<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Center for a Stateless Society &#187; surveillance</title>
	<atom:link href="http://c4ss.org/content/tag/surveillance/feed" rel="self" type="application/rss+xml" />
	<link>http://c4ss.org</link>
	<description>building public awareness of left-wing market anarchism</description>
	<lastBuildDate>Sat, 24 Jan 2015 03:46:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.1</generator>
	<item>
		<title>Don’t Reform the Surveillance State, Route Around It on Feed 44</title>
		<link>http://c4ss.org/content/32745</link>
		<comments>http://c4ss.org/content/32745#comments</comments>
		<pubDate>Thu, 16 Oct 2014 19:00:32 +0000</pubDate>
		<dc:creator><![CDATA[James Tuttle]]></dc:creator>
				<category><![CDATA[Feed 44]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[counter-economics]]></category>
		<category><![CDATA[counter-power]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[market anarchism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[reset the net]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[youtube]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=32745</guid>
		<description><![CDATA[C4SS Feed 44 presents Nathan Goodman&#8216;s “Don’t Reform the Surveillance State, Route Around It” read Christopher King and edited by Nick Ford. Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers...]]></description>
				<content:encoded><![CDATA[<p>C4SS Feed 44 presents <a href="http://c4ss.org/content/author/nathan-goodman" target="_blank">Nathan Goodman</a>&#8216;s “<a href="http://c4ss.org/content/27498" target="_blank">Don’t Reform the Surveillance State, Route Around It</a>” read Christopher King and edited by Nick Ford.</p>
<p><iframe width="500" height="375" src="http://www.youtube.com/embed/FNgrU_GcJBI?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers like Booz Allen Hamilton will tend to be eroded or defeated due to the power of these predatory interest groups. Or worse, they will be twisted to serve the interests of these oligarchs.</p>
<p>Legislative reform is a dead end, but there’s a better way. We can route around the state, thwart its surveillance efforts, and make it progressively harder to intercept and watch our communications.</p>
<p>Feed 44:</p>
<ul>
<li><a href="http://www.c4ss.org/" target="_blank" rel="nofollow nofollow">http://www.c4ss.org/</a></li>
<li><a href="http://www.youtube.com/user/c4ssvideos" target="_blank" rel="nofollow nofollow">http://www.youtube.com/user/<wbr />c4ssvideos</a></li>
<li><a href="https://itunes.apple.com/us/podcast/c4ss-media/id872405202?mt=2" target="_blank" rel="nofollow nofollow">https://itunes.apple.com/us/<wbr />podcast/c4ss-media/<wbr />id872405202?mt=2</a></li>
<li><a href="http://www.stitcher.com/podcast/smash-walls-radio/c4ss-media?refid=stpr" target="_blank" rel="nofollow nofollow">http://www.stitcher.com/<wbr />podcast/smash-walls-radio/<wbr />c4ss-media?refid=stpr</a></li>
<li><a href="https://twitter.com/C4SSmedia" target="_blank" rel="nofollow nofollow">https://twitter.com/<wbr />C4SSmedia</a></li>
</ul>
<p>Bitcoin tips welcome:</p>
<ul>
<li>1N1pF6fLKAGg4nH7XuqYQbKYXNxCnHBWLB</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=32745&amp;md5=82c267deee2cfec186cf321ef6ceb79c" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/32745/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F32745&amp;language=en_GB&amp;category=text&amp;title=Don%E2%80%99t+Reform+the+Surveillance+State%2C+Route+Around+It+on+Feed+44&amp;description=C4SS+Feed+44+presents%C2%A0Nathan+Goodman%26%238216%3Bs+%E2%80%9CDon%E2%80%99t+Reform+the+Surveillance+State%2C+Route+Around+It%E2%80%9D+read+Christopher+King+and+edited+by+Nick+Ford.+Moreover%2C+the+state+tends+to+secure+its+own+interests...&amp;tags=anarchism%2Canarchist%2Canarchy%2Ccivil+liberties%2Ccounter-economics%2Ccounter-power%2CFeed+44%2Chuman+rights%2Cleft-libertarian%2Clibertarian%2Cmarket+anarchism%2CNSA%2CObama%2Cpolice+state%2Creset+the+net%2Csecurity+state%2Cstate%2Csurveillance%2Cunited+states%2Cyoutube%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Weekly Libertarian Leftist And Chess Review 44</title>
		<link>http://c4ss.org/content/30480</link>
		<comments>http://c4ss.org/content/30480#comments</comments>
		<pubDate>Sun, 24 Aug 2014 23:00:37 +0000</pubDate>
		<dc:creator><![CDATA[Natasha Petrova]]></dc:creator>
				<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[Weekly Libertarian Leftist Review]]></category>
		<category><![CDATA[9-11]]></category>
		<category><![CDATA[blowback]]></category>
		<category><![CDATA[bombing]]></category>
		<category><![CDATA[caliphate]]></category>
		<category><![CDATA[drone assassination]]></category>
		<category><![CDATA[Egypt]]></category>
		<category><![CDATA[Ferguson]]></category>
		<category><![CDATA[GOP]]></category>
		<category><![CDATA[Hilary Clinton]]></category>
		<category><![CDATA[humanitarianism]]></category>
		<category><![CDATA[interventionism]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Islamic state]]></category>
		<category><![CDATA[leftists]]></category>
		<category><![CDATA[libertarians]]></category>
		<category><![CDATA[liberty]]></category>
		<category><![CDATA[patriarchal state]]></category>
		<category><![CDATA[police militarization]]></category>
		<category><![CDATA[propaganda]]></category>
		<category><![CDATA[repression]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[torture]]></category>
		<category><![CDATA[U.s. intervention]]></category>
		<category><![CDATA[war culture]]></category>
		<category><![CDATA[WW1]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=30480</guid>
		<description><![CDATA[Pepe Escobar discusses why Obama is bombing ISIS. Alex Kane discusses 11 facts about police militarization. Philip Giraldi discusses the GOP. John Maxwell Hamilton discusses how WW1 led to modern propaganda and surveillance. Charles Davis discusses how America helped make the Islamic state in Iraq and Syria. Joshua Cook discusses blowback in Iraq. Ted Snider...]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.lewrockwell.com/2014/08/no_author/why-obama-is-bombing-the-caliph%E2%80%A8/">Pepe Escobar discusses why Obama is bombing ISIS.</a></p>
<p><a href="http://www.alternet.org/civil-liberties/11-shocking-facts-about-americas-militarized-police-forces">Alex Kane discusses 11 facts about police militarization.</a></p>
<p><a href="http://www.unz.com/article/same-old-gop/">Philip Giraldi discusses the GOP.</a></p>
<p><a href="http://www.washingtonpost.com/opinions/happy-100th-birthday-information-warfare/2014/08/01/3786e262-1732-11e4-85b6-c1451e622637_story.html">John Maxwell Hamilton discusses how WW1 led to modern propaganda and surveillance.</a></p>
<p><a href="http://www.vice.com/read/america-helped-make-the-islamic-state-812">Charles Davis discusses how America helped make the Islamic state in Iraq and Syria.</a></p>
<p><a href="http://benswann.com/blowback-u-s-proxy-wars-led-to-the-rise-of-isis/">Joshua Cook discusses blowback in Iraq.</a></p>
<p><a href="http://original.antiwar.com/Ted_Snider/2014/08/13/the-american-response-to-isis-theyrepatterns-notcoincidences/">Ted Snider discusses the pattern on display in the U.S. response to ISIS. </a></p>
<p><a href="http://www.counterpunch.org/2014/08/14/police-militarism-in-america/">David Lindorff discusses police militarization.</a></p>
<p><a href="http://www.counterpunch.org/2014/08/14/us-still-funding-repression/">Medea Benjamin discusses the U.S. funding of repression in Egypt.</a></p>
<p><a href="http://www.alternet.org/world/obama-administration-exploiting-humanitarian-missions-push-shady-policies-abroad">Alex Kane discusses the use of humanitarianism as an excuse for U.S. intervention abroad.</a></p>
<p><a href="http://fff.org/explore-freedom/article/tgif-liberty-in-america-during-the-great-war/">Sheldon Richman discusses attacks on liberty during WW1.</a></p>
<p><a href="http://america.aljazeera.com/opinions/2014/8/islamic-state-caliphateiraqiranusobama.html">Immanuel Wallstein discusses the caliphate vs everyone else.</a></p>
<p><a href="http://original.antiwar.com/lucy/2014/08/14/missouri-shooting-provokes-mainstream-backlash-against-militarized-police/">Lucy Steigerwald discusses police militarization and the Michael Brown case.</a></p>
<p><a href="http://www.theamericanconservative.com/articles/james-madison-cheney-style/">Kevin R.C. Gutzman discusses Lynne Cheney&#8217;s book on James Madison.</a></p>
<p><a href="http://www.nytimes.com/2014/08/12/books/soldier-girls-by-helen-thorpe-explores-3-experiences.html?_r=0">Michiko Kakutani discusses a book on women soldiers.</a></p>
<p><a href="http://reason.com/archives/2014/08/16/rise-of-the-unholy-alliance/">Thaddeus Russell discusses alliances between libertarians and leftists.</a></p>
<p><a href="http://original.antiwar.com/justin/2014/08/17/back-to-the-sixties/">Justin Raimondo discusses how today is like the sixties. </a></p>
<p><a href="http://www.theatlantic.com/politics/archive/2014/08/7-pages-that-gave-president-obama-permission-to-kill-americans/378651/">Conor Friedersdorf discusses the memo allowing for drone assassination of American citizens.</a></p>
<p><a href="http://www.counterpunch.org/2014/08/18/hillary-the-hawk-flies-again/">Ralph Nader discusses Hilary the hawk.</a></p>
<p><a href="http://original.antiwar.com/eland/2014/08/18/blowback-from-more-intervention-in-iraq/">Ivan Eland discusses U.S. interventionism in Iraq.</a></p>
<p><a href="http://www.counterpunch.org/2014/08/19/militarism-is-a-public-safety-crisis/">David Swanson discusses how militarism is a public safety issue.</a></p>
<p><a href="http://www.counterpunch.org/2014/08/15/intervention-more-like-ceaseless-escalation/">Elliott Colla discusses ceaseless escalation in Iraq.</a></p>
<p><a href="http://www.salon.com/2014/08/16/patriots_dont_break_laws_why_excusing_torture_is_an_american_catastrophe/">Falguni A. Sheth discusses torture and Obama&#8217;s comments on it.</a></p>
<p><a href="http://www.counterpunch.org/2014/08/20/the-us-war-culture-has-come-home-to-roost/">Gilbert Mercier discusses how the war culture has come home to roost.</a></p>
<p><a href="http://reason.com/blog/2014/08/18/ferguson-iraq-and-the-legacy-of-911">Peter Suderman discusses the events in Ferguson, Iraq, and the legacy of 9-11.</a></p>
<p><a href="http://www.theamericanconservative.com/articles/americas-self-inflicted-iraq-defeat/">W. James Antle the third discusses American defeat in Iraq.</a></p>
<p><a href="http://www.tomdispatch.com/post/175883/tomgram%3A_william_astore%2C_the_bomber_will_always_get_funded_--_and_used/">William Astore discuses the U.S. fetish for bombing.</a></p>
<p><a href="http://www.washingtontimes.com/news/2014/aug/19/editorial-jersey-bounces-choice/">The Washington Times discusses the &#8220;nanny state&#8221; in New Jersey. I prefer the term patriarchal state.</a></p>
<p><a href="http://www.chessgames.com/perl/chessgame?gid=1531003">Reuben Fine defeats Arthur William Dake.</a></p>
<p><a href="http://www.chessgames.com/perl/chessgame?gid=1272103">Vladimir Akopian defeats Vladimir Kramnik</a></p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=30480&amp;md5=54be46c37b36260b2ff52351dd616de0" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/30480/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F30480&amp;language=en_GB&amp;category=text&amp;title=The+Weekly+Libertarian+Leftist+And+Chess+Review+44&amp;description=Pepe+Escobar+discusses+why+Obama+is+bombing+ISIS.+Alex+Kane+discusses+11+facts+about+police+militarization.+Philip+Giraldi+discusses+the+GOP.+John+Maxwell+Hamilton+discusses+how+WW1+led+to+modern...&amp;tags=9-11%2Cblowback%2Cbombing%2Ccaliphate%2Cdrone+assassination%2CEgypt%2CFerguson%2CGOP%2CHilary+Clinton%2Chumanitarianism%2Cinterventionism%2CIraq%2CISIS%2CIslamic+state%2Cleftists%2Clibertarians%2Cliberty%2Cpatriarchal+state%2Cpolice+militarization%2Cpropaganda%2Crepression%2Csurveillance%2CSyria%2Ctorture%2CU.s.+intervention%2Cwar+culture%2CWW1%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Privacy 2014: Google as an Arm of the Surveillance State</title>
		<link>http://c4ss.org/content/30136</link>
		<comments>http://c4ss.org/content/30136#comments</comments>
		<pubDate>Thu, 07 Aug 2014 18:00:29 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=30136</guid>
		<description><![CDATA[Convicted in 1994 of sexually assaulting a young boy, John Henry Skillern of Texas once again finds himself incarcerated and awaiting trial, this time for possession and production of child pornography. Skillern&#8217;s arrest comes courtesy of Google. Few, I expect, will shed tears for Skillern with respect to his alleged sexual predations. Nonetheless his case once more...]]></description>
				<content:encoded><![CDATA[<p>Convicted in 1994 of sexually assaulting a young boy, John Henry Skillern of Texas once again finds himself incarcerated and awaiting trial, this time for possession and production of child pornography. <a href="http://www.cnet.com/news/google-sees-alleged-child-porn-in-mans-email-alerts-police/">Skillern&#8217;s arrest comes courtesy of Google.</a> Few, I expect, will shed tears for Skillern with respect to his alleged sexual predations. Nonetheless his case once more brings Google into the privacy spotlight, this time as an arm of &#8220;law enforcement.&#8221;</p>
<p>Google makes no secret of the fact that it &#8220;analyzes content&#8221; in emails sent and received by users of its Gmail service, mostly for purposes of targeting advertising to users most likely to click thru and buy things. That&#8217;s how Google makes money &#8212; tracking users of its &#8220;free&#8221; services, watching what they do, selling those users&#8217; eyeballs to paying customers.</p>
<p>It&#8217;s also understood by most that Google will, <a href="http://www.google.com/policies/privacy/" target="_blank">as its privacy policy states</a>, &#8220;share personal information &#8230; [to] meet any applicable law, regulation, legal process or enforceable governmental request.&#8221; If the cops come a-knocking with a warrant or some asserted equivalent, Google cooperates with search and seizure of your stored information and records of your actions.</p>
<p>But Google goes farther than that. Their <a href="https://www.gmail.com/intl/en/mail/help/program_policies.html" target="_blank">Gmail program policies</a> unequivocally state that, among other things, &#8220;Google has a zero-tolerance policy against child sexual abuse imagery. If we become aware of such content, we will report it to the appropriate authorities and may take disciplinary action, including termination, against the Google Accounts of those involved.&#8221;</p>
<p>As a market anarchist, my visceral response to the Skillern case is &#8220;fair cop &#8212; it&#8217;s in the terms of service he agreed to when he signed up for a Gmail account.&#8221;</p>
<p>But there&#8217;s a pretty large gap between &#8220;we&#8217;ll let the government look at your stuff if they insist&#8221; and &#8220;we&#8217;ll keep an eye out for stuff that the government might want to see.&#8221; The latter, with respect to privacy, represents the top of a very slippery slope.</p>
<p>How slippery? Well, consider Google&#8217;s interests in &#8220;geolocation&#8221; (knowing where you are) and  in &#8220;the Internet of Things&#8221;  (connecting everything from your toaster to your thermostat to your car to the Internet, with Google as middleman).</p>
<p>It&#8217;s not out of the question that someday as you drive down the road, Google will track you and automatically message the local police department if it notices you&#8217;re driving 38 miles per hour in a 35-mph speed zone.</p>
<p>Think that can&#8217;t happen? Think again. In many locales, tickets (demanding payment of fines) are already automatically mailed to alleged red-light scofflaws caught by cameras. No need to even send out an actual cop with pad and pen. It&#8217;s a profit center for government &#8212; and for companies that set up and operate the camera systems. In case you haven&#8217;t noticed, Google really likes information-based profit centers.</p>
<p>And keep in mind that you are a criminal. Yes, really. At least if you live in the United States. Per Harvey Silverglate&#8217;s book <em>Three Felonies a Day</em>, the average American breaks at least three federal laws in every 24-hour period. Want to bet against the probability that evidence of those &#8220;crimes&#8221; can be detected in your email archive?</p>
<p>To a large degree the Internet has killed our old conceptions of what privacy means and to what extent we can expect it. Personally I&#8217;m down with that &#8212; I&#8217;m more than willing to let Google pry into my personal stuff to better target the ads it shows me, in exchange for its &#8220;free&#8221; services. On the other hand I&#8217;d like some limits. And I think that markets are capable of setting those limits.</p>
<p>Three market limiting mechanisms that come to mind are &#8220;end to end&#8221; encryption, services for obfuscating geographic location and locating servers in countries with more respect for privacy and less fear of &#8220;big dog&#8221; governments like the United States. If Google can&#8217;t or won&#8217;t provide those, someone else will (actually a number of someones already are).</p>
<p>The standard political mechanism for reining in bad actors like Google would be legislation forbidding Internet service companies to &#8220;look for and report&#8221; anything to government absent a warrant issued on probable cause to believe a crime has been committed. But such political mechanisms don&#8217;t work. As Edward Snowden&#8217;s exposure of the US National Security Agency&#8217;s illegal spying operations demonstrates, government ignores laws it doesn&#8217;t like.</p>
<p>Instead of seeking political solutions, I suggest a fourth market solution: Abolition of the state. The problem is not so much what Google tracks or what it might want to act on. Those are all a matter of agreement between Google and its users. The bigger problem is who Google might report you TO.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=30136&amp;md5=7dd6a60d556c9dd201a8755bb346d928" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/30136/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F30136&amp;language=en_GB&amp;category=text&amp;title=Privacy+2014%3A+Google+as+an+Arm+of+the+Surveillance+State&amp;description=Convicted+in+1994+of+sexually+assaulting+a+young+boy%2C+John+Henry+Skillern+of+Texas+once+again+finds+himself+incarcerated+and+awaiting+trial%2C%C2%A0this+time%C2%A0for+possession+and+production+of+child+pornography.+Skillern%26%238217%3Bs...&amp;tags=Google%2Cpolitics%2Cstate%2Csurveillance%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Don&#8217;t Reform the Surveillance State, Route Around It</title>
		<link>http://c4ss.org/content/27498</link>
		<comments>http://c4ss.org/content/27498#comments</comments>
		<pubDate>Sun, 25 May 2014 18:00:16 +0000</pubDate>
		<dc:creator><![CDATA[Nathan Goodman]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[anarchism]]></category>
		<category><![CDATA[anarchist]]></category>
		<category><![CDATA[anarchy]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[counter-economics]]></category>
		<category><![CDATA[counter-power]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[market anarchism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[reset the net]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=27498</guid>
		<description><![CDATA[Last Thursday, the U.S. House of Representatives passed something called &#8220;the USA Freedom Act.&#8221; The bill was intended by its authors to end the National Security Agency&#8217;s broad and privacy-shredding bulk data collection program, but the final version that passed is so weak that bulk data collection will still be permitted. Trevor Timm at the...]]></description>
				<content:encoded><![CDATA[<p>Last Thursday, the U.S. House of Representatives passed something called &#8220;the USA Freedom Act.&#8221; The bill was intended by its authors to end the National Security Agency&#8217;s broad and privacy-shredding bulk data collection program, but the final version that passed is so weak that bulk data collection will still be permitted.</p>
<p>Trevor Timm at the <em><a href="http://www.theguardian.com/commentisfree/2014/may/22/nsa-reform-bill-passed-house-usa-freedom-act-senators-only-hope" target="_blank">Guardian</a></em> writes, &#8220;in a compromise that moved the formerly strong legislation out of committee and into action, <a href="http://www.theguardian.com/commentisfree/2014/may/10/the-battle-to-retake-our-privacy-can-be-won-in-the-halls-of-congress-really">the bill was weakened significantly</a>: in came more immunity for telecoms, and out went tough transparency and provisions for the Fisa court, along with protections against <a href="http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data">warrantless &#8220;backdoor&#8221; searches</a> of your communications.&#8221;</p>
<p>The bill was later watered down further, widening NSA&#8217;s search powers and placing even more power in the hands of the Director of National Intelligence.</p>
<p>The bill&#8217;s <a href="http://www.motherjones.com/politics/2014/05/nsa-usa-freedom-act-weak">original backers</a> dropped their support for the USA Freedom Act.  &#8220;Under the finalized floor version of the USA Freedom Act, it would be completely legal for the NSA to request all records for an area code, zip code, or even all of the emails for accounts that start with the letter ‘A,’ all without a warrant,&#8221; US Rep. Thomas Massie (R-KY) says. Many <a href="http://thehill.com/policy/technology/206686-privacy-advocates-pull-support-for-watered-down-usa-freedom">civil liberties groups</a> also abandoned support for the bill.</p>
<p>These developments are disappointing, but not surprising. This is how government works. Bills are passed largely through logrolling, a process of give and take where propositions supported by different ideologies or interest groups are put together under one bill to increase its chance of passing. So bills originally intended to protect civil liberties often have provisions added to secure the support of hawks, statists and surveillance enthusiasts.</p>
<p>Moreover, the state tends to secure its own interests and those of concentrated special interest groups first and foremost. Bills that pose a substantial threat to the NSA, their telecom company collaborators or profiteers like Booz Allen Hamilton will tend to be eroded or defeated due to the power of these predatory interest groups. Or worse, they will be twisted to serve the interests of these oligarchs.</p>
<p>Legislative reform is a dead end, but there&#8217;s a better way. We can route around the state, thwart its surveillance efforts, and make it progressively harder to intercept and watch our communications. A coalition of civil liberties groups, progressive advocacy organizations and libertarian organizations is urging people to do just that. They&#8217;re calling it <a href="https://www.resetthenet.org/" target="_blank">Reset the Net</a>. On June 5th, they urge Internet users and web developers to begin using a wide variety of internet security tools to thwart the NSA. These tools include everything from open source encryption protocols to anonymity services like Tor. Reset the Net&#8217;s <a href="http://resetthenet.tumblr.com/post/84331967485/the-privacy-pack" target="_blank">privacy pack</a> specifically offers open source tools because these tools allow any user to test, verify and improve their security. Tools like this can be installed, designed and improved by any individual, with no permission needed from any government.</p>
<p>Reset the Net is an inspiring example of mainstream civil liberties groups from across the political spectrum embracing the anarchist tactic of <em>direct action.</em> Rather than begging governments to limit themselves or pass benevolent reforms, direct action takes change into our own hands without asking permission.</p>
<p>Direct action allows us to route around the state, to make its mass surveillance operations much more difficult to perpetuate. This is how we can and must end state criminality. Not by reforming the state, but by treating it as damage and routing around.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=27498&amp;md5=5e9111b935cf5373f0f02cc7dd041ac9" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/27498/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F27498&amp;language=en_GB&amp;category=text&amp;title=Don%26%238217%3Bt+Reform+the+Surveillance+State%2C+Route+Around+It&amp;description=Last+Thursday%2C+the+U.S.+House+of+Representatives+passed+something+called+%26%238220%3Bthe+USA+Freedom+Act.%26%238221%3B+The+bill+was+intended+by+its+authors+to+end+the+National+Security+Agency%26%238217%3Bs+broad+and+privacy-shredding...&amp;tags=anarchism%2Canarchist%2Canarchy%2Ccivil+liberties%2Ccounter-economics%2Ccounter-power%2Chuman+rights%2Cleft-libertarian%2Clibertarian%2Cmarket+anarchism%2CNSA%2CObama%2Cpolice+state%2Creset+the+net%2Csecurity+state%2Cstate%2Csurveillance%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>La Sicurezza su Internet È Responsabilità Nostra</title>
		<link>http://c4ss.org/content/26406</link>
		<comments>http://c4ss.org/content/26406#comments</comments>
		<pubDate>Thu, 17 Apr 2014 11:00:47 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Italian]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26406</guid>
		<description><![CDATA[Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti. Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e...]]></description>
				<content:encoded><![CDATA[<p>Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti.</p>
<p>Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e polizia segreta raccolgono informazioni su ogni attività potenzialmente sovversiva. Nell’era di internet e dello spionaggio governativo, le agenzie di spionaggio raccolgono informazioni su di noi – per lo più offerta ingenuamente da noi stessi tramite i <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html">social media</a> – a livelli che avrebbero reso verde d’invidia l’NKVD di Stalin. Quando finirà tutto ciò non lo sa nessuno; intanto, meno informazioni utili si possono raccogliere e meno efficace è il controllo dello stato su di noi. Per quanto riguarda gli attivisti nel primo mondo, forme di comunicazione private o anonime potrebbe la soluzione ideale per evitare <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters">l’arresto preventivo</a>. In posti come la Siria, poi, diventa una <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html">questione di vita o di morte</a>.</p>
<p>All’inizio speravo che compagnie come Google sarebbero venute in soccorso implementando potenti sistemi di criptografia; purtroppo sembra sempre più improbabile che imprese in mano agli azionisti e intrecciate con il governo possano offrire servizi sicuri efficacemente. Se è vero che queste compagnie, che fanno grossi profitti e spendono grosse somme in attività lobbistiche, sono le meglio posizionate nella lotta contro lo spionaggio di stato, è anche vero che sono quelle che hanno più da perdere se non tirano dritto.</p>
<p>Lavabit di Ladar Levison <i>era</i> un servizio di email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/">quasi sicuro</a>. Ad agosto Levison lo ha chiuso <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png">citando interferenze e minacce da parte del governo</a>. Secondo speculazioni terze, Levison aveva ricevuto una lettera della Nsa che chiedeva di ottenere dati sui clienti, probabilmente Edward Snowden. Recentemente si è scoperto che un giudice aveva emesso un ordine rivolto ad ottenere la chiave d’accesso SSL dei servizi offerti da Lavabit. Questa chiave permette una connessione criptata sicura tra utente e server. Il suo possesso dà la possibilità al governo di accedere in tempo reale alle informazioni mandate al sito dagli utenti. Questo a sua volta avrebbe reso possibile il rastrellamento delle credenziali e l’accesso alle email criptate dei 400.000 utenti di Lavabit.</p>
<p>Con suo grande merito, Ladar Levison decise di chiudere Lavabit, negando l’accesso all’archivio in cui sono custoditi i messaggi dei suoi clienti. Il suo rifiuto di principio è un’eccezione. Levison non aveva azionisti a cui rendere conto; solo se stesso e i suoi clienti. Non possiamo aspettarci che grosse imprese come Google, che finge di stare dalla nostra parte mentre in realtà cerca di <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">favorire l’intrusione del governo</a>, decidano di sfidare realmente lo stato. Altri, come la Microsoft, sembrano <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasti di collaborare con l’NSA</a> e altre agenzie a tre lettere.</p>
<p>Cosa significa per noi? Siamo condannati ad abbassare la testa? No! Dobbiamo prendere la cosa nelle nostre mani. Ci sono molti sistemi di criptografia gratis, <a href="http://https://it.wikipedia.org/wiki/Open_source">open source</a> e a <a href="http://https://it.wikipedia.org/wiki/Standard_aperto">standard aperto</a>. Da quel che sappiamo, l’NSA è riuscita a penetrare i sistemi criptografati solo tramite la <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercizione</a> e la <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">sovversione</a>, non decodificando il codice. Molto probabilmente, <a href="http://https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">possiamo ancora fidarci della matematica</a>.</p>
<p>Quando un progetto è open source, il suo codice è disponibile allo scrutinio generale. Possiamo esaminarlo, possiamo sapere esattamente come fa quello che fa. La maggior parte di noi non ha le conoscenze tecniche per esaminare il codice di un programma prima di compilarlo, ma ci sono esperti e accademici fidati che <a href="http://https://www.eff.org/press/archives/2008/02/21-0">possono farlo e lo fanno per noi</a>. Così possiamo conoscere i potenziali punti deboli del software di criptografia e capire i limiti delle sua capacità. Quando comunichiamo usando <a href="http://https://it.wikipedia.org/wiki/Pretty_Good_Privacy">PGP</a>, ad esempio, usiamo uno standard aperto. Non abbiamo bisogno di affidare i nostri messaggi ad una compagnia che magari è stata costretta dal governo a compromettere la nostra riservatezza. Con PGP la chiave d’accesso è nelle tue mani; nessun altro può essere costretto a rivelarla. Il <a href="http://c4ss.org/content/19091">progetto Tor</a>, più complesso, non è altrettanto ben definito. Per via della sua natura distribuita, le possibilità di abuso aumentano, ma il progetto è open source e questi possibili abusi sono documentati, e dunque possiamo studiarne i limiti.</p>
<p>La conclusione è che siamo tutti dentro. Se decidiamo di servirci dei servizi offerti dalle grosse compagnie, dobbiamo tenere conto del fatto che potrebbero comprometterci da un momento all’altro: non con la forza bruta ma con la coercizione. Con il <a href="http://https://it.wikipedia.org/wiki/Software_proprietario">software proprietario</a> non c’è modo di valutare e prendere per buone le dichiarazioni dello sviluppatore. E quando usiamo un software open source dobbiamo renderci conto delle sue limitazioni e usarlo di conseguenza.</p>
<p>La sicurezza su internet è responsabilità nostra.</p>
<p><a href="http://pulgarias.wordpress.com/" target="_blank">Traduzione di Enrico Sanna</a>.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26406&amp;md5=684f2227bf74516d3345d01fff66cdc8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26406/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26406&amp;language=en_GB&amp;category=text&amp;title=La+Sicurezza+su+Internet+%C3%88+Responsabilit%C3%A0+Nostra&amp;description=Man+mano+che+apprendiamo+altri+dettagli+sullo+spionaggio+governativo%2C+appare+sempre+pi%C3%B9+sconsiderato+affidare+la+nostra+sicurezza+a+terze+parti.+Lo+stato+vuole+informazioni+sicure+sui+suoi+soggetti.+Fin+dal...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Faux Withdrawal and Other Thoughts on Militarism</title>
		<link>http://c4ss.org/content/26230</link>
		<comments>http://c4ss.org/content/26230#comments</comments>
		<pubDate>Wed, 09 Apr 2014 23:00:33 +0000</pubDate>
		<dc:creator><![CDATA[Natasha Petrova]]></dc:creator>
				<category><![CDATA[Life, Love And Liberty]]></category>
		<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[afghanistan]]></category>
		<category><![CDATA[drone]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>
		<category><![CDATA[war]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26230</guid>
		<description><![CDATA[What do you call a &#8220;withdrawal&#8221; that doesn&#8217;t end drone strikes? A faux one. The term withdrawal implies an exit from the area. If U.S. drones will continue to kill people in Afghanistan, the military presence is not truly over. We should be worried about the continued and apparently indefinite use of imperial violence by...]]></description>
				<content:encoded><![CDATA[<p>What do you call a &#8220;withdrawal&#8221; that doesn&#8217;t end drone strikes? A faux one. The term withdrawal implies an exit from the area. If U.S. drones will continue to kill people in Afghanistan, the military presence is not truly over. We should be worried about the continued and apparently indefinite use of imperial violence by the U.S. government.</p>
<p>A full exit from the area is the only ethical and practical course of action. There is no moral justification for the further killing of Afghans to prop up a local state. This is especially true of a state as corrupt as the Afghan one, but it would apply to any state. On the practical side of the equation, it isn&#8217;t safe to keep making enemies via military occupation. The U.S. government endangers countless people by doing this.</p>
<p>Drone strikes are particularly noxious. They allow for easy remote control killing of suspected enemies of the state anywhere in the world. There are very few obstacles placed in the way of these death machines. Radicals are preferably the ones leading the charge against these killer devices. We left-libertarians can lead the way in opposing the death and destruction created by these monsters.</p>
<p>In the absence of ground troops and drones, the U.S. can still maintain control through a local client regime. This proxy force can wreak plenty of death and destruction too. It is preferable to be resolute in our opposition to both forms of control or occupation; both deserve condemnation for furthering coercive power exercised against Afghans and anyone else who happens to walk into territory claimed by the Afghan state. Power will not stand down without a determined opposition. We left-libertarians can take the lead in furthering that opposition.</p>
<p>What are the implications of continued U.S. drone strikes for the domestic front? At home, we can expect the importation of drones as a method of control. They can be used to surveil people anywhere on Earth. Such invasions of privacy are unacceptable and represent the growth of unaccountable concentrated power. This power will be exercised against all who displease the ruling class in some way or another. The time to fight back is now.</p>
<p>The state&#8217;s expansive military power is a threat not only to world peace, but the lives of those in the &#8220;homeland&#8221; too. The present superpower status of the U.S. does nothing but foment empire. We know that empires wreak death and destruction on a massive scale. Let&#8217;s put an end to the U.S. one.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26230&amp;md5=c51726c471b7800fbb4dcf584f418fda" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26230/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26230&amp;language=en_GB&amp;category=text&amp;title=The+Faux+Withdrawal+and+Other+Thoughts+on+Militarism&amp;description=What+do+you+call+a+%26%238220%3Bwithdrawal%26%238221%3B+that+doesn%26%238217%3Bt+end+drone+strikes%3F+A+faux+one.+The+term+withdrawal+implies+an+exit+from+the+area.+If+U.S.+drones+will+continue+to+kill...&amp;tags=afghanistan%2Cdrone%2Cdrones%2Cleft-libertarian%2Clibertarian%2CNorth+America%2Cpolitics%2Cstate%2Csurveillance%2Cunited+states%2Cwar%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Segurança Na Internet É Responsabilidade Nossa</title>
		<link>http://c4ss.org/content/22502</link>
		<comments>http://c4ss.org/content/22502#comments</comments>
		<pubDate>Tue, 12 Nov 2013 21:00:58 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22502</guid>
		<description><![CDATA[À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais. O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados...]]></description>
				<content:encoded><![CDATA[<p>À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais.</p>
<p>O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados buscaram informação pessoal acerca de seus cidadãos, especialmente em estados tirânicos, onde informantes e polícia secreta coletam informação acerca de qualquer e toda atividade potencialmente subversiva. Na era da Internet e do estado espreitador, agências de espionagem coletam informações acerca de nós que fariam a NKVD de Stalin morrer de inveja — muito dela ingenuamente entregue <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via mídia social</a>. Quando o estado espreitador será extinto depende do palpite de cada um mas, enquanto isso, quanto menos úteis forem os dados coletados a nosso respeito, menos eficaz será o controle do estado sobre nós. Para ativistas, o uso de comunicação privada ou anônima em países do primeiro mundo poderá ser a chave para evitar <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">prisão preventiva</a>. Em lugares como Síria, torna-se <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">questão de vida e morte</a>.</p>
<p>Inicialmente eu tive a esperança de que empresas como a Google acorreriam em socorro, por meio da implementação de poderosos sistemas de criptografia; infelizmente parece cada vez mais improvável que corporações comprometidas com acionistas e envolvidas com o governo possam criar, eficazmente, serviços da espécie. Embora essas grandes empresas, com seus alentados lucros e seus orçamentos para lobby, estejam provavelmente na melhor posição para revidar ao estado espreitador, são também as que mais têm a perder se não cooperarem ou fingirem cooperar.</p>
<p>A Lavabit, de Ladar Levison, <em>era</em> serviço de email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semisseguro</a>. Em agosto, Levison fechou a Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citando ameaças e interferência do governo</a>. Observadores especularam que Levison havia recebido uma Carta de Segurança Nacional exigindo dados de cliente, provavelmente do denunciante da Agência de Segurança Nacional &#8211; NSA Edward Snowden. Recentemente deslacrado documento de tribunal mostra ter sido expedido mandado para obtenção da chave do protocolo de segurança SSL do serviço Lavabit. Tal chave permite conexão segura criptografada entre usuário e servidor. Ter acesso a essa chave daria ao governo acesso em tempo real a informações enviadas ao site pelos usuários. Isso, por sua vez, permitiria ao governo coletar credenciais de login e ter acesso a emails criptografados dos 400.000 clientes da Lavabit.</p>
<p>Muito louvavelmente, Ladar Levison resolveu fechar a Lavabit — negando acesso às comunicações privadamente armazenadas dos clientes da empresa. Esse tipo de postura baseada em princípios éticos não é a regra. Levison não tinha acionistas aos quais prestar contas. Ele respondia a si próprio e a seus clientes. Não podemos esperar que grandes corporações tecnológicas como a Google, que projeta imagem pública de estar do nosso lado e em verdade tenta <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">dar divulgação ao intrometimento do governo</a>, efetivamente enfrente o governo quando compelidas por lei. Outras empresas, como a Microsoft, parecem <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasmadas com colaborar com a NSA</a> e outros órgãos governamentais de espionagem.</p>
<p>Ora bem, o que significa tudo isso para nós? Está tudo contra nós? Não! Temos que tomar o problema em nossas próprias mãos. Há uma multidão de projetos livres e de fonte aberta e padrões abertos para criptografia. Do que entendemos, a NSA tem quebrado criptografia por meio de <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coerção</a> e <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversão</a>, não por meio de tentativas de atacar cruamente os números e decifrar os códigos. Muito provavelmente, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">ainda podemos confiar na matemática</a>.</p>
<p>Quando um projeto é de fonte aberta, seu código fica aberto para escrutínio. Ele pode ser examinado pormenorizadamente e podemos saber exatamente como faz o que faz. Embora a maioria de nós não tenha conhecimento técnico para examinar o código de programa específico para esquadrinhá-lo antes de compilá-lo, pesquisadores e acadêmicos fidedignos <a href="https://www.eff.org/press/archives/2008/02/21-0">podem fazê-lo e esquadrinhá-los para nós</a>. Portanto, podemos estar cientes de vulnerabilidades em potencial do software de criptografia e saber os limites de suas aptidões. Quando nos comunicamos usando PGP, por exemplo, estamos usando padrão aberto. Não precisamos confiar nossa comunicação a uma empresa que poderá ter sido coagida pelo governo a comprometer nossa privacidade. Com PGP, estamos de posse de nossa<em>chave privada</em> e ninguém outro poderá ser forçado a entregá-la. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">O projeto Tor</a>, por causa de sua complexidade, não é tão claro. Por causa de sua natureza distribuída, há mais oportunidades de vulnerabilidade, mas o projeto é de fonte aberta e suas fraquezas em termos de exploração que dele tire proveito estão documentadas e, portanto, temos como entender seus limites.</p>
<p>As conclusões a que temos de chegar são no sentido de que estamos nisso juntos. Se resolvermos usar serviço de empresa que afirme ser tal serviço seguro, teremos de estar cientes de que o serviço poderá ser comprometido a qualquer momento — não por meio de força bruta, mas mediante força coercitiva. Com software de criptografia de fonte fechada não há como avaliar ou confiar nas afirmações do desenvolvedor. Quando usamos software de criptografia de fonte aberta, podemos tornar-nos conhecedores de suas limitações e usá-lo acordemente.</p>
<p>Segurança na Internet é responsabilidade nossa.</p>
<p>Artigo original afixado por <a title="Posts by William Sheppard" href="http://c4ss.org/content/22005" target="_blank">William Sheppard</a><a href="http://c4ss.org/content/22267" target="_blank"> em 26 de outubro de 2013</a>.</p>
<p>Traduzido do inglês por <a href="http://zqxjkv0.blogspot.com.br/2013/11/c4ss-internet-security-is-our.html" target="_blank">Murilo Otávio Rodrigues Paes Leme</a>.</p>
<p>&nbsp;</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22502&amp;md5=db1731b3190291346dc687c644538b70" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22502/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22502&amp;language=en_GB&amp;category=text&amp;title=Seguran%C3%A7a+Na+Internet+%C3%89+Responsabilidade+Nossa&amp;description=%C3%80+medida+que+ficamos+sabendo+de+cada+vez+mais+detalhes+acerca+da+espionagem+do+governo%2C+parece+cada+vez+mais+temer%C3%A1rio+confiar+nossa+seguran%C3%A7a+a+terceiros+empresariais.+O+estado+requer+que...&amp;tags=activism%2Cencryption%2Chacktivism%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Internet Security Is Our Responsibility</title>
		<link>http://c4ss.org/content/22005</link>
		<comments>http://c4ss.org/content/22005#comments</comments>
		<pubDate>Sat, 26 Oct 2013 18:00:13 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[Italian]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22005</guid>
		<description><![CDATA[As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses. The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in...]]></description>
				<content:encoded><![CDATA[<p lang="zxx">As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses.</p>
<p lang="zxx">The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in tyrannical states, where informants and secret police gather information on any and all potentially subversive activities. In the age of the Internet and the surveillance state, spy agencies collect information on us that would make Stalin&#8217;s NKVD green with envy &#8212; much of it naively handed over <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via social media</a>. When the surveillance state will be dismantled is anyone&#8217;s guess, but, in the meantime, the less useful data that can be collected on us the less effective the state&#8217;s control of us. For activists, use of private or anonymous communication in first world countries could be key to avoiding <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">pre-emptive arrest</a>, In places like Syria, it becomes a <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">matter of life and death</a>.</p>
<p lang="zxx">Initially, I had hoped companies like Google would come to the rescue by implementing powerful encryption systems; unfortunately it seems less and less likely that corporations beholden to shareholders and intertwined with government can effectively and securely create these services. While these big companies with their large profits and lobbying budgets are probably in the best position to fight back against the surveillance state, they  also have the most to lose if they don&#8217;t play along.</p>
<p lang="zxx">Ladar Levison&#8217;s Lavabit <em>was a</em> <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semi-secure</a> email service. In August, Levison shut down Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citing government threats and interference</a>. Observers speculated that Levison had received a National Security Letter demanding customer data, likely that of NSA whistleblower Edward Snowden. Recently unsealed court document show that a warrant was issued for the private SSL key for the Lavabit service. This key allows a secure encrypted connection between user and server. Having access to this key would give the government real time access to information being sent by users to the site. This in turn would allow them to scoop up log-in credentials and access the encrypted emails of any of Lavabit&#8217;s 400,000 customers.</p>
<p lang="zxx">Much to his credit, Ladar Levison decided to shut down Lavabit &#8212; denying access to the privately stored communications of its customers. This sort of principled stance is unexpected. Levison didn&#8217;t have shareholders to answer to. He answered to himself and his customers. We cannot expect large tech corporations like Google, who put forth the public image of being on our side and actually attempt to <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">publicize government intrusion</a>, to actually defy the government when compelled by law. Other players, such as Microsoft, appear to be <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">enthusiastic in their collaboration with the NSA</a> and other 3 letter agencies.</p>
<p lang="zxx">So what does this all mean for us? Is it all doom and gloom? No! We have to take this into our own hands. There are a multitude of free and open source projects and open standards for encryption. From what we understand, the NSA has broken encryption through <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercion</a> and <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversion</a>, not by raw attempts at bashing away at the numbers and cracking the codes. Most likely, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">we can still trust the mathematics</a>.</p>
<p lang="zxx">When a project is open source its code is open to scrutiny. It can be vetted and we can know exactly how it does what it does. While the majority of us do not have the technical know-how to look through the code of a specific program to vet it before compiling it,  trusted researchers and academics <a href="https://www.eff.org/press/archives/2008/02/21-0">can and do vet these for us</a>. Thus we can be aware of potential vulnerabilities of encryption software and know the limits of its capabilities. When we communicate with PGP, for example, we are using an open standard. We do not need to trust our communications to a company that may have been coerced by government to compromise our privacy. With PGP, you are  in possession of your <em>private key</em> and no one else can be made to hand it over. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">The Tor project</a>, due to its complexity, is not so clear cut. Because of its distributed nature, there are more opportunities for exploitation, but the project is open source and these potential exploits are documented so we are able to understand its limits.</p>
<p lang="zxx">The conclusions we must draw is that we are in this together. If we decide to use corporate service that claim to be secure, we must be aware that they could be compromised at any time &#8212; not through brute force, but coercive force. With closed source encryption software, there is no way to evaluate or trust the developer&#8217;s claims. When we use open source encryption software we must make ourselves aware of its limitations and use it accordingly.</p>
<p lang="zxx">Internet security is our responsibility.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/22502" target="_blank">Segurança Na Internet É Responsabilidade Nossa</a>.</li>
<li>Italian, <a href="http://c4ss.org/content/26406" target="_blank">La Sicurezza su Internet È Responsabilità Nostra</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22005&amp;md5=3bf3b15a706a898a9aa2a25cec4269f8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22005/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22005&amp;language=en_GB&amp;category=text&amp;title=Internet+Security+Is+Our+Responsibility&amp;description=As+we+learn+more+and+more+details+regarding+government+spying%2C+it+seems+more+and+more+foolhardy+to+trust+our+security+to+third+party+businesses.+The+state+requires+information+on+its...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Desmantelamento da Rede de Espionagem da NSA: Que Cara Teria o “Império da Lei”</title>
		<link>http://c4ss.org/content/21096</link>
		<comments>http://c4ss.org/content/21096#comments</comments>
		<pubDate>Thu, 29 Aug 2013 21:00:24 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=21096</guid>
		<description><![CDATA[“Conversa aberta, pública, com conhecimento de causa, acerca de escuta/grampo,” escreve Philip Bump em The Atlantic Wire, “tem sido meta declarada pelo presidente desde pouco depois de terem começado os vazamentos de Edward Snowden” (“Não é Considerado Excesso Obama Falar acerca da NSA em Segredo,” 9 de agosto). Numa sociedade governada pelo “império da lei” como retratada por...]]></description>
				<content:encoded><![CDATA[<p>“Conversa aberta, pública, com conhecimento de causa, acerca de escuta/grampo,” escreve Philip Bump em <em>The Atlantic Wire</em>, “tem sido meta declarada pelo presidente desde pouco depois de terem começado os vazamentos de Edward Snowden”<em> (</em><em><a href="http://www.theatlanticwire.com/politics/2013/08/private-or-public-obamas-nsa-outreach-flawed-outset/68163/" target="_blank">“Não é Considerado Excesso Obama Falar acerca da NSA em Segredo,”</a></em><em> </em>9 de agosto).</p>
<p>Numa sociedade governada pelo “império da lei” como retratada por nossos, hum, “governantes,” tal conversa — baseada nas próprias admissões públicas do Presidente dos Estados Unidos Barack Obama e em outras evidências existentes — começaria assim:</p>
<p style="padding-left: 30px;"><strong>Autoridade Policial:</strong> Barack Obama?</p>
<p style="padding-left: 30px;"><strong>Barack Obama:</strong> Sim?</p>
<p style="padding-left: 30px;"><strong>Autoridade Policial:</strong> Você está preso por violações do Código dos Estados Unidos, Título 18, Secção 241, Conspiração Contra Direitos; e Secção 242, Privação de Direitos Mediante Recurso a Falsa Credencial Legal. Você tem o direito de permanecer em silêncio quando algo lhe for perguntado. Qualquer coisa que você diga ou faça poderá ser usada contra você em tribunal. Você tem o direito de consultar advogado antes de falar com a polícia e de ter advogado presente durante questionamento agora ou no futuro. Se você não puder pagar advogado, será designado um para você, se assim desejar. Se você resolver responder a quaisquer perguntas agora, sem advogado presente, ainda assim terá o direito de parar de responder em qualquer momento até falar com advogado. Sabendo e compreendendo seus direitos como expliquei para você, está disposto a responder a minhas perguntas sem advogado presente?</p>
<p>Tenho examinado cuidadosamente edições recentes de jornais estadunidenses, e tanto quanto eu saiba isso ainda não aconteceu. Também parece bastante improvável que aconteça em qualquer momento do futuro próximo. Disso podemos com segurança concluir duas coisas:</p>
<p style="padding-left: 30px;">Primeiro, que a afirmação de Obama de desjar “conversa aberta, com conhecimento de causa, acerca de escuta/grampo” é, para falar sem papas na língua, mentira deslavada; e</p>
<p style="padding-left: 30px;">Segundo, que os políticos estadunidenses (ou membros da classe política em outros países) estão pouco ligando para submeterem-se, eles próprios, ao “império da lei.”</p>
<p>Obama já começou o processo usual de tanger o público de volta para o costumeiro estado de apatia, <a href="http://www.usatoday.com/story/theoval/2013/08/12/obama-national-security-agency-special-commission/2644187/" target="_blank">nomeando uma “Junta Revisora”</a>  para “avaliar se, à luz dos progressos em tecnologias de comunicação, os Estados Unidos empregam seus recursos de coleta técnica de maneira que proteja de maneira ótima nossa segurança nacional e promova nossa política externa levando em conta, ao mesmo tempo, outras considerações relativas a políticas, como o risco de revelação não autorizada e nossa necessidde de manter a confiança do público.”</p>
<p>Notem a peça faltante: Nenhuma referência, em absoluto, ao fato de que o uso desses recentemente revelados “recursos,” contra todas as pessoas, sem mandados baseados em causa provável, é patentemente ilegal. Essa “Junta Revisora” é pálida imitação de, e servirá à mesma função que, a<a href="http://en.wikipedia.org/wiki/Church_Committee" target="_blank">“Comissão Church”</a> de 1975 (formalmente “Comissão Especial do Senado dos Estados Unidos para Estudo de Operações Governamentais com Respeito a Atividades de Inteligência”), que — depois de um pouco de autoflagelação pública — nos aquinhoou com o Tribunal FISA secreto e outras extensões e ramificações da anterior desobediência à lei pelo governo.</p>
<p>Nem o governo político nem suas funções de “inteligência” podem ser “reformados.” A classe política trata o “império da lei” como arma contra, não como protetor, do público. Deem a esses escroques uma polegada e eles tomarão uma milha. É tempo de parar de dar aos inimigos da liberdade essas polegadas … e de tomar de volta as polegadas das quais eles têm abusado. Os Estados Unidos precisam ser extintos.</p>
<p>Artigo original afixado por <a href="http://c4ss.org/content/20785" target="_blank">Thomas L. Knapp em 14 de agosto de 2013</a>.</p>
<p>Traduzido do inglês por <a href="http://zqxjkv0.blogspot.com.br/2013/08/c4ss-breaking-nsa-spy-ring-what-rule-of.html" target="_blank">Murilo Otávio Rodrigues Paes Leme</a>.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=21096&amp;md5=71ae97bbb651926dfdfc9c8c9f271b00" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/21096/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F21096&amp;language=en_GB&amp;category=text&amp;title=Desmantelamento+da+Rede+de+Espionagem+da+NSA%3A+Que+Cara+Teria+o+%E2%80%9CImp%C3%A9rio+da+Lei%E2%80%9D&amp;description=%E2%80%9CConversa+aberta%2C+p%C3%BAblica%2C+com+conhecimento+de+causa%2C+acerca+de+escuta%2Fgrampo%2C%E2%80%9D+escreve+Philip+Bump+em%C2%A0The+Atlantic+Wire%2C+%E2%80%9Ctem+sido+meta+declarada+pelo+presidente+desde+pouco+depois+de+terem+come%C3%A7ado+os+vazamentos...&amp;tags=Edward+Snowden%2Cintelligence%2CObama%2Cpolitics%2CPortuguese%2Cstate%2CStateless+Embassies%2Csurveillance%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Breaking the NSA Spy Ring: &#8220;What Rule of Law&#8221; Would Look Like</title>
		<link>http://c4ss.org/content/20785</link>
		<comments>http://c4ss.org/content/20785#comments</comments>
		<pubDate>Wed, 14 Aug 2013 18:00:16 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[Obama]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=20785</guid>
		<description><![CDATA[&#8220;An open, public, informed conversation on surveillance,&#8221; writes Philip Bump in The Atlantic Wire, &#8220;has been the president&#8217;s stated goal since shortly after the Edward Snowden leaks began&#8221; (&#8220;It Doesn&#8217;t Count as Outreach When Obama Talks About the NSA in Secret,&#8221; August 9). In a society governed by &#8220;rule of law&#8221; as portrayed by our,...]]></description>
				<content:encoded><![CDATA[<p>&#8220;An open, public, informed conversation on surveillance,&#8221; writes Philip Bump in <em>The Atlantic Wire</em>, &#8220;has been the president&#8217;s stated goal since shortly after the Edward Snowden leaks began&#8221;<em><em> (<a href="http://www.theatlanticwire.com/politics/2013/08/private-or-public-obamas-nsa-outreach-flawed-outset/68163/" target="_blank">&#8220;It Doesn&#8217;t Count as Outreach When Obama Talks About the NSA in Secret,&#8221;</a> </em></em>August 9).</p>
<p>In a society governed by &#8220;rule of law&#8221; as portrayed by our, um, &#8220;rulers,&#8221; such a conversation &#8212; based on US President Barack Obama&#8217;s own public admissions and other existing evidence &#8212; would begin like this:</p>
<p style="padding-left: 30px;"><strong>Police Officer:</strong> Barack Obama?</p>
<p style="padding-left: 30px;"><strong>Barack Obama:</strong> Yes?</p>
<p style="padding-left: 30px;"><strong>Police Officer:</strong> You are under arrest for violations of United States Code, Title 18, Section 241, Conspiracy Against Rights; and Section 242, Deprivation of Rights Under Color of Law. You have the right to remain silent when questioned. Anything you say or do may be used against you in a court of law. You have the right to consult an attorney before speaking to the police and to have an attorney present during questioning now or in the future. If you cannot afford an attorney, one will be appointed for you before any questioning, if you wish. If you decide to answer any questions now, without an attorney present, you will still have the right to stop answering at any time until you talk to an attorney. Knowing and understanding your rights as I have explained them to you, are you willing to answer my questions without an attorney present?</p>
<p>I&#8217;ve carefully scoured recent editions of American newspapers, and as best I can tell this hasn&#8217;t happened yet. It also seems quite unlikely to happen any time in the near future. From this we can safely conclude two things:</p>
<p style="padding-left: 30px;">First, that Obama&#8217;s claim to desire &#8220;an open, public, informed conversation on surveillance&#8221; is, not to put too fine a point on it, a dirty rotten lie; and</p>
<p style="padding-left: 30px;">Secondly, that American politicians (or members of the political class in other countries) don&#8217;t much care to subject themselves to &#8220;rule of law.&#8221;</p>
<p>Obama has begun the usual process of nudging the public back into its usual state of apathy, <a href="http://www.usatoday.com/story/theoval/2013/08/12/obama-national-security-agency-special-commission/2644187/" target="_blank">appointing a &#8220;Review Board&#8221;</a>  to &#8220;assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.&#8221;</p>
<p>Note the missing piece: No reference at all to the fact that use of these recently revealed &#8220;capabilities,&#8221; versus anyone, without warrants based on probable cause, is plainly illegal. This &#8220;Review Board&#8221; is a pale imitation of, and will serve the same function as, the 1975 <a href="http://en.wikipedia.org/wiki/Church_Committee" target="_blank">&#8220;Church Committee&#8221;</a> (formally the &#8220;United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities&#8221;), which &#8212; after a bit of public self-flagellation &#8212; gave us the secret FISA Court and other extensions and ratifications of prior government lawlessness.</p>
<p>Neither political government nor its &#8220;intelligence&#8221; functions can be &#8220;reformed.&#8221; The political class treats &#8220;rule of law&#8221; as a weapon against, not a protector of, the public. Give these crooks an inch and they&#8217;ll take a mile. It&#8217;s time to stop giving the enemies of freedom those inches &#8230; and to take back the inches they&#8217;ve abused. The United States must be abolished.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/21096" target="_blank">Desmantelamento da Rede de Espionagem da NSA: Que Cara Teria o “Império da Lei”</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=20785&amp;md5=0fa7e91a486f41032423a6fb4501f8f8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/20785/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F20785&amp;language=en_GB&amp;category=text&amp;title=Breaking+the+NSA+Spy+Ring%3A+%26%238220%3BWhat+Rule+of+Law%26%238221%3B+Would+Look+Like&amp;description=%26%238220%3BAn+open%2C+public%2C+informed+conversation+on+surveillance%2C%26%238221%3B+writes+Philip+Bump+in+The+Atlantic+Wire%2C+%26%238220%3Bhas+been+the+president%26%238217%3Bs+stated+goal+since+shortly+after+the+Edward+Snowden+leaks+began%26%238221%3B+%28%26%238220%3BIt+Doesn%26%238217%3Bt...&amp;tags=Edward+Snowden%2Cintelligence%2CObama%2Cpolitics%2CPortuguese%2Cstate%2CStateless+Embassies%2Csurveillance%2Cunited+states%2Cblog" type="text/html" />
	</item>
	</channel>
</rss>
