<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Center for a Stateless Society &#187; security state</title>
	<atom:link href="http://c4ss.org/content/tag/security-state/feed" rel="self" type="application/rss+xml" />
	<link>http://c4ss.org</link>
	<description>building public awareness of left-wing market anarchism</description>
	<lastBuildDate>Sat, 24 Jan 2015 03:46:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.1</generator>
	<item>
		<title>Don’t Reform the Surveillance State, Route Around It on Feed 44</title>
		<link>http://c4ss.org/content/32745</link>
		<comments>http://c4ss.org/content/32745#comments</comments>
		<pubDate>Thu, 16 Oct 2014 19:00:32 +0000</pubDate>
		<dc:creator><![CDATA[James Tuttle]]></dc:creator>
				<category><![CDATA[Feed 44]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[counter-economics]]></category>
		<category><![CDATA[counter-power]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[market anarchism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[reset the net]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[youtube]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=32745</guid>
		<description><![CDATA[C4SS Feed 44 presents Nathan Goodman&#8216;s “Don’t Reform the Surveillance State, Route Around It” read Christopher King and edited by Nick Ford. Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers...]]></description>
				<content:encoded><![CDATA[<p>C4SS Feed 44 presents <a href="http://c4ss.org/content/author/nathan-goodman" target="_blank">Nathan Goodman</a>&#8216;s “<a href="http://c4ss.org/content/27498" target="_blank">Don’t Reform the Surveillance State, Route Around It</a>” read Christopher King and edited by Nick Ford.</p>
<p><iframe width="500" height="375" src="http://www.youtube.com/embed/FNgrU_GcJBI?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers like Booz Allen Hamilton will tend to be eroded or defeated due to the power of these predatory interest groups. Or worse, they will be twisted to serve the interests of these oligarchs.</p>
<p>Legislative reform is a dead end, but there’s a better way. We can route around the state, thwart its surveillance efforts, and make it progressively harder to intercept and watch our communications.</p>
<p>Feed 44:</p>
<ul>
<li><a href="http://www.c4ss.org/" target="_blank" rel="nofollow nofollow">http://www.c4ss.org/</a></li>
<li><a href="http://www.youtube.com/user/c4ssvideos" target="_blank" rel="nofollow nofollow">http://www.youtube.com/user/<wbr />c4ssvideos</a></li>
<li><a href="https://itunes.apple.com/us/podcast/c4ss-media/id872405202?mt=2" target="_blank" rel="nofollow nofollow">https://itunes.apple.com/us/<wbr />podcast/c4ss-media/<wbr />id872405202?mt=2</a></li>
<li><a href="http://www.stitcher.com/podcast/smash-walls-radio/c4ss-media?refid=stpr" target="_blank" rel="nofollow nofollow">http://www.stitcher.com/<wbr />podcast/smash-walls-radio/<wbr />c4ss-media?refid=stpr</a></li>
<li><a href="https://twitter.com/C4SSmedia" target="_blank" rel="nofollow nofollow">https://twitter.com/<wbr />C4SSmedia</a></li>
</ul>
<p>Bitcoin tips welcome:</p>
<ul>
<li>1N1pF6fLKAGg4nH7XuqYQbKYXNxCnHBWLB</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=32745&amp;md5=82c267deee2cfec186cf321ef6ceb79c" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/32745/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F32745&amp;language=en_GB&amp;category=text&amp;title=Don%E2%80%99t+Reform+the+Surveillance+State%2C+Route+Around+It+on+Feed+44&amp;description=C4SS+Feed+44+presents%C2%A0Nathan+Goodman%26%238216%3Bs+%E2%80%9CDon%E2%80%99t+Reform+the+Surveillance+State%2C+Route+Around+It%E2%80%9D+read+Christopher+King+and+edited+by+Nick+Ford.+Moreover%2C+the+state+tends+to+secure+its+own+interests...&amp;tags=anarchism%2Canarchist%2Canarchy%2Ccivil+liberties%2Ccounter-economics%2Ccounter-power%2CFeed+44%2Chuman+rights%2Cleft-libertarian%2Clibertarian%2Cmarket+anarchism%2CNSA%2CObama%2Cpolice+state%2Creset+the+net%2Csecurity+state%2Cstate%2Csurveillance%2Cunited+states%2Cyoutube%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Don&#8217;t Reform the Surveillance State, Route Around It</title>
		<link>http://c4ss.org/content/27498</link>
		<comments>http://c4ss.org/content/27498#comments</comments>
		<pubDate>Sun, 25 May 2014 18:00:16 +0000</pubDate>
		<dc:creator><![CDATA[Nathan Goodman]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[counter-economics]]></category>
		<category><![CDATA[counter-power]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[market anarchism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[reset the net]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=27498</guid>
		<description><![CDATA[Last Thursday, the U.S. House of Representatives passed something called &#8220;the USA Freedom Act.&#8221; The bill was intended by its authors to end the National Security Agency&#8217;s broad and privacy-shredding bulk data collection program, but the final version that passed is so weak that bulk data collection will still be permitted. Trevor Timm at the...]]></description>
				<content:encoded><![CDATA[<p>Last Thursday, the U.S. House of Representatives passed something called &#8220;the USA Freedom Act.&#8221; The bill was intended by its authors to end the National Security Agency&#8217;s broad and privacy-shredding bulk data collection program, but the final version that passed is so weak that bulk data collection will still be permitted.</p>
<p>Trevor Timm at the <em><a href="http://www.theguardian.com/commentisfree/2014/may/22/nsa-reform-bill-passed-house-usa-freedom-act-senators-only-hope" target="_blank">Guardian</a></em> writes, &#8220;in a compromise that moved the formerly strong legislation out of committee and into action, <a href="http://www.theguardian.com/commentisfree/2014/may/10/the-battle-to-retake-our-privacy-can-be-won-in-the-halls-of-congress-really">the bill was weakened significantly</a>: in came more immunity for telecoms, and out went tough transparency and provisions for the Fisa court, along with protections against <a href="http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data">warrantless &#8220;backdoor&#8221; searches</a> of your communications.&#8221;</p>
<p>The bill was later watered down further, widening NSA&#8217;s search powers and placing even more power in the hands of the Director of National Intelligence.</p>
<p>The bill&#8217;s <a href="http://www.motherjones.com/politics/2014/05/nsa-usa-freedom-act-weak">original backers</a> dropped their support for the USA Freedom Act.  &#8220;Under the finalized floor version of the USA Freedom Act, it would be completely legal for the NSA to request all records for an area code, zip code, or even all of the emails for accounts that start with the letter ‘A,’ all without a warrant,&#8221; US Rep. Thomas Massie (R-KY) says. Many <a href="http://thehill.com/policy/technology/206686-privacy-advocates-pull-support-for-watered-down-usa-freedom">civil liberties groups</a> also abandoned support for the bill.</p>
<p>These developments are disappointing, but not surprising. This is how government works. Bills are passed largely through logrolling, a process of give and take where propositions supported by different ideologies or interest groups are put together under one bill to increase its chance of passing. So bills originally intended to protect civil liberties often have provisions added to secure the support of hawks, statists and surveillance enthusiasts.</p>
<p>Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers like Booz Allen Hamilton will tend to be eroded or defeated due to the power of these predatory interest groups. Or worse, they will be twisted to serve the interests of these oligarchs.</p>
<p>Legislative reform is a dead end, but there&#8217;s a better way. We can route around the state, thwart its surveillance efforts, and make it progressively harder to intercept and watch our communications. A coalition of civil liberties groups, progressive advocacy organizations and libertarian organizations is urging people to do just that. They&#8217;re calling it <a href="https://www.resetthenet.org/" target="_blank">Reset the Net</a>. On June 5th, they urge Internet users and web developers to begin using a wide variety of internet security tools to thwart the NSA. These tools include everything from open source encryption protocols to anonymity services like Tor. Reset the Net&#8217;s <a href="http://resetthenet.tumblr.com/post/84331967485/the-privacy-pack" target="_blank">privacy pack</a> specifically offers open source tools because these tools allow any user to test, verify and improve their security. Tools like this can be installed, designed and improved by any individual, with no permission needed from any government.</p>
<p>Reset the Net is an inspiring example of mainstream civil liberties groups from across the political spectrum embracing the anarchist tactic of <em>direct action.</em> Rather than begging governments to limit themselves or pass benevolent reforms, direct action takes change into our own hands without asking permission.</p>
<p>Direct action allows us to route around the state, to make its mass surveillance operations much more difficult to perpetuate. This is how we can and must end state criminality. Not by reforming the state, but by treating it as damage and routing around.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=27498&amp;md5=5e9111b935cf5373f0f02cc7dd041ac9" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/27498/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F27498&amp;language=en_GB&amp;category=text&amp;title=Don%26%238217%3Bt+Reform+the+Surveillance+State%2C+Route+Around+It&amp;description=Last+Thursday%2C+the+U.S.+House+of+Representatives+passed+something+called+%26%238220%3Bthe+USA+Freedom+Act.%26%238221%3B+The+bill+was+intended+by+its+authors+to+end+the+National+Security+Agency%26%238217%3Bs+broad+and+privacy-shredding...&amp;tags=anarchism%2Canarchist%2Canarchy%2Ccivil+liberties%2Ccounter-economics%2Ccounter-power%2Chuman+rights%2Cleft-libertarian%2Clibertarian%2Cmarket+anarchism%2CNSA%2CObama%2Cpolice+state%2Creset+the+net%2Csecurity+state%2Cstate%2Csurveillance%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>LAX Shootings: Propaganda of the Deed?</title>
		<link>http://c4ss.org/content/22324</link>
		<comments>http://c4ss.org/content/22324#comments</comments>
		<pubDate>Sat, 02 Nov 2013 18:00:20 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[propaganda]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[the quality of mercy]]></category>
		<category><![CDATA[tsa]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[violence]]></category>
		<category><![CDATA[war]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22324</guid>
		<description><![CDATA[In the late 19th and early 20th centuries, &#8220;propaganda of the deed&#8221; &#8212; individual acts of violence intended to inspire revolution &#8212; became the signature anarchist activity. Among the prominent casualties were French president Sadi Carnot, American president William McKinley and Italian King Umberto I. Although propaganda of the deed has faded into history as...]]></description>
				<content:encoded><![CDATA[<p>In the late 19th and early 20th centuries, &#8220;propaganda of the deed&#8221; &#8212; individual acts of violence intended to inspire revolution &#8212; became the signature anarchist activity. Among the prominent casualties were French president Sadi Carnot, American president William McKinley and Italian King Umberto I.</p>
<p>Although propaganda of the deed has faded into history as an actuality, it tends to pop up frequently in anti-anarchist demagoguery, and I can&#8217;t help but think it&#8217;s set to do so once again. Early state and media spin on the killing of Gerardo Hernandez, the first US Transportation Security Administration employee to die &#8220;in the line of duty,&#8221; already attributes &#8220;anti-government views&#8221; to his alleged killer, Paul Ciancia.</p>
<p>As an anarchist, I&#8217;m not a fan of propaganda by the deed for three reasons:</p>
<p>First, it&#8217;s strategically useless. No single act is likely to produce anarchist revolution in an environment not yet primed for such revolution.</p>
<p>Secondly, it&#8217;s tactically counter-productive. Anyone with the intelligence and energy to plan such an act could do so much more for the cause in other ways than getting himself killed or imprisoned in this kind of one-off project.</p>
<p>Finally, all such activities carry a heavy risk of &#8220;collateral damage&#8221; and we anarchists, unlike state actors, actually shoulder true responsibility for our actions instead of seeking excuses for them.</p>
<p>All that said, if Ciancia did what he&#8217;s accused of doing, in the manner he&#8217;s accused of doing it, whether he intended it as &#8220;progaganda of the deed&#8221; or not, he deserves the thanks and support of a grateful populace.</p>
<p>Former White House press secretary Robert Gibbs, a senior adviser to US president Barack Obama, justified the Obama regime&#8217;s cold-blooded murder of Abdulrahman al-Awlaki &#8212;  a 16-year-old American accused of no crime whatsoever &#8212; with the claim that if he didn&#8217;t want to be murdered, he should have &#8220;had a more responsible father&#8221; (his father, Anwar al-Awlaki, was in fact accused of crimes, although the evidence seemed pretty weak).</p>
<p>To riff on Gibbs: If Gerardo Hernandez didn&#8217;t want to be gunned down in reprisal for he and his fellow TSA employees&#8217; terrorism, he shouldn&#8217;t have accepted employment as a terrorist.</p>
<p>Yes, TSA is a terrorist organization. Its entire purpose is to frighten travelers for political purposes &#8212; the very definition of terrorism &#8212; by subjecting them to unwanted and unjustifiable searches of their property and persons, sometimes assaulting them sexually or otherwise in the process, sometimes abducting them.</p>
<p>By all accounts, Ciancia was extraordinarily careful in his attack. He asked each person he encountered whether or not they worked for TSA. Those who did not were sent on their way unharmed. He shot terrorists, and ONLY terrorists, with no &#8220;collateral damage.&#8221;</p>
<p>I don&#8217;t have to think that&#8217;s smart, or particularly useful to my cause, to admire both the morality of the action and the careful restraint with which it was performed.</p>
<p>The world would be a much nicer place if every government employee dreamed dark dreams of Paul Ciancia and his potential copycats every night, arrived at work every morning with those dreams very much in mind, and aspired only to keep a low, polite profile and cause no offense until such time as he or she could leave the life of crime and find a real job.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22324&amp;md5=71735366fdd9fa12ccd8cb4651800df9" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22324/feed</wfw:commentRss>
		<slash:comments>16</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22324&amp;language=en_GB&amp;category=text&amp;title=LAX+Shootings%3A+Propaganda+of+the+Deed%3F&amp;description=In+the+late+19th+and+early+20th+centuries%2C+%26%238220%3Bpropaganda+of+the+deed%26%238221%3B+%26%238212%3B+individual+acts+of+violence+intended+to+inspire+revolution+%26%238212%3B+became+the+signature+anarchist+activity.+Among+the+prominent...&amp;tags=anarchism%2Canarchist%2Canarchy%2Cpolitics%2Cpropaganda%2Csecurity+state%2Cstate%2Cthe+quality+of+mercy%2Ctsa%2Cunited+states%2Cviolence%2Cwar%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Phony Trade-off Between Privacy and Security</title>
		<link>http://c4ss.org/content/20903</link>
		<comments>http://c4ss.org/content/20903#comments</comments>
		<pubDate>Sun, 18 Aug 2013 16:00:49 +0000</pubDate>
		<dc:creator><![CDATA[Sheldon Richman]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=20903</guid>
		<description><![CDATA[Most people take it for granted — because they’ve heard it so many times from politicians and pundits — that they must trade some privacy for security in this dangerous world. The challenge, we’re told, is to find the right “balance.” Let’s examine this. On its face the idea seems reasonable. I can imagine hiring...]]></description>
				<content:encoded><![CDATA[<p>Most people take it for granted — because they’ve heard it so many times from politicians and pundits — that they must trade some privacy for security in this dangerous world. The challenge, we’re told, is to find the right “balance.” Let’s examine this.</p>
<p>On its face the idea seems reasonable. I can imagine hiring a firm to look after some aspect of my security. To do its job the firm may need some information about me that I don’t readily give out. It’s up to me to decide if I like the trade-off. Nothing wrong there. In a freed market, firms would compete for my business, and competition would pressure firms to ask only for information required for  their services. As a result, a minimum amount of information would be requested. If I thought even <em>that</em> was too much, I would be free to choose to look after my security myself. If I did business with a firm that violated the terms of our contract, I would have recourse. At the very least I could terminate the relationship and strike up another or none at all.</p>
<p>In other words, in the freed market I would find the right “balance” for myself, and you would do the same. One size wouldn’t be deemed to fit all. The market would cater to people with a range of security/privacy concerns, striking the “balance” differently for different people. That’s as it should be.</p>
<p>Actually, we can say that there would be no trade-off between privacy and security at all, because the information would be <em>voluntarily</em> disclosed by each individual on mutually acceptable terms. Under those circumstances, it wouldn’t be right to call what the firm does an “intrusion.”</p>
<p>But that sort of situation is not what Barack Obama, Mike Rogers, Peter King, and their ilk mean when they tell us that “we” need to find the right balance between security and privacy. They mean <em>they</em> will dictate to us what the alleged balance will be. <em>We </em>will have no real say in the matter, and they can be counted on to find the balance on the “security” side of the spectrum as suits their interests. That’s how these things work. (See <a href="http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html">“NSA broke privacy rules thousands of times per year, audit finds.”</a>) Unlike in a freed market, what the government does <em>is </em>intrusive, because it is done without our consent and often without our knowledge. (I hope no one will say that voting or continuing to live in the United States constitutes consent to invasions of privacy.)</p>
<p>Of course, our rulers can’t really set things to the security side of the spectrum because the game is rigged. When we give up privacy — or, rather, when our rulers take it — we don’t get security in return; we get a more intrusive state, which means we get more insecurity. Roderick Long made a similar point on his blog, <em><a href="http://aaeblog.com/2013/06/11/a-little-unbalanced/" target="_blank">The Austro-Athenian Empire</a></em>:</p>
<blockquote><p>In the wake of the recent NSA revelations, there’s increased talk about the need to “balance” freedom against security. I even see people recycling Larry Niven’s law that freedom + security = a constant.</p>
<p>Nonsense. What we want is not to be attacked or coercively interfered with — by anyone, be they our own government, other nations’ governments, or private actors. Would you call that freedom? or would you call it security?</p>
<p>You can’t trade off freedom against security because <em>they’re exactly the same thing</em>.</p></blockquote>
<p>Likewise, where the state is concerned, you can’t trade off privacy against security because<em>they’re exactly the same thing</em>. Anyone who reads dystopian novels knows that government access to personal information about people serves to inhibit and control them. That’s insecurity.</p>
<p>Now it will no doubt be said that while in one respect we are more insecure when “our” government spies on us (the scare quotes are to indicate that I think the U.S. government is an occupying power), in return we gain security against threats from others, say, al-Qaeda. But I see no prima facie case for favoring official domestic threats over freelance foreign threats. I’m reminded of what Mel Gibson’s character, Benjamin Martin, says in <a href="http://www.imdb.com/title/tt0187393/quotes" target="_blank"><em>The Patriot</em></a>: “Would you tell me please, Mr. Howard, why should I trade one tyrant three thousand miles away for three thousand tyrants one mile away? An elected legislature can trample a man’s rights as easily as a king can.”</p>
<p>Some foreigners might want to come here and kill Americans, but the U.S. government has been no slouch in that department. How many Americans who were sent by “their” government to fight in foreign wars never came back? How many came back with their lives shattered? The number dwarfs the number of casualties from terrorism.</p>
<p>Throw in the fact that some foreigners want to kill Americans only because Obama’s government (like George W. Bush’s and others before it) is killing them, and the phony nature of this alleged protection is clear.</p>
<p>Obama &amp; Co. say they welcome a public debate about calibrating the trade-off between security and privacy. No, they don’t. They wouldn’t even be going through the motions had it not been for the heroic whistleblower Edward Snowden, whom they are determined to lock away for life — if they catch him. A true debate is the last thing they want. What they want is a simulated debate in order to quiet public concern about spying.</p>
<p>As <a href="http://www.theatlantic.com/politics/archive/2013/08/obama-has-already-broken-his-pledge-on-surveillance-reform/278613/" target="_blank">Conor Friedersdorf</a> of the<em> Atlantic</em> points out, Obama’s new directive creating the Review Group on Intelligence and Communications Technologies is charged with “accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.” Unlike his public statement, the official directive says nothing about preventing violations of privacy and related abuses.</p>
<p>Friedersdorf comments,</p>
<blockquote><p>What happened to those goals? The closest the Monday directive comes to them is an instruction to remember “our need to maintain the public trust” as one of many policy considerations.</p>
<p>Forget whether abuses are happening, or whether privacy rights are in fact being protected. [Director of National Intelligence James] Clapper need only probe the perception of trust. Remember, this is a man with a demonstrated willingness to tell lies under oath when he decides doing so serves the greater good.</p></blockquote>
<p>We should reject the phony debate, the phony trade-off, and the phony “balance” that will be struck. There is a fundamental conflict of interest between the American people and the U.S. government. The sooner we learn that, the safer we’ll be.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=20903&amp;md5=0d7c80bb7b33b2283d34f36ece4766d7" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/20903/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F20903&amp;language=en_GB&amp;category=text&amp;title=The+Phony+Trade-off+Between+Privacy+and+Security&amp;description=Most+people+take+it+for+granted+%E2%80%94+because+they%E2%80%99ve+heard+it+so+many+times+from+politicians+and+pundits+%E2%80%94+that+they+must+trade+some+privacy+for+security+in+this+dangerous...&amp;tags=Edward+Snowden%2CNSA%2Cpolice+state%2Cpolitics%2Cprivacy%2Csecurity%2Csecurity+state%2Cstate%2Cunited+states%2Cblog" type="text/html" />
	</item>
	</channel>
</rss>
