Archive for the ‘.gov bullshit’ Category

 

Update on lawsuit  Here

 

***I wrote this post a few weeks ago.

Just want to note a couple things here-

Yes- I know what the Ohio state medical board has posted on their website concerning Dr. Yokiel.

I also know for a fact that the DEA regularly cuts deals with doctors which sends them to diversion programs for doctors. It happened to a friend I went to college with a few years ago.

She was not a drug user or alcoholic, but the DEA gave her no choice. It was you go to this program or you lose your license to practice medicine.

I believe the same thing happened with Dr Yokiel.***

I was one of Dr. Yokiel’s chronic pain patients,who was forced to undergo opiate withdrawls after being on the meds for 11 1/2 years.

I am trying to get a class action lawsuit going,and need some more former patients willing to be part of the suit.

I received,and saw a lot of others receive horrible care from Cleveland Clinic hospitals and Cleveland Clinic pain mgt programs. I was told I didn’t need any pain meds of any kind by the asshole at Euclid hospital pain mgt. Despite a record of serious injuries dating to 1978,over 60 ortho surgeries,and more broken bones than 90% of the population-(according to a few Dr’s and radiologists)

This is way beyond unethical,and violates every known medical standard for weaning a patient off of opiates.

Soooo….

Let’s sue the sonsofbitches who did this,including Dr Yokiel,Clevleand Clinic,the Ohio State Medical Board,and if I’m right about why Dr. Yokiel was shut down-the DEA.

This was done to chronic pain patients by our NE Ohio medical community,and state and likely fed agencies.

Our government and their fake ass “fighting  the opioid epidemic” did this to us.

This was not right,and should never happen to anyone who is a chronic pain patient again.

If a Dr decides that a chronic pain patient doesn’t need to be on pain meds-there is an established process for weaning people off of opiate pain meds-

and it sure as hell ain’t the Cleveland Clinic’s f*ck you-no one dies from opiate withdrawls.

If you’re a freakin heroin addict-they’ll admit you and wean you off opiates,and put you in a treatment program-if you’re a chronic pain patient…

The DEA is more interested in shutting down legit pain mgt docs who they feel write too many scripts than they are shutting down heroin and fentanyl dealers.

Think about that for a minute.

Lets sue these sonsabitches so they don’t keep doing this to chronic pain patients.

Contact me @

GamegetterII@yahoo.com

 

 

 

 

There is still a lot we don’t know regarding the WikiLeaks exposure of CIA cybersecurity documents this week. Many have suggested the documents may not be true or may have been tampered with before posting. And of course, everyone is wondering what the ramifications of such a revelation will be in terms of the CIA’s ability conduct its spycraft in the future. Some of the spying methods described in the documents may seem impossible, but I can attest that at least on that point, many of the tools described by the 8,000 documents do in fact exist.

According to what has been released so far, the CIA, through its Remote Devices Branch called UMBRAGE, maintains a library of hacking tools it has “stolen” from other groups. It goes on to explain the CIA can use the tools to compromise iOS and Android phones, and smart TVs, turning them into listening devices. It’s interesting to note the documents claim the CIA acquires these tools from others, instead of making them in-house.

That said, in my work as a reviewer of high-end security products, I have run across many of the hacking tools described in the leaked documents. In a few cases, companies have even provided them to me so I could challenge their defenses. I keep them in an air-gapped computer network along with my virus zoo, pulling them out whenever needed for a controlled test.

Full disclosure: I have no idea if I have the same tools the CIA is allegedly using, only that they seem to do many of the same things described by the WikiLeaks documents.

Hacking smart TVs seems to be getting the most attention, though it should come as the least surprising aspect of this. Smart TVs are basically all-in-one computers, only without any of the protections found on actual dedicated computers. That is why so many smart TVs ended up being part of the Mirai botnet.

In some cases, smart TVs seem to have been designed for spying. Vizio, which is one of the most popular manufacturers, recently agreed to pay $2.2 million in fines for secretly recording what people were watching and selling that data to advertisers.

The Vizio hacking tool, which was installed on new systems and allegedly also retrofitted to older TVs connected to the internet, was fairly ingenious. It would take snapshots of several pixels on the screen and then compare that to a database of what was playing. So, blue and blue and red might mean the user was watching the “Fresh off the Boat” sitcom, while black and white and green might line up with a feature movie. It required very little data to be sent from the TV back to the company, with all the high-end big data processing occurring after the data was captured.

Back to the alleged CIA tools. The CIA is supposed to be able to turn certain smart TVs into listening devices, while making it appear like the unit is turned off. I have recently tested a tool like that with a Samsung smart TV. I am not sure if it works with other types of TVs, but the tool I have uses a variant of the Samsung Screen Mirroring, modified to both record sound and keep its presence hidden from users.

As most TVs have no security, paring the hacking tool—which I was running off a Samsung tablet—with a TV is extremely easy. Simply select the TV in range you want to target. From there, I could share my screen with the TV, but the tool reverses this so users can instead see what is on the TV.

But then it gets interesting. By entering silent operation mode, the TV screen goes dark, as if whatever input is selected has no data. It also activates the internal microphone if the TV is equipped for videoconferencing, or uses the device’s speaker system if it’s not—though the sound quality is not nearly as good in the latter case.

From another room, I could clearly hear everything going on in the one with the TV. I even deployed this against a conference room setting, and the people talking in that room had no idea someone was listening in from a nearby office.

Read the rest here

h/t Curtis @ Mojave Desert Patriot

 

“The government prosecutors have said that there has been no evidence presented that the BLM showed or used force, and Judge Gloria Navarro agreed. She has ruled that the defense cannot present testimony that the BLM overstepped their bounds or used unnecessary force, such as the testimony of Margaret Houston.

Judge Navarro has also ruled that evidence of Dave Bundy’s arrest will not be allowed. Neither will the evidence of the BLM tazing Ammon Bundy repeatedly, or the evidence of the BLM killing the Bundy cattle.

Navarro also reiterated that Special Agent Dan Love will not be called to testify, and his current investigation into his illegal activities while in charge of the operations in Nevada were not to be brought into court.”

Shutting Down The Defense – UPDATES on Bunkerville Trial

Judge Openly LAUGHS At Defendants Rights

“Judge Navarro then backed up the prosecution when they threatened witnesses by naming them as “UNindicted Co-conspirators”. Navarro allowed this bullying, and took part in it herself.”

“Navarro also stated in the courtroom that no one is guaranteed their first amendment rights or their second amendment rights. Additionally, she told everyone that there is Never a time when anyone is allowed to defend themselves against a Law Enforcement Officer, even if they caught him breaking into their home. If he even sees a gun near them, they are guilty of assaulting him.

The defense had plans to call numerous witnesses, including Carole Bundy, Shawna Cox, Michele Fiore and more. Judge Navarro refused to allow them to testify because she feels their testimony might risk her jury to nullify.

Jury Nullification is her worst fear. She continues to tell the defense that she will not allow them to put on any defense that might sway her jury to nullify. This includes any information of why these men came to Bunkerville, the abuses of the BLM agents, and more.

Judge Navarro is quoted as saying, “The risk of jury nullification… for the jurors to hear about different defense witnesses, that can’t happen!” Navarro mentioned this at least three times during the day.”

Judge Openly LAUGHS At Defendants Rights

“And the truth is very subjective in her courtroom. She spent most of the morning going over jury instructions. She intends to instruct the jury that just carrying a holstered weapon can be a criminal act. She also does not intend to allow the jury to hear that there is a “Right To Carry” law in Nevada.”

“After the prosecution had extended time, over five weeks, and the defense has yet to be allowed to call any witnesses, the Judge asked the defense if they were ready to rest their case tomorrow”

Judge Navarro Pushes Defense To Rest Case in Bunkerville Trial

There’s much more on the trial,and the sleazy bullshit the feds are doing at the linked site.

 

REUTERS

Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified

Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

According to two of the former employees, Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled some senior executives and led to the June 2015 departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook Inc.

“Yahoo is a law abiding company, and complies with the laws of the United States,” the company said in a brief statement in response to Reuters questions about the demand. Yahoo declined any further comment.

Through a Facebook spokesman, Stamos declined a request for an interview.

The NSA referred questions to the Office of the Director of National Intelligence, which declined to comment.

The request to search Yahoo Mail accounts came in the form of a classified edict sent to the company’s legal team, according to the three people familiar with the matter.

U.S. phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad demand for real-time Web collection or one that required the creation of a new computer program.

“I’ve never seen that, a wiretap in real time on a ‘selector,'” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance issues for 20 years before moving to Stanford University this year. A selector refers to a type of search term used to zero in on specific information.

“It would be really difficult for a provider to do that,” he added.

Experts said it was likely that the NSA or FBI had approached other Internet companies with the same demand, since they evidently did not know what email accounts were being used by the target. The NSA usually makes requests for domestic surveillance through the FBI, so it is hard to know which agency is seeking the information.

Alphabet Inc’s Google and Microsoft Corp, two major U.S. email service providers, separately said on Tuesday that they had not conducted such email searches.

“We’ve never received such a request, but if we did, our response would be simple: ‘No way’,” a spokesman for Google said in a statement.

A Microsoft spokesperson said in a statement, “We have never engaged in the secret scanning of email traffic like what has been reported today about Yahoo.” The company declined to comment on whether it had received such a request.

CHALLENGING THE NSA

Under laws including the 2008 amendments to the Foreign Intelligence Surveillance Act, intelligence agencies can ask U.S. phone and Internet companies to provide customer data to aid foreign intelligence-gathering efforts for a variety of reasons, including prevention of terrorist attacks.

Disclosures by former NSA contractor Edward Snowden and others have exposed the extent of electronic surveillance and led U.S. authorities to modestly scale back some of the programs, in part to protect privacy rights.

Companies including Yahoo have challenged some classified surveillance before the Foreign Intelligence Surveillance Court, a secret tribunal.

Some FISA experts said Yahoo could have tried to fight last year’s demand on at least two grounds: the breadth of the directive and the necessity of writing a special program to search all customers’ emails in transit.

Apple Inc made a similar argument earlier this year when it refused to create a special program to break into an encrypted iPhone used in the 2015 San Bernardino massacre. The FBI dropped the case after it unlocked the phone with the help of a third party, so no precedent was set.

“It is deeply disappointing that Yahoo declined to challenge this sweeping surveillance order, because customers are counting on technology companies to stand up to novel spying demands in court,” Patrick Toomey, an attorney with the American Civil Liberties Union, said in a statement.

Some FISA experts defended Yahoo’s decision to comply, saying nothing prohibited the surveillance court from ordering a search for a specific term instead of a specific account. So-called “upstream” bulk collection from phone carriers based on content was found to be legal, they said, and the same logic could apply to Web companies’ mail.

As tech companies become better at encrypting data, they are likely to face more such requests from spy agencies.

Former NSA General Counsel Stewart Baker said email providers “have the power to encrypt it all, and with that comes added responsibility to do some of the work that had been done by the intelligence agencies.”

SECRET SIPHONING PROGRAM

Mayer and other executives ultimately decided to comply with the directive last year rather than fight it, in part because they thought they would lose, said the people familiar with the matter.

Yahoo in 2007 had fought a FISA demand that it conduct searches on specific email accounts without a court-approved warrant. Details of the case remain sealed, but a partially redacted published opinion showed Yahoo’s challenge was unsuccessful.

Some Yahoo employees were upset about the decision not to contest the more recent edict and thought the company could have prevailed, the sources said.

They were also upset that Mayer and Yahoo General Counsel Ron Bell did not involve the company’s security team in the process, instead asking Yahoo’s email engineers to write a program to siphon off messages containing the character string the spies sought and store them for remote retrieval, according to the sources.

The sources said the program was discovered by Yahoo’s security team in May 2015, within weeks of its installation. The security team initially thought hackers had broken in.

When Stamos found out that Mayer had authorized the program, he resigned as chief information security officer and told his subordinates that he had been left out of a decision that hurt users’ security, the sources said. Due to a programming flaw, he told them hackers could have accessed the stored emails.

Stamos’s announcement in June 2015 that he had joined Facebook did not mention any problems with Yahoo. (bit.ly/2dL003k)

In a separate incident, Yahoo last month said “state-sponsored” hackers had gained access to 500 million customer accounts in 2014. The revelations have brought new scrutiny to Yahoo’s security practices as the company tries to complete a deal to sell its core business to Verizon Communications Inc for $4.8 billion.

(Reporting by Joseph Menn; Editing by Jonathan Weber and Tiffany Wu)

source

 

Via THE RUTHERFORD INSTITUTE

PORTLAND, Oregon — Citing a lack of evidence, federal prosecutors have dismissed the government’s conspiracy charge against radio shock jock Pete Santilli, a new media journalist who was arrested and charged in connection with his reporting on the 41-day occupation of the Malheur National Wildlife Refuge in Burns, Oregon. The dismissal came on the eve of Santilli’s trial.

Attorneys for The Rutherford Institute advised Santilli’s court-appointed attorney, Thomas Coan, on the First Amendment protections for Santilli’s activities as a journalist. Santilli is the only journalist among those who were charged with conspiracy to impede federal officers from discharging their duties by use of force, intimidation, or threats. However, Santilli was charged solely as a reporter of information and not as an accomplice to any criminal activity.

In coming to Santilli’s defense, Institute attorneys warned that Santilli’s case followed a pattern by the government of intimidating journalists whose reporting portrays the government in a negative light or encourages citizens to challenge government injustice and wrongdoing.

The Rutherford Institute’s memorandum on the First Amendment rights of journalists and the government’s complaint regarding Santilli are available at www.rutherford.org.

“The FBI’s prosecution of this radio shock jock has been consistent with the government’s ongoing attempts to intimidate members of the press who portray the government in a less than favorable light,” said constitutional attorney John W. Whitehead, president of The Rutherford Institute and author of Battlefield America: The War on the American People. “This is not a new tactic. During the protests in Ferguson, Missouri, and Baltimore, Maryland, numerous journalists were arrested while covering the regions’ civil unrest and the conditions that spawned that unrest. These attempts to muzzle the press were clearly concerted, top-down efforts to restrict the fundamental First Amendment rights of the public and the press. Not only does this tactic silence individual journalists, but it has a chilling effect on the press as a whole, signaling that they will become the target of the government if they report on these events with a perspective that casts the government in a bad light.”

In early January 2016, a group of armed activists, reportedly protesting the federal government’s management of federal lands and its prosecution of two local ranchers convicted of arson, staged an act of civil disobedience by occupying the Malheur National Wildlife Refuge in Burns, Oregon. Broadcaster Pete Santilli, who has covered such protests in the past, including the April 2014 standoff in Nevada between the Bundy ranching family and the federal government over grazing rights, described himself as an embedded journalist reporting on the occupation in Burns. Santilli did not participate in the takeover of the refuge, nor did he reside on the grounds of the refuge.

However, as a self-described “shock jock” who uses “colorful language,” Santilli was vocal about his commitment to exercising his First Amendment rights in a nonviolent, peaceful fashion and the need for others to do so as well. When asked to clarify his role in relation to the occupation, Santilli declared, “My role is the same here that it was at the Bundy ranch. To talk about the constitutional implications of what is going on here. The Constitution cannot be negotiated.” Santilli also took pains to emphasize during his broadcasts that the only weapon he is using is the First Amendment: “I’m not armed. I am armed with my mouth. I’m armed with my live stream. I’m armed with a coalition of like-minded individuals who sit at home and on YouTube watch this.” In the wake of a roadblock that resulted in the arrests of several key leaders of the occupation and the killing of another, Santilli was arrested and eventually indicted with conspiracy to impede federal officers.

This press release is also available at www.rutherford.org.

 

By John W. Whitehead
June 28, 2016

“Our carceral state banishes American citizens to a gray wasteland far beyond the promises and protections the government grants its other citizens… When the doors finally close and one finds oneself facing banishment to the carceral state—the years, the walls, the rules, the guards, the inmates—reactions vary. Some experience an intense sickening feeling. Others, a strong desire to sleep. Visions of suicide. A deep shame. A rage directed toward guards and other inmates. Utter disbelief. The incarcerated attempt to hold on to family and old social ties through phone calls and visitations. At first, friends and family do their best to keep up. But phone calls to prison are expensive, and many prisons are located far from one’s hometown… As the visits and phone calls diminish, the incarcerated begins to adjust to the fact that he or she is, indeed, a prisoner. New social ties are cultivated. New rules must be understood.”—Ta-Nehisi Coates, The Atlantic

In a carceral state—a.k.a. a prison state or a police state—there is no Fourth Amendment to protect you from the overreaches, abuses, searches and probing eyes of government overlords.

In a carceral state, there is no difference between the treatment meted out to a law-abiding citizen and a convicted felon: both are equally suspect and treated as criminals, without any of the special rights and privileges reserved for the governing elite.

In a carceral state, there are only two kinds of people: the prisoners and the prison guards.

With every new law enacted by federal and state legislatures, every new ruling handed down by government courts, and every new military weapon, invasive tactic and egregious protocol employed by government agents, “we the people”—the prisoners of the American police state—are being pushed that much further into a corner, our backs against the prison wall.

This concept of a carceral state in which we possess no rights except for that which the government grants on an as-needed basis is the only way I can begin to comprehend, let alone articulate, the irrational, surreal, topsy-turvy, through-the-looking-glass state of affairs that is being imposed upon us in America today.

As I point out in my book Battlefield America: The War on the American People, we who pretend we are free are no different from those who spend their lives behind bars.

Indeed, we are experiencing much the same phenomenon that journalist Ta-Nehisi Coates ascribes to those who are banished to a “gray wasteland far beyond the promises and protections the government grants its other citizens” : a sickening feeling, a desire to sleep, hopelessness, shame, rage, disbelief, clinginess to the past and that which is familiar, and then eventually resignation and acceptance of our new “normal.”

All that we are experiencing—the sense of dread at what is coming down the pike, the desperation, the apathy about government corruption, the deeply divided partisanship, the carnivalesque political spectacles, the public displays of violence, the nostalgia for the past—are part of the dying refrain of an America that is fading fast.

No longer must the government obey the law.

Likewise, “we the people” are no longer shielded by the rule of law.

While the First Amendment—which gives us a voice—is being muzzled, the Fourth Amendment—which protects us from being bullied, badgered, beaten, broken and spied on by government agents—is being disemboweled.

For instance, in a recent 5-3 ruling in Utah v. Strieff, the U.S. Supreme Court opened the door for police to stop, arrest and search citizens without reasonable suspicion or probable cause, effectively giving police a green light to embark on a fishing expedition of one’s person and property, rendering Americans completely vulnerable to the whims of any cop on the beat.

In a blistering dissent, Justice Sonia Sotomayor blasted the court for holding “that the discovery of a warrant for an unpaid parking ticket will forgive a police officer’s violation of your Fourth Amendment rights.” Sotomayor continued:

This Court has allowed an officer to stop you for whatever reason he wants—so long as he can point to a pretextual justification after the fact. That justification must provide specific reasons why the officer suspected you were breaking the law, but it may factor in your ethnicity, where you live, what you were wearing, and how you behaved. The officer does not even need to know which law you might have broken so long as he can later point to any possible infraction—even one that is minor, unrelated, or ambiguous.

The indignity of the stop is not limited to an officer telling you that you look like a criminal. The officer may next ask for your “consent” to inspect your bag or purse without telling you that you can decline. Regardless of your answer, he may order you to stand “helpless, perhaps facing a wall with [your] hands raised.” If the officer thinks you might be dangerous, he may then “frisk” you for weapons. This involves more than just a pat down. As onlookers pass by, the officer may “‘feel with sensitive fingers every portion of [your] body. A thorough search [may] be made of [your] arms and armpits, waistline and back, the groin and area about the testicles, and entire surface of the legs down to the feet.’”

If you still can’t read the writing on the wall, Sotomayor breaks it down further: “This case allows the police to stop you on the street, demand your identification, and check it for outstanding traffic warrants—even if you are doing nothing wrong… So long as the target is one of the many millions of people in this country with an outstanding arrest warrant, anything the officer finds in a search is fair game for use in a criminal prosecution. The officer’s incentive to violate the Constitution thus increases…”

Just consider some of the many other ways in which the Fourth Amendment—which ensures that the government can’t harass you, let alone even investigate you, without probable cause—has been weakened and undermined by the courts, the legislatures and various government agencies and operatives.

Breath tests, blood draws: Americans have no protection against mandatory breathalyzer tests at a police checkpoint, although mandatory blood draws violate the Fourth Amendment (Birchfield v. North Dakota).

Ignorance of the law is defensible if you work for the government: Police officers who violate the law can be granted qualified immunity if they claim ignorance of the law (Heien v. North Carolina). That rationale was also applied to police who clearly used excessive force when they repeatedly tasered a pregnant woman during a routine traffic stop and were granted immunity from prosecution (Brooks v. City of Seattle).

Highspeed car chases: Police officers can use lethal force in car chases without fear of lawsuits (Plumhoff v. Rickard).

Noknock raids: Police can perform a “no-knock” as long as they have a reasonable suspicion that knocking and announcing their presence, under the particular circumstances, would be dangerous or futile or give occupants a chance to destroy evidence of a crime (Richards v. Wisconsin). Legal ownership of a firearm is also enough to justify a no-knock raid by police (Quinn v. Texas).

Warrantless searches by police: Police can carry out warrantless searches on our homes based on a “reasonable” concern by police that a suspect (or occupant) might be attempting to destroy evidence, fleeing or hurt, even if it’s the wrong house (Kentucky v. King). Police can also, without a warrant, search anyone who has been lawfully arrested (United States v. Robinson) as well as their property post-arrest (Colorado v. Bertine) and their vehicle (New York v. Belton), search a car they suspect might contain evidence of a crime (Chambers v. Maroney), and search a home when the arrest is made on its premises (Maryland v. Buie).

Forced DNA extractions: Police can forcibly take your DNA, whether or not you’ve been convicted of a crime. Innocent or not, your DNA will then be stored in the national FBI database (Maryland v. King).

Strip searches: Police can subject Americans to virtual strip searches, no matter the “offense” (Florence v. Board of Chosen Freeholders of the County of Burlington). This “license to probe” is now being extended to roadside stops, as police officers throughout the country have begun performing roadside strip searches—some involving anal and vaginal probes—without any evidence of wrongdoing and without a warrant.

Seizures: For all intents and purposes, you’re “seized” within the meaning of the Fourth Amendment from the moment an officer stops you (Brendlin v. California).

Search warrants on a leash: Police have free reign to use drug-sniffing dogs as “search warrants on leashes,” justifying any and all police searches of vehicles stopped on the roadside (Florida v. Harris), but the use of a K-9 unit after a reasonable amount of time has passed during a stop does violate the Fourth Amendment (Rodriguez v. United States).

Police and DUI Checkpoints: Police can conduct sobriety and “information-seeking” checkpoints (Illinois v. Lidster and Mich. Dept of State Police v. Sitz).

Interrogating public transit passengers: Police officers are free to board a bus, question passengers, and ask for consent to search without notifying them of their right to refuse (U.S v. Drayton).

Warrantless arrests for minor criminal offenses: Police can arrest you for minor criminal offenses, such as a misdemeanor seatbelt violation, punishable only by a fine (Atwater v. City of Lago Vista).

Stop and identify: Refusing to answer when a policeman asks “What’s your name?” can rightfully be considered a crime. No longer do Americans, even those not charged with any crime, have the right to remain altogether silent when stopped and questioned by a police officer (Hiibel v. Sixth Judicial District Court of the State of Nevada).

Traffic stops: As long as police have reasonable cause to believe that a traffic violation occurred, they may stop any vehicle (Whren v. U.S.). If probable cause justifies a vehicle search, then every part of the vehicle can be searched (U.S. v. Ross). A vehicle can be stopped even if the driver has not committed a traffic offense (U.S. v. Cortez).

Anonymous tips, careful driving, rigid posture and acne: Police officers can stop cars based only on “anonymous” tips (Navarette v. California). Police can also pull you over if you are driving too carefully, with a rigid posture, taking a scenic route, and have acne (U.S. v. Westhoven).

What many Americans fail to understand is the devastating amount of damage that can be done to one’s freedoms long before a case ever makes its way to court by government agents who are violating the Fourth Amendment at every turn. This is how freedoms, long undermined, can give way to tyranny through constant erosion and become part of the fabric of the police state through constant use.

Phone and email surveillance, databases for dissidents, threat assessments, terror watch lists, militarized police, SWAT team raids, security checkpoints, lockdowns, roadside strip searches: there was a time when any one of these encroachments on our Fourth Amendment rights would have roused the public to outrage. Today, such violations are shrugged off matter-of-factly by Americans who have been assiduously groomed to accept the intrusions of the police state into their private lives.

So when you hear about the FBI hacking into Americans’ computers without a warrant with the blessing of the courts, or states assembling and making public terror watch lists containing the names of those who are merely deemed suspicious, or the police knocking on the doors of activists in advance of political gatherings to ascertain their plans for future protests, or administrative government agencies (such as the FDA, Small Business Administration, Smithsonian, Social Security, National Oceanic and Atmospheric Administration, U.S. Mint, and Department of Education) spending millions on guns and ammunition, don’t just matter-of-factly file it away in that part of your brain reserved for things you may not like but over which you have no control.

It’s true that there may be little the average person can do to push back against the police state on a national level, but there remains some hope at the local level as long as we retain a speck of our independence and individuality—as long as we can resist the defeatist sense of double-consciousness (a phrase coined by W. E. B. Du Bois in which we view ourselves as inferior through the prism of our oppressors)—as long as we continue to cry out for justice for ourselves and those around us—as long as we refuse to be shackled and made prisoners—and as long as we continue to recognize that the only way the police state can truly acquire and retain power is if we relinquish it through our negligence, complacence and ignorance.

Unfortunately, we have been utterly brainwashed into believing the government’s propaganda and lies. Americans actually celebrate with perfect sincerity the anniversary of our independence from Great Britain without ever owning up to the fact that we are as oppressed now—more so, perhaps, thanks to advances in technology—than we ever were when Redcoats stormed through doorways and subjected colonists to the vagaries of a police state.

You see, by gradually whittling away at our freedoms—free speech, assembly, due process, privacy, etc.—the government has, in effect, liberated itself from its contractual agreement to respect our constitutional rights while resetting the calendar back to a time when we had no Bill of Rights to protect us from the long arm of the government.

Aided and abetted by the legislatures, the courts and Corporate America, the government has been busily rewriting the contract (a.k.a. the Constitution) that establishes the citizenry as the masters and agents of the government as the servants. We are now only as good as we are useful, and our usefulness is calculated on an economic scale by how much we are worth—in terms of profit and resale value—to our “owners.”

Under the new terms of this one-sided agreement, the government and its many operatives have all the privileges and rights and “we the prisoners” have none.

As Sotomayor concluded in her ringing dissent in Utah v. Strieff:

By legitimizing the conduct that produces this double consciousness, this case tells everyone, white and black, guilty and innocent, that an officer can verify your legal status at any time. It says that your body is subject to invasion while courts excuse the violation of your rights. It implies that you are not a citizen of a democracy but the subject of a carceral state, just waiting to be cataloged. We must not pretend that the countless people who are routinely targeted by police are “isolated.” They are the canaries in the coal mine whose deaths, civil and literal, warn us that no one can breathe in this atmosphere. They are the ones who recognize that unlawful police stops corrode all our civil liberties and threaten all our lives. Until their voices matter too, our justice system will continue to be anything but.

This commentary is also
available at www.rutherford.org.

fbi-terrorist-plotBy William N. Grigg

The FBI once again appears to have averted a terrorist plot of its own manufacture by arresting 57-year-old William Keebler, a man from Stockton, Utah described in press accounts as a militia organizer exhibiting an “extreme hatred” for the federal government. A vociferous critic of the federal Bureau of Land Management who was present during the April 2014 standoff in Bunkerville, Nevada, Keebler was a close friend of the late LaVoy Finicum. FBI agents arrested  Keebler in Nephi, Utah Wednesday morning after he allegedly attempted to bomb a vacant cabin owned by the BLM.

According to a federal charging document, for the past several months FBI undercover operatives have been members of Keebler’s militia, the Patriots Defense Force, which met at his home in Stockton, Utah. On many occasions, he expressed the entirely reasonable view that “the BLM was overreaching their authority to implement grazing restrictions on ranchers” and insisted that state and local governments, rather than Washington, should be in charge of public lands in the western States.

Predicting that future confrontations with the Feds might make violent resistance necessary, Keebler reportedly conducted training exercises and “talked about gathering intelligence on potential targets,” such as the BLM office in Salt Lake City. He made it clear, however, that “he didn’t plan on blowing people up for now”; the federal probable cause affidavit characterizes Keebler’s attitude as wanting his group “to be prepared to escalate things, and take people out if necessary.”

Last April, a federal informant “tasked with building Keebler an explosive device” — the charging document, significantly, doesn’t specify by whom the informant had been “tasked” — showed the subject a video of “a 6-inch pipe bomb blowing up some abandoned furniture in the mountains of southern Utah.” That overt act, which was carried out by a federal asset without (as far as the available evidence shows) Keebler’s approval, advance knowledge, or involvement, is described as an act in which he “maliciously damage[d]” and “destroy[ed] … personal or real property.

A few weeks later, Keebler allegedly selected the abandoned BLM cabin in Arizona as a target. The FBI-controlled informant produced what he described as two pipe bombs — one to be placed at the target and detonated via remote control, the other “was to be used against law enforcement” in the event this was necessary. Late Tuesday night (June 21), someone — the document doesn’t specify who it was — placed “an inert explosive device … against the door of one of the BLM cabins in Mount Turnbull. After the device was placed against the door, Keebler was handed a remote detonation device. Keebler then pushed the detonator button multiple times in order to remotely detonate the inert explosive.” He then departed for Utah, where FBI agents arrested him several hours later.

Keebler spent 13 days in Bunkerville and spent time in the company of the late LaVoy Finicum, whose funeral he attended in Kanab, Utah last February. Significantly, Keebler and several members of his militia were in attendance at an April 1 event in Orem, Utah featuring speeches by Finicum’s widow and Shawna Cox, who was an eyewitness to Finicum’s killing. That event was attended by hundreds of people whom the Feds would characterize as “anti-government extremists.”

“Some people who were with [Keebler] were videotaping all of the speakers with very expensive, professional-grade equipment,” a Utah broadcaster who attended the event told The Free Thought Project. “They were walking the room taking note of everybody who was there.”

According to the timeline described sketchily in the federal probable cause affidavit, it was at about this time that the FBI’s Homeland Security Theater Troupe was finishing its scheme to snare Keebler in a bogus bombing plot.

One likely purpose of this FBI-scripted operation is to depict the late LaVoy Finicum — who has emerged as a folk hero for many residents of the rural West — as a would-be terrorist bomber. The arrest affidavit takes great care to accuse Finicum of scouting out the location eventually used in the FBI-controlled false flag attack. That allegation, which Finicum is no longer alive to dispute, is already being retailed by some progressive media outlets.

One’s personal feelings on the unfoldings in Oregon earlier this year are irrelevant when considering the reality of the situation. This attempted ‘bombing,’ like the overwhelming majority of FBI-foiled terror plots, was little more than a staged scene with easily manipulated actors — being entirely scripted, directed, and produced by the federal government. Though this was theater on a virtually fictional scale, the fruits of the federal government’s success in thwarting their own scheme will be the loss of liberty for all — in spite of the current target only being ‘preppers’ and ‘anti-government constitutionalists.’

William N. Grigg writes for TheFreeThoughtProject.com, where this article first appeared.

Conclusion: This attack on dissent is serious. Educate your family and friends about what’s going on. Do not be fooled by their propaganda, but beware of the risks of speaking out too freely.

Believe in conspiracy theories? You’re probably a narcissist: People who doubt the moon landings are more likely to be selfish and attention-seeking … Psychologists from the University of Kent carried out three online studies … -UK Daily Mail

We are seeing an increasing number of academic studies analyzing the psychology behind “conspiracy theorists” and those who question government propaganda. The idea being that people who don’t trust government may be mentally ill.

These analyses are published in prominent publications in the UK and are building a “scientific” literature revolving psychological dysfunction and “conspiracy theory.”

More:

Do you think the moon-landings were faked, vaccines are a plot for mind control, or that shadowy government agencies are keeping alien technology locked up in hidden bunkers?

If so, chances are you’re a narcissist with low self-esteem, according to psychologists. In the internet age conspiracy theories can incubate in quiet corners of the web, but it may be psychological predispositions of believers which keep them alive, rather than cold hard facts.

The article goes on to explain that researchers at the University of Kent have used online studies  from hundreds of people to generate the study’s conclusions.

The findings appeared in the journal Social Psychological and Personality Science with the suggestion that those who adopt conspiracy theories have “outwardly inflated self-confidence” but may be “overcompensating for a lack of belief in themselves.”

The article mentions a previous study conducted by Oxford’s Dr. David Robert Grimes.

From what we’ve written on this study:

Grimes had the idea that mathematics could prove or disprove certain conspiracy theories. A physicist, he “developed a mathematical equation to derive the truth of conspiracy theories,” according to the Christian Science Monitor …

Grimes calculated that the moon landing and climate change conspiracies “would require about 400,000 secret-keepers each, the unsafe vaccination conspiracy would involve 22,000 people, and the cancer cure conspiracy would involve over 710,000 people.”  Even with the utmost secrecy, Grimes reports, his equations show within four years the conspiracies would be exposed nonetheless.

At the time, we commented on Grimes’s apparent “earnestness” in struggling to “understand how people can even engage in conspiratorial thinking to begin with.” We made this comment in relationship to yet a third article on the psychology of conspiracy.

This commentary appeared in the Guardian and, as we pointed out, “argued against conspiratorial thinking based on a new book, Suspicious Minds … written by Rob Brotherton.”

Basically, the idea is that people are naturally prone to conspiracy theories because of the way their brains have evolved. “Identifying patterns and being sensitive to possible threats,” the article explains, “is what has helped us survive in a world where nature often is out to get you.”

Brotherton explains in the article that he decided that the best way to present his thesis was to avoid confronting conspiracy theories head on. Instead, he wanted to explain how people adopted such theories for psychological reasons.

“I wanted to take a different approach, to sidestep the whole issue of whether the theories are true or false and come at it from the perspective of psychology. The intentionality bias, the proportionality bias, confirmation bias. We have these quirks built into our minds that can lead us to believe weird things without realising that’s why we believe them.”

So here we have three explanations of conspiracy theories presented by major publications in less than three month’s time. And, who knows, perhaps there were more.

In the conclusion to our Grimes’ analysis, we noted that: “It looks as if a more powerful and disciplined program may be underway. Something to ponder along with a further moderation of certain public declarations.”

By “public declarations” we meant those of individuals prone to mentioning conspiracy theories in non-appropriate contexts. As it turns out, we anticipated the current news cycle only by a couple of months.

Just this week, in fact, Attorney General Loretta Lynch attended a Senate Judiciary Hearing and acknowledged discussions at the Department of Justice of taking civil action against “climate change deniers.”

Sen. Sheldon Whitehouse (D-R.I.) questioned her on the issue and drew comparisons between such deniers and the tobacco industry that claimed for decades that the tobacco was not proven to cause ill health.

The Clinton administration eventually brought a successful civil suit against Big Tobacco. And Whitehouse suggested that civil or criminal charges might be brought against “anti-warmists.”

The forces of intolerance are gathering in the US, just as overseas.

We have urged in the past that people pay close attention to these growing trends. By turning statements of opinion into a psychological condition they are trying to discredit anyone who speaks out against the government.

In the Soviet Union, people who spoke out against government policies were often placed in mental asylums. At the time, concerned citizens in the West protested such incarcerations as barbaric abuses. Yet now, if our supposition is correct, these practices are about to expand in the West as well.

Conclusion: This attack on dissent is serious. Educate your family and friends about what’s going on. Do not be fooled by their propaganda, but beware of the risks of speaking out too freely.

source

Via John Whitehead @ The Rutherford Institute

We want no Gestapo or secret police. The FBI is tending in that direction. They are dabbling in sex-life scandals and plain blackmail. J. Edgar Hoover would give his right eye to take over, and all congressmen and senators are afraid of him.”—President Harry S. Truman

Don’t Be a Puppet” is the message the FBI is sending young Americans.
As part of the government’s so-called ongoing war on terror, the nation’s de facto secret police force is now recruiting students and teachers to spy on each other and report anyone who appears to have the potential to be “anti-government” or “extremist.”
Using the terms “anti-government,” “extremist” and “terrorist” interchangeably, the government continues to add to its growing list of characteristics that could distinguish an individual as a potential domestic terrorist.
For instance, you might be a domestic terrorist in the eyes of the FBI (and its network of snitches) if you:

  • express libertarian philosophies (statements, bumper stickers)
  • exhibit Second Amendment-oriented views (NRA or gun club membership)
  • read survivalist literature, including apocalyptic fictional books
  • show signs of self-sufficiency (stockpiling food, ammo, hand tools, medical supplies)
  • fear an economic collapse
  • buy gold and barter items
  • subscribe to religious views concerning the book of Revelation
  • voice fears about Big Brother or big government
  • expound about constitutional rights and civil liberties
  • believe in a New World Order conspiracy

Despite its well-publicized efforts to train students, teachers, police officers, hairdressers, store clerks, etc., into government eyes and ears, the FBI isn’t relying on a nation of snitches to carry out its domestic spying.
There’s no need.
The nation’s largest law enforcement agency rivals the NSA in resources, technology, intelligence, and power. Yet while the NSA has repeatedly come under fire for its domestic spying programs, the FBI has continued to operate its subversive and clearly unconstitutional programs with little significant oversight or push-back from the public, Congress or the courts. Just recently, for example, a secret court gave the agency the green light to quietly change its privacy rules for accessing NSA data on Americans’ international communications.
Indeed, as I point out in my book Battlefield America: The War on the American People, the FBI has become the embodiment of how power, once acquired, can be easily corrupted and abused.
When and if a true history of the FBI is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America.
Owing largely to the influence and power of the FBI, the United States—once a nation that abided by the rule of law and held the government accountable for its actions—has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.
The FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, harassment and indoctrination, governmental overreach, abuse, misconduct, trespassing, enabling criminal activity, and damaging private property.
And that’s just based on what we know.
Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government; recruiting high school students to spy on and report fellow students who show signs of being future terrorists; or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work of ensuring compliance, keeping tabs on potential dissidents, and punishing those who dare to challenge the status quo.
The FBI was established in 1908 as a small task force assigned to deal with specific domestic crimes. Initially quite limited in its abilities to investigate so-called domestic crimes, the FBI has been transformed into a mammoth federal policing and surveillance agency. Unfortunately, whatever minimal restrictions kept the FBI’s surveillance activities within the bounds of the law all but disappeared in the wake of the 9/11 attacks. The USA Patriot Act gave the FBI and other intelligence agencies carte blanche authority in investigating Americans suspected of being anti-government.
As the FBI’s powers have grown, its abuses have mounted.
The FBI continues to monitor Americans engaged in lawful First Amendment activities.
COINTELPRO, the FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, was aimed not so much at the criminal element but at those who challenged the status quo—namely, those expressing anti-government sentiments such as Martin Luther King Jr. and John Lennon. It continues to this day, albeit in other guises.
The FBI has become a master in the art of entrapment.
In the wake of the 9/11 terrorist attacks the FBI has not only targeted vulnerable individuals but has also lured them into fake terror plots while actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”
FBI agents are among the nation’s most notorious lawbreakers.
In addition to creating certain crimes in order to then “solve” them, the FBI also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts. USA Today estimates that agents have authorized criminals to engage in as many as 15 crimes a day. Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.
The FBI’s powers, expanded after 9/11, have given its agents carte blanche access to Americans’ most personal information.
The agency’s National Security Letters, one of the many illicit powers authorized by the USA Patriot Act, allows the FBI to secretly demand that banks, phone companies, and other businesses provide them with customer information and not disclose the demands. An internal audit of the agency found that the FBI practice of issuing tens of thousands of NSLs every year for sensitive information such as phone and financial records, often in non-emergency cases, is riddled with widespread violations.
The FBI’s spying capabilities are on a par with the NSA.
The FBI’s surveillance technology boasts an invasive collection of spy tools ranging from Stingray devices that can track the location of cell phones to Triggerfish devices which allow agents to eavesdrop on phone calls.  In one case, the FBI actually managed to remotely reprogram a “suspect’s” wireless internet card so that it would send “real-time cell-site location data to Verizon, which forwarded the data to the FBI.”
The FBI’s hacking powers have gotten downright devious.
FBI agents not only have the ability to hack into any computer, anywhere in the world, but they can also control that computer and all its stored information, download its digital contents, switch its camera or microphone on or off and even control other computers in its network. Given the breadth of the agency’s powers, the showdown between Apple and the FBI over customer privacy appears to be more spectacle than substance.
James Comey, current director of the FBI, knows enough to say all the right things about the need to abide by the Constitution, all the while his agency routinely discards it. Comey argues that the government’s powers shouldn’t be limited, especially when it comes to carrying out surveillance on American citizens. Comey continues to lobby Congress and the White House to force technology companies such as Apple and Google to keep providing the government with backdoor access to Americans’ cell phones.
The FBI’s reach is more invasive than ever.
This is largely due to the agency’s nearly unlimited resources (its minimum budget alone in fiscal year 2015 was $8.3 billion), the government’s vast arsenal of technology, the interconnectedness of government intelligence agencies, and information sharing through fusion centers—data collecting intelligence agencies spread throughout the country that constantly monitor communications (including those of American citizens), everything from internet activity and web searches to text messages, phone calls and emails.
Today, the FBI employs more than 35,000 individuals and operates more than 56 field offices in major cities across the U.S., as well as 400 resident agencies in smaller towns, and more than 50 international offices. In addition to their “data campus,” which houses more than 96 million sets of fingerprints from across the United States and elsewhere, the FBI is also, according to The Washington Post, “building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.”
If there’s one word to describe the FBI’s covert tactics, it’s creepy.
The agency’s biometric database has grown to massive proportions, the largest in the world, encompassing everything from fingerprints, palm, face and iris scans to DNA, and is being increasingly shared between federal, state and local law enforcement agencies in an effort to target potential criminals long before they ever commit a crime.
This is what’s known as pre-crime.
If it were just about fighting the “bad guys,” that would be one thing. But as countless documents make clear, the FBI has no qualms about using its extensive powers in order to blackmail politicians, spy on celebrities and high-ranking government officials, and intimidate dissidents of all stripes.
It’s an old tactic, used effectively by former authoritarian regimes.
In fact, as historian Robert Gellately documents, the Nazi police state was repeatedly touted as a model for other nations to follow, so much so that Hoover actually sent one of his right-hand men, Edmund Patrick Coffey, to Berlin in January 1938 at the invitation of Germany’s secret police. As Gellately noted, “[A]fter five years of Hitler’s dictatorship, the Nazi police had won the FBI’s seal of approval.”
Indeed, so impressed was the FBI with the Nazi order that, as the New York Times revealed, in the decades after World War II, the FBI, along with other government agencies, aggressively recruited at least a thousand Nazis, including some of Hitler’s highest henchmen, brought them to America, hired them on as spies and informants, and then carried out a massive cover-up campaign to ensure that their true identities and ties to Hitler’s holocaust machine would remain unknown. Moreover, anyone who dared to blow the whistle on the FBI’s illicit Nazi ties found himself spied upon, intimidated, harassed and labeled a threat to national security.
So not only have American taxpayers been paying to keep ex-Nazis on the government payroll for decades but we’ve been subjected to the very same tactics used by the Third Reich: surveillance, militarized police, overcriminalization, and a government mindset that views itself as operating outside the bounds of the law.
This is how freedom falls, and tyrants come to power.
The similarities between the American police state and past totalitarian regimes such as Nazi Germany grow more pronounced with each passing day.
Secret police. Secret courts. Secret government agencies. Surveillance. Intimidation. Harassment. Torture. Brutality. Widespread corruption. Entrapment. Indoctrination. These are the hallmarks of every authoritarian regime from the Roman Empire to modern-day America.
Yet it’s the secret police—tasked with silencing dissidents, ensuring compliance, and maintaining a climate of fear—who sound the death knell for freedom in every age.

source

Cyber security expert and Libertarian presidential candidate John McAfee is alarmed at the potential implications from Apple being forced to create a virtual backdoor to their encrypted system. In an enlightening op-ed, McAfee blasts the FBI for its ineptitude, while exposing the archaic hiring practices of the Feds that create a technology gap between FBI and private sector capabilities. McAfee makes clear that if the government gains access, privacy, as we know it, will fail to exist.+

“No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over,” McAfee writes.

The tech guru offers his teams hacking services to the FBI free of charge, as a means of allowing the phone in question to be accessed – without allowing the government to have a backdoor into all iPhones. McAfee would provide the FBI with the information they claim to seek, while at the same time allowing for secure encryption to continue to exist – of course there is a distinct possibility that the actual intention of forcing Apple to create a backdoor isn’t to access this particular phone, but as a means of breaking encryption on a global basis.

Read McAfee’s op-ed to the FBI below:

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation’s enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together.

This is a black day and the beginning of the end of the US as a world power. The government has ordered a disarmament of our already ancient cybersecurity and cyberdefense systems, and it is asking us to take a walk into that near horizon where cyberwar is unquestionably waiting, with nothing more than harsh words as a weapon and the hope that our enemies will take pity at our unarmed condition and treat us fairly.

Any student of world history will tell you that this is a dream. Would Hitler have stopped invading Poland if the Polish people had sweetly asked him not to do so? Those who think yes should stand strongly by Hillary Clinton’s side, whose cybersecurity platform includes negotiating with the Chinese so they will no longer launch cyberattacks against us.

The FBI, in a laughable and bizarre twist of logic, said the back door would be used only once and only in the San Bernardino case.

Tim Cook, CEO of Apple, replied:

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over. In spite of the FBI’s claim that it would protect the back door, we all know that’s impossible. There are bad apples everywhere, and there only needs to be in the US government. Then a few million dollars, some beautiful women (or men), and a yacht trip to the Caribbean might be all it takes for our enemies to have full access to our secrets.

Cook said:

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The fundamental question is this: Why can’t the FBI crack the encryption on its own? It has the full resources of the best the US government can provide.

With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension. About 75% are social engineers. The remainder are hardcore coders. I would eat my shoe on the Neil Cavuto show if we could not break the encryption on the San Bernardino phone. This is a pure and simple fact.

And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won’t work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It’s why we are decades behind in the cyber race.

Cyberscience is not just something you can learn. It is an innate talent. The Juilliard school of music cannot create a Mozart. A Mozart or a Bach, much like our modern hacking community, is genetically created. A room full of Stanford computer science graduates cannot compete with a true hacker without even a high-school education.

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Make no mistake that this is one of the most epic battles in the history of privacy, as the decisions that are reached in this case will reverberate throughout the world and have far reaching consequences. There is a fundamental battle taking place as to whether an individual has a right to privacy or, if as the U.S. government is asserting; privacy is a privilege bestowed upon individuals at the behest of the government.+

Ironically, privacy is considered a fundamental human right as recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights and in many other international and regional treaties. Privacy is the lynchpin of human dignity and many other key values such as freedom of association and freedom of speech have their roots in privacy.

When the U.S. government works to undermine what is considered a fundamental human right by most of the world, perhaps it’s time to seriously question why those elected to represent the people are actively working to undermine the rights of those that put them in office.


Source: