Skip to main content

Edward Snowden, The First Six Months

What Children and Adults Finally Learn About Surveillance
and the Dangers of Secret Courts for Public Citizens of the World.

United States of Paranoia.

THE TAKE AWAY:

THE MILITARY ONLY SERVES AT THE REQUEST OF THE CITIZENS OF THE UNITED STATES. THAT'S WHY THE LAWYERS ARE ALWAYS INVOLVED TO AGREE TO OR DISAGREE WITH ANYTHING THE MILITARY ASKS PERMISSION TO DO. WE THE PEOPLE ARE THEIR BOSS. THEY ARE NOT THE BOSS OF US!

- An entire system of mass surveillance has been deployed – and deemed legal – without the knowledge or consent of the public until Congress votes to take away mass surveillance powers in May 2015.The whole point of the Fourth Amendment is to prevent the very thing that the NSA is doing.

- American values (such as openness, privacy, and internet freedom) and American interests and actions (such as global surveillance and projection of military power). The former, “cosmopolitan” view presumes, however, that the favored values transcend, and can be sustained apart from, their national and institutional roots.

- The House Committee report itself included numerous false statements and misrepresentations, according to an analysis by Barton Gellman, who had reported on Snowden’s disclosures for the Washington Post.  
“The report is not only one-sided, not only incurious, not only contemptuous of fact. It is trifling,” wrote Gellman, who identified several apparent errors and falsehoods in the House Committee summary.  What is perhaps worse than what’s contained in the House document, though, is what is missing from it: Congressional intelligence overseers missed the opportunity to perform any reflection or self-criticism concerning their own role in the Snowden matter.
The fact that U.S. intelligence surveillance policies had to be modified in response to the public controversy over Snowden’s disclosures was a tacit admission that intelligence oversight behind closed doors had failed to fulfill its role up to that point. But since the Committee has been unwilling to admit any such failure, it remains unable to take the initiative to rectify its procedures.


- Privacy should be built in to all the systems you use.


- Tradecraft: the Clandestine skills used in espionage for those who need real security: journalists; executives traveling to adversarial environments

 

IGNORANCE
Is the scourge of modern life. It's evidenced not only in politics, but in tech, in everyday life. If you're going to weigh in, be informed. Today's news outlets are so worried about being left out of the click-through advertising tsunami, that fact-checking goes out the window. Don't lie when the information is easily available to all on the Internet.

 

 

The NSA has tapped fiber-optic cables abroad in order to siphon off data from Google and Yahoo, circumvented or cracked encryption, and covertly introduced weaknesses and back doors into coding, according to reports in the Washington Post, the New York Times and the U.K.’s Guardian newspaper based on documents leaked by former NSA contractor Edward Snowden.

The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The American Surveillance State owes the public an explanation. The public needs to decide if these policies are right or wrong.

 

The Reagan Era Executive Order that led to mass spying, as told by NSA alumni

Game On

I am I and my circumstances” ~ Ortega y Gasset 

 

NO JUSTICE NO PEACE

 


THE GOVERNMENT THREAT: 
The NSA has turned the Internet into a giant surveillance platform. While the government has been misusing its legal autorities to require a set of data at the front door, the NSA has been sneaking in the back door to grab all the data. This is a political problem.

Table of Contents

Title Page 1

Table of Contents page 4

Overview page 6

Time Line page 9

Preface: The Story of Power page 24

Chapter 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . pg 29

  • Patriotism, Propaganda and Protest . . . . . . . . . . . . . . 15
  • Patriotic Dissent . . . . . . . . . . . . . . 24
  • Who is a Journalist? . . . . . . . . . . . . . . 30
  • 4th Amendment . . . . . . . . . . . . . .

Chapter 2 . . . . . . . . . . . . . . pg 61

  • Secrets and Lies
  • The SECRET GLOSSARY – SNEAKY SNEAK - WEASEL WORDS
  • History
  • Financial Literacy and China Curriculum
  • The 1% Power Elite Families
  • Undue Influence

 

Chapter 3 . . . . . . . . . . . . . .pg.92

  • SECURITY VERSES PRIVACY IS A FALSE CHOICE
  • Congress and Senators All Knew
  • "Trust us - we know what's good for you [and you don't]."
  • WAS YOUR SENATOR THERE?
  • Murky Multimillion-Dollar Market
  • WE CAN CATCH THE BANKSTERS NOW

 

Chapter 4 . . . . . . . . . . . . . . pg 112

  • DATA COLLECTION
  • Data Is A Privacy issue
  • MetaData pg.31
  • "It's OK I've Got Nothing To Hide" Is For Dummies
  • "It's just the metadata"
  • How Much Data Can NSA Store
  • Who Controls Big Data?

 

Chapter 5 . . . . . . . . . . . . . . pg 125

  • POLICE STATE
  • CAREER IN THE NSA
  • The NSA's Public Key
  • Uh Oh there were Literally NSA-holes
  • Outsourced Intelligence
  • General Keith Alexander
  • Digital Ethnic Cleansing
  • The Military Industrial Educational Complex
  • The Security, Industrial, Complex
  • Cyber Security Market Place
  • Echelon
  • Boundless Informant
  • Promis
  • Section 215
  • FAA 702
  • Exec Order 12333
  • PRISM
  • The good side of #Prism

 

Chapter 6 . . . . . . . . . . . . . . pg.145

  • Corporate Governance and Surveillance
  • Legal Questions
  • Secret Court
  • Why are privacy laws non existent in the U.S.?
  • So . . . Who’s Watching the N.S.A. Watchers?
  • James Clapper - What about His Oath?

 

Chapter 7 . . . . . . . . . . . . . . pg 159

  • Pesky Constitutional Protections Legal Questions
  • Your Right To Privacy
  • IP-address does not equal a person
  • First Law Suit Against NSAholes

 

Chapter 8 . . . . . . . . . . . . . . pg 176

  • Whistle Blowers
  • Snowden
  • Where Should You Run?
  • Snowden offered Asylum
  • Snowden's Greatest Fear Is Nothing Will Change
  • Top Security Clearance

 

Chapter 9 . . . . . . . . . . . . . . pg 189

  • KEEP IT SECRET STUPID
  • UTAH SPY CENTER
  • ENCRYPTION
  • Spying Software
  • John Gilmore
  • The UK
  • What data is being monitored and how does it work?
  • Surveillance: Telephony - Cell Phone Data Mapping

 

Chapter 10 . . . . . . . . . . . . . . pg 208

  • EMPLOYEE SURVEILLANCE
  • Software that will Monitor, Students, Employees, Dissidents and Protestors.
  • Did You Close Your Stupid Facebook Account?
  • What’s the damage?

 

Chapter 11 . . . . . . . . . . . . . . pg 213

  • K12 Surveillance and College Surveillance
  • K-16 Surveillance AND Remote Webcam Surveillance
  • TWEET CONGRESS ٩(●̮̮̃•)۶

 

Chapter 12 . . . . . . . . . . . . . . pg 216

  • When the NSA can't do it they pay off the GCHQ to do it
  • Spy In The Sky and Sea
  • DRONE AND VIDEO SURVEILLANCE
  • National ID Card
  • REMOTE WEBCAM SURVEILLANCE
  • CCTV Surveillance
  • The Beginning of a Potential Nuclear War
  • Interview with former Soviet officer Stanislav Petrov, Dresden Peace Prize laureate

2014 INTERNET FRACTURES – THE EVIL NSA KILLS ICANN CONTROL

Resources . . . . . . . . . . . . . .  pg 214

  • Educational CyberPlayGround
  • Technology

1 year later We know Snowden is a Hero! page 243

Subscription