to or submit your body before the cold legal machinations of a witch-hunt state.</p>
<p>Furthermore, you can&#8217;t have a lawyer in the room with you when before a federal grand jury, and the proceedings are not open to the public. Finally, there is no judge present in the courtroom. There are instead 16 to 23 citizen jurors and the whole affair is <em>coordinated by the prosecutor</em>, the Assistant US Attorney (AUSA).</p>
<p>As you might imagine, grand juries tend to indict successfully (estimates around 98% of the time). This led Judge Saul Wachler to state that a prosecutor can get a grand jury to “indict a ham sandwich.”</p>
<p>While the United States has been fond of grand juries, most other &#8220;nations&#8221; have long ago done away with this barbaric display of state power. The first such courtroom to be called a grand jury began with an 1166 act of Henry II of England, in an attempt to increase the power of the royal court over the local feudal courts. England abolished the grand jury in the Criminal Justice Act of 1948.</p>
<p>Back in the land of the free, the grand jury lays the groundwork for litigation by the attorney general (now district attorney) &#8212; prosecution by the state instead of by an aggrieved private party. This is how victimless crimes are punished, most notably the war on drugs (or tax evasion). The Black Panthers, anarchists, communists, environmental and animal rights activists have all been subjected to grand juries.</p>
<p><strong>Take Action </strong></p>
<p>Koch, who has a record of defending Occupiers and activists, faces 18 months behind bars. An excerpt from a personal statement:</p>
<p style="padding-left: 30px;">Over the past few decades, the FBI has demonstrated a consistent pattern of harassment and illegal surveillance of anarchists and other radicals not only here in New York, but also across the country.</p>
<p style="padding-left: 30px;">Throughout this time, federal grand juries (incredibly secretive proceedings that do not permit one’s lawyers to be present) have played a significant role; a federal grand jury is authorized to ask questions about anything and anyone, and often the declared intention is simply a mask to disguise the actual goal of acquiring information for use in other politically motivated cases.</p>
<p style="padding-left: 30px;">It is my belief that these two federal grand juries—despite the pretense of investigation into the 2008 bombing—are actually being used to gain information about my friends, loved ones, and activists for whom I have done legal support. By declining to testify, I refuse to be coerced into participating in a political witch-hunt that eerily recalls those of the McCarthy era Red Scare.</p>
<p>Please donate to his legal fund. Find out more on the beautifully designed webpage <a href="http://www.jerryresists.net" target="_blank">jerryresists.net</a>.</p>
<p style="padding-left: 30px;">First they came for the communists,<br />
and I didn&#8217;t speak out because I wasn&#8217;t a communist.<br />
Then they came for the socialists,<br />
and I didn&#8217;t speak out because I wasn&#8217;t a socialist.<br />
Then they came for the trade unionists,<br />
and I didn&#8217;t speak out because I wasn&#8217;t a trade unionist.<br />
Then they came for me,<br />
and there was no one left to speak for me.<br />
&#8211; Martin Niemöller</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=19254&amp;md5=71769ec9f19ec58f212f7467a4a5d373" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/19254/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F19254&amp;language=en_GB&amp;category=text&amp;title=The+Grand+Jury%3A+An+Affront+to+Liberty+and+a+Political+Prisoner+Machine&amp;description=On+Tuesday%2C+May+21%2C+2013%2C+anarchist+lawyer+and+activist+Gerald+%26%238220%3BJerry%26%238221%3B+Koch+was+taken+into+custody+in+New+York+City+for+refusing+to+testify+before+a+grand+jury+regarding+the...&amp;tags=activism%2Canarchism%2Canarchist%2Canarchy%2Cexploitation%2Cgrand+jury%2CNorth+America%2Cpolice+state%2Cpolitics%2Crevolution%2Cstate%2Cunited+states%2Cwitch+hunt%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Tor: The Onion Router</title>
		<link>http://c4ss.org/content/19091</link>
		<comments>http://c4ss.org/content/19091#comments</comments>
		<pubDate>Tue, 21 May 2013 18:05:12 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Odds & Ends]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[liberty]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=19091</guid>
		<description><![CDATA[What is Tor? How does it work? And why should you use it? With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP...]]></description>
				<content:encoded><![CDATA[<p><strong>What is Tor? How does it work? And why should you use it?</strong></p>
<p>With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP (Internet Service Provider) and your government knowing everything about your internet use. Here, I will go into brief detail about the technical aspects of Tor, give reasons why you should use Tor and finally guide you through the installation of the Tor browser and how to contribute to the network by setting up a relay.</p>
<p><strong>What is Tor?</strong></p>
<p>Tor, formally an acronym for &#8220;<a href="https://www.torproject.org/index.html.en" target="_blank">The Onion Router</a>&#8220;, is a distributed proxy network designed to provide anonymity on the web. Much like a <a href="https://ssd.eff.org/tech/vpn" target="_blank">VPN</a> (Virtual Private Networks). Tor encrypts your traffic and bounces it through a number of relays before arriving at it&#8217;s destination. Preventing third parties from being able to see what you are sending through the network, and where your traffic initially came from. Tor can also be used for servers, to anonymize the physical location of websites, and those who visit them.</p>
<p><strong>How does it work?</strong></p>
<p>There are a number of very in depth resources that explain in a lot of detail how the network works, this is not that. This is a brief guide to introduce you to the concept of onion routing, and if you wish to learn further, there will be a number of links included.</p>
<p>When you attempt to contact a website using the Tor Browser, the Tor client randomly selects 3 nodes from the network. The client then encrypts a message to be sent to the final recipient (e.g a website you want to visit). The encrypted message is sent to the first node, the first node then peels off an initial layer of encryption, revealing where to send the message to the second node, this process is repeated until it reaches the third and final node, also known as the &#8220;exit relay&#8221;, where the message is unencrypted and sent to the final recipient. The effect of this is to obscure your <a href="http://news.cnet.com/8301-13554_3-10042206-33.html" target="_blank">IP address</a> from the destination server by providing multiple barriers between you and the server. Keep in mind however, personal information that you choose to give to a website, such as in a sign up form, is treated like any other data by the website, it can be looked at by an administrator, or subpoenaed by Law Enforcement, Tor works most effectively if you keep your information private as well as anonymous.</p>
<p><strong>Why should you use it?</strong></p>
<p>Increasingly, governments around the world have become preoccupied with what is known as <a href="http://www.cato.org/publications/commentary/beware-total-information-awareness" target="_blank">Total Information Awareness</a>, the ability to track every piece of digital information that we create: financial transactions, instant messages, email, web history, etc. This information can be used to intimidate, <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a" target="_blank">harass</a>, or even <a href="http://www.sfgate.com/politics/article/Lawmakers-blast-Yahoo-executives-for-helping-3301322.php" target="_blank">jail dissidents</a>, journalists and those who may pose some form of nuisance to the government. Many nations have <a href="http://www.techspot.com/news/47410-iran-blocks-websites-in-anticipation-of-green-revolution-anniversary.html" target="_blank">strong controls</a> on what people can search for and view on the internet. Tor allows for the <a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/" target="_blank">bypassing of these filters</a>, and has been especially useful in Iran, a nation which enjoys extremely high usage of the Tor network.</p>
<p>In the short term, there is little we can do to stop this encroaching surveillance state. But we are able to protect ourselves and others by obscuring as much data as possible. Tor is one such solution. The more people who use Tor, among other things, to browse the web, when they feel it necessary, the less useful our data will be to the government. The more of us who run relays for the Tor network, the faster the system will function for those who need to use it.</p>
<p><strong>Setup</strong></p>
<p>In recent times, attention has been paid to making the use of Tor extremely easy for the less technically proficient, with minimal setup required. The Tor browser bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a></li>
</ul>
<p>This will install the components needed to use the Tor network, including a modified version of <em><a href="http://www.mozilla.org/en-US/firefox/new/" target="_blank">Firefox</a></em> specifically configured for Tor and <a href="https://www.torproject.org/projects/vidalia.html.en" target="_blank">Vidalia</a>, a graphical front-end that will allow you to configure your Tor settings, including setting up a relay to contribute to the network.</p>
<p>If you do not feel the need to use the Tor browser on your system, but wish to set up a Tor relay, the package can be downloaded by following <a href="https://www.torproject.org/download/download.html.en" target="_blank">this link</a>, choosing your operating system, then choosing the Tor Relay Bundle. This will be especially useful on desktop computers, or dedicated computers that run constantly. While a temporary relay does not harm the network, a permanent one is much more useful. When you run a relay from your system, you will be making the Tor network larger and faster. By adding a node, you make the network more distributed, providing for more robust anonymity. You are also spreading the traffic load, increasing the speed of the network.</p>
<p>The Tor Relay bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download.html.en" target="_blank">https://www.torproject.org/download/download.html.en</a> &#8211; Choose your operating system, then &#8220;Tor Relay Bundle&#8221;.</li>
</ul>
<p>Setting up the browser is simple, just download the file, extract it to the folder of your choice, then click the &#8220;Start Tor Browser&#8221; in the folder. Vidalia should start to run, and once it is connected to the network, the browser will open and will notify you if you are successfully running Tor.</p>
<p>If you wish to run a relay along with the browser, go to &#8220;set up relay&#8221; in Vidalia and check &#8220;relay traffic inside the Tor network (non exit relay)&#8221;, set how much bandwidth you wish to donate and you are good to go.</p>
<p>If you have installed the relay bundle, the relaying option should be set up automatically, and Vidalia will attempt to run whenever you boot your computer. You may wish to run as an exit relay, <strong>but do so at your own risk.</strong> If you run as an exit relay, your IP will be what the destination websites see when someone uses your relay, the traffic runs unencrypted from your connection to the destination, and if someone is using Tor for less than savory purposes; spamming, Wikipedia vandalism, child pornography, etc. You run the risk of having your IP banned from many websites due to actions of others, have your computer seized or even be <a href="http://www.zdnet.com/austrian-man-raided-for-operating-tor-exit-node-7000008133/" target="_blank">arrested by law enforcement</a>. If you wish to run an exit node, please follow <a href="https://blog.torproject.org/running-exit-node" target="_blank">this guide from the Tor Project</a> to mitigate the risks involved. I must emphasize however, these are not issues if you run a relay inside the network, as all traffic you send and receive will be encrypted.</p>
<p>I hope this guide has been useful and convinced those not already using Tor to give it a try. If you do set up a relay, please let us know in the comments section.</p>
<p>There are further resources available for a more in depth look at:</p>
<ul>
<li><a href="https://www.torproject.org/docs/faq.html.en" target="_blank">https://www.torproject.org/docs/faq.html.en</a></li>
<li><a href="https://www.torproject.org/dist/manual/short-user-manual_en.xhtml">https://www.torproject.org/dist/manual/short-user-manual_en.xhtml</a></li>
<li><a href="https://trac.torproject.org/projects/tor/wiki">https://trac.torproject.org/projects/tor/wiki</a></li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=19091&amp;md5=89ebad24b8853cba547768034859b416" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/19091/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F19091&amp;language=en_GB&amp;category=text&amp;title=Tor%3A+The+Onion+Router&amp;description=What+is+Tor%3F+How+does+it+work%3F+And+why+should+you+use+it%3F+With+the+ever+expanding+surveillance+systems+being+employed+in+the+United+States+and+around+the+world%2C+the...&amp;tags=activism%2Cencryption%2Cgovernment%2Cinternet%2Cinternet+freedom%2Cliberty%2Cprivacy%2Csurveillance%2Cblog" type="text/html" />
	</item>
	</channel>
</rss>
