Feeds:
Posts
Comments

Posts Tagged ‘Freedom Of Speech’

Susan Lindauer was a major CIA asset leading up to the 9/11 attacks. She was the main person in charge of communicating back-channel relations between Iraq and the U.S. Because she had inside knowledge that the U.S. knew for months in advance that the 9/11 attack was coming, the U.S. government had her detained under the Patriot Act and imprisoned in a military facility for a year. And then she remained under legal indictment for five years. She was apparently very close to having her brain scrambled via drugs by the government. Hers is a tragic and harrowing story, but her story proves beyond doubt, that corruption exists at the highest levels of the U.S. government. She is a real American Hero.

See this interview with former CIA intelligence asset Susan Lindauer.

And this followup interview: Former CIA Asset Susan Lindauer on naysayers, her post 9/11 story, the Patriot Act, NDAA, and more.

(The text below was taken from the followup interview above, as located on the ActivistPost.com website. Thanks!)

Back in September, we spoke to former CIA asset Susan Lindauer (here and here), in an interview that generated a lot of discussion online. Ms. Lindauer’s story, which completely counteracts the idea that there was no specific intelligence regarding the 9/11 attacks in advance, was received extremely positively by the majority of our audience.

With some message board chatter centering around questions of credibility, we decided to give her the opportunity to set the record straight on her CIA involvement and, in particular, a character assassination piece from the New York Times in April 2004. Susan also picks up her story from where she left off last time, and touches on the Patriot Act and the NDAA 2012.

Advertisements

Read Full Post »

The following is an excerpt from the conclusion of the paper listed below:

The nothing to hide argument speaks to some problems, but not to others. It represents a singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems often raised in government surveillance and data mining programs. When engaged with directly, the nothing to hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But when confronted with the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure, the nothing to hide argument, in the end, has nothing to say.

‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy

Daniel J. Solove

George Washington University Law School

San Diego Law Review, Vol. 44, p. 745, 2007
GWU Law School Public Law Research Paper No. 289

Abstract:
In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: “I’ve got nothing to hide.” According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.

Number of Pages in PDF File: 28

Keywords: privacy, nothing to hide, data mining, surveillance

Accepted Paper Series

Read Full Post »

This whole subject of disinformation is a very tricky business. The elite that are in control are exceptionally good at deception in many ways, so you really have to be on your toes when researching a subject. See CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information for starters.

You really have to be careful where you put your trust because there are many places, prominently placed on search engine results, that are there to “debunk” the truth for you. While the truth can’t really be debunked, they make a good try at it. These sites can be well funded and provide convincing arguments against the truth. They seem to tend to do this in a way that, if you’re not watching carefully, can make you feel foolish for believing whatever it is that you are investigating. They will also provide true information as well so the site looks legit until you investigate a bit more closely. If you use the Snopes.com website to vet information, see the article below.

Similarly, there are sites that sound like they’re going to talk about what you’re interested in, and they do, only they tell you a fabricated or misleading story, craftily bending the details to suit their ends. In fact, mainstream media is quite adept at this. From my perspective, I have to carefully pick and choose only very specific parts of mainstream media articles because (with occasional exceptions) they produce highly biased, government and corporate approved, “news”. Propaganda is closer to the truth of it.

There are also other sites that appear to provide alternative news, and they actually do so, but they also produce propaganda along with this already discovered news. Assuming the latest information regarding the VeteransToday.com website is true, and I’m gathering from numerous sources that it is true, the main man there, Gordon Duff, admitted in a video interview that about 40% of the content on the website is knowingly and intentionally not true. The video has been removed from YouTube for copyright issues, and Duff has since denied that he said it, and/or that it was actually the Israeli Mossad that modified the video! This does not ring true for numerous reasons if you do the research.

There are other sites that seem to only report the truth, and may perhaps even break new stories, but they steer clear of the real issues with Israel. There are two persons where I (and others) find this to be true: Alex Jones (infowars.com prisonplanet.tv) and Jesse Ventura. There are probably others. I can only speculate as to the reason that they steer clear of outing Israel for what it is. Maybe they have been threatened or bribed, or maybe they’re really working for the “other side”. I really don’t know, but I do know that something is gigantically wrong when Israel is not shown to be what it is – a terrorist state that is essentially in control of the U.S. government.

As I point out in my main page for Israel, Israel has invaded the U.S. government like a virus, to the point of being in complete control of U.S. foreign policy, and it is, with rare exception, the gatekeeper for every President, Senator and Representative and most likely, the heads of other agencies like the CIA – see this. In other words, if the Israeli lobby group of AIPAC and the JDL and Anti-Defamation League watchdog groups don’t like you, you will not be elected. Period. And if you say anything against Israel, they won’t like you, they’ll brand you as anti-Semitic, and they’ll work to destroy you, and they’re damn good at doing just that. I’m sure there are exceptions to this rule, but this is, without exaggeration, the rule accepted by almost every politician. For this reason, almost every person that is in congress, is by necessity, in league with these Israeli groups, and these groups don’t give a shit about what’s good for America. Those groups, along with many, many very high ranking self-professed Zionist government officials, are there to make sure that anything and everything that happens in the American government is, first and foremost, to the direct benefit of Israel. This is why the American government continues to vote, time after time, against the interests of America, and for the interests of Israel. Insanity. It’s just like a virus or a cancer that has invaded a body.

There are websites that do go against Israel, which I still find to be suspect. David Icke’s site falls into this category. I can’t say for sure whether his website is legit or not. I like quite a bit of what he has to say, and find some of his messages to be downright inspiring. On the other hand, his beliefs regarding what’s actually going on are so far out that it sounds ridiculous; this detracts from the overall believability of his messages. However, I also have to say, I’ve seen many things that initially sound completely crazy, that I eventually discover to be true. So I have to admit that he may be correct, I really don’t know. He may present completely legitimate information, and those in power are using his site (or any and every alternative news site) to gather names and information of people that are interested in following this type of information. Tracking the names of the believers, the people that actually know the truth. David may or may not be in on such an effort. As I said before, I really don’t know, but I feel that caution is warranted. As you’ll see, on this site and others, Big Brother IS listening, looking, recording, researching, harassing, arresting, detaining, torturing, maiming, murdering…

The following article was taken from the rense.com website. Thanks!)

Is Snopes A Disinformation Operation?
4-3-12

For those of you that put your trust in Snopes…

Many of the emails that have been sent or forwarded that had any anti Obama in it were negated by Snopes. I thought that was odd. Check this out.

Snopes, Soros and the Supreme Court’s Kagan.   We-l-l-l-l now, I guess the time has come to check out Snopes! You don’t suppose it might not be a good time to take a second look at some of the stuff that got kicked in the ditch by Snopes, do you?

We’ve known that it was owned by a lefty couple but hadn’t known it to be financed by Soros!

Snopes is heavily financed by George Soros, a big time supporter of Obama! In our Search for the truth department, we find what I have suspected on many occasions.

I went to Snopes to check something about the dockets of the new Supreme Court Justice. Elena Kagan, who Obama appointed, and Snopes said the email was false and there were no such dockets. So I Googled the Supreme Court, typed in Obama-Kagan, and guess what? Yep, you got it; Snopes Lied! Everyone of those dockets are there.

So Here is what I wrote to Snopes:

Referencing the article about Elana Kagan and Barak Obama dockets:

The information you have posted stating that there were no such cases as claimed and the examples you gave are blatantly false. I went directly to the Supreme Courts website, typed in Obama Kagan and immediately came up with all of the dockets that the article made reference to. I have long suspected that you really slant things but this was really shocking. Thank You. I hope you will be much more truthful in the future, but I doubt it.

That being said, Ill bet you didn’t know this.

Kagan was representing Obama in all the petitions to prove his citizenship. Now she may help rule on them. Folks, this is really ugly.

Chicago Politics and the beat goes on and on and on. Once again the US Senate sold us out!

Now we know why Obama nominated Elana Kagan for the Supreme Court. Pull up the Supreme Courts website, go to the docket and search for Obama. She was the Solicitor General for all the suits against him filed with the Supreme Court to show proof of natural born citizenship. He owed her big time. All of the requests were denied of course. They were never heard. It just keeps getting deeper and deeper, doesn’t it? The American people mean nothing any longer.It’s all about payback time for those who compromised themselves to elect someone who really has no true right to even be there.

Here are some websites of the Supreme Court Docket: You can look up some of these hearings and guess what?

Elana Kagan is the attorney representing Obama!

Check out these examples:

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-8857.htm

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-6790..htm

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-724.htm

Read Full Post »

Copyright Trolls

When the Recording Industry Association of America (RIAA) declared an end to its litigation campaign against music fans who used peer-to-peer technology to share music many people thought that would be the end of mass copyright litigation — after all hadn’t the RIAA demonstrated that suing customers was no way to improve the bottom line?

Apparently not everyone got the memo. In the past year at least three groups have begun to experiment with using mass copyright litigation to extract settlements from individuals. These copyright trolls try to grow businesses out of suing Internet users — their tactics include targeting large groups of anonymous “Doe defendants” to improperly minimize their court costs and exploiting the massive damages in copyright law in order to pressure defendants into settling quickly.

EFF is working hard to help victims get access to the resources they need to defend their rights call the court’s attention to trolls’ disrespect for due process and educate the public about the harms of copyright trolling.

U.S. Copyright Group

Have you been targeted by a USCG subpoena? Learn more about the claims made against you, explore possible defenses, and try to find legal counsel.

The U.S. Copyright Group (USCG) approaches independent film producers and offers to collect money from people who are illegally downloading their movies on BitTorrent. USCG currently represents the producers of several films including The Hurt Locker and Far Cry. USCG then files predatory lawsuits implicating thousands of unnamed John Does, subpoenas their identities from the ISP’s, and then sues the individuals themselves. Once the user’s identity is known USCG threatens a judgment of up to $150,000 per downloaded movie — the maximum penalty allowable by law in copyright suits and a very unlikely judgment in cases arising from a single noncommercial infringement — in order to pressure the alleged infringers to settle quickly for $1,500 to $2,500 per person. The judge in two of USCG’s cases has dismissed many of the defendants though thousands more remain.

Righthaven

If you are the target for a Righthaven lawsuit in need of representation please contact info@eff.org. Please understand that we have a relatively small number of very hard-working attorneys so we do not have the resources to defend everyone who asks no matter how deserving. However, if we cannot represent you directly we will make every effort to put you in touch with attorneys who can.

Righthaven LLC has brought over a hundred lawsuits in a Nevada federal court claiming copyright infringement. They find cases by searching the Internet for parts of newspaper stories posted online by individuals nonprofits political organizations and others; buying the copyright to that newspaper story; and then suing the operator of the website for copyright infringement. Like the U.S. Copyright Group, Righthaven relies on the threat of copyright liability (and, in a unique twist, an entirely bogus threat of loss of the target’s domain name) to scare the posters into a quick settlement. Reported settlements have fallen between $2,000 and $3,000.

Porn Downloading Lawsuits

In these cases the owners of the adult movies filed mass lawsuits based on single counts of copyright infringement stemming from the downloading of a pornographic film and improperly lumped hundreds of defendants together regardless of where the IP addresses indicate the defendants live. To date over 50,000 Does have been targeted in cases filed in West Virginia, Texas, Illinois, and the Northern District of California. The motivation behind these cases appears to be to leverage the risk of embarrassment associated with pornography to coerce settlement payments despite serious problems with the underlying claims. The judge in several of the cases filed in West Virginia has blocked plaintiffs from proceeding against almost all of the defendants in those cases — approximately 5,400 people. Unfortunately, thousands of defendants in other cases are still under threat.

Read Full Post »

(This article was taken from the occupycorporatism.com website. Thanks!)

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Nov 29th, 2012 0 Comment

Susanne Posel
Occupy Corporatism
November 29, 2012

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

Read Full Post »

(This article was taken from Amber Lyon’s blog. Thanks!)

President Obama Has Turned Journalists into Criminals

  • Posted on October 16, 2012

Will tonight’s presidential debate moderator have the balls to address this crucial issue?

If by “change” President Obama meant criminalizing journalism in the United States, then he’s succeeded.

Why should you care?  The investigative journalism that Obama has silenced could have exposed more corruption in the U.S. government, military, banking industry; corruption that has caused anguish to numerous Americans.  The reports that will never be heard, read, or seen on TV may have led to positive change.

The Obama administration is suffocating investigative journalism at an alarming rate through the abuse of the Espionage Act of 1917, an act more prone to be used to protect government secrecy than national security.  Before Obama, the act had been used only three times total since 1917.  The current administration has used it six times to go after whistleblowers and the journalists who protect and reveal their information.

President Obama was bold enough to use the Espionage Act to  subpoena New York Times journalist James Risen in an attempt to force him to ‘give up’ information on a CIA whistleblower.  Risen accused the administration of trying to silence journalists and refused to acquiesce stating,

“Can you have a democracy without aggressive investigative journalism? I don’t believe you can, and that’s why I’m fighting.”

Risen predicted Obama’s attack against him would have an unprecedented chilling effect on mainstream investigative journalism in the US.  He was right.

I was on the brunt end of the Obama-generated censorship while employed at CNN as an investigative correspondent.

On at least a weekly basis, and to my constant frustration, my superiors and CNN’s lawyers were quick to remind me that we need to be extra careful because “President Obama has gone after more journalists and whistleblowers than any president in history”.  The leash around my neck began to tighten.

Whether I was allowed to embark on future stories or even interview sensitive sources for potential investigations, eventually became an ‘Obama subpoena risk assessment’ and potential court cost calculation, rather than a pure evaluation of the report’s contribution to public good or our journalistic duty to cover the story.

Some of my most crucial investigations were killed before they started because they were too high a risk of an Obama subpoena.

One boss told me quote “we know how the FBI feels about your source, if we have information the FBI will want we become a target”.

David Carr of The New York Times noted Obama’s war on journalism may have more to do with secrecy than national security and is harming press freedom in the U.S.:

As journalists we vow never to reveal our confidential sources, so to this administration we are criminals.  It’s time President Obama focused his time hunting down the real law breakers rather than attacking the messengers.

For more information please check out these articles:

Huffington Post: Obama’s War on Journalism 

NY Times: Blurred Line Between Espionage and Truth

Salon.com : Obama Targets Journalists 

Read Full Post »

This is an excellent example of how the government, or in this case, a corporation, can seriously fuck with your life without any good (reasonable) legal premise to do so. If you have comparatively unlimited resources, like government and large corporations do as compared to the average person, you can seriously damage a person’s work life, reputation, finances, family, etc. practically at will. They may not ultimately win the case, but they’ve essentially destroyed the person’s life in the meantime. And perhaps more importantly, they’ve sent a chilling message to anyone else that dares to blow the whistle on the government or a corporation.

This is judicial system fraud perpetrated by elite arrogant pricks that are essentially above the law because they have money. There is no way to stop it because it is built into our legal system. In other words, this is legal fraud. The elite have spent, and continue to spend, lots of money in the effort of writing laws and protecting laws ensuring they have and keep this option with impunity.

And where is the mainstream press when it comes to cases like this? The press should be putting things like this on the front page, pounding on it until resolved. But generally, if they talk about it at all, they’ll present the story in a way that’s ultimately twisted towards the side of the corporation or government. In other words, since the press is largely controlled by the government and corporations, they run away with their tail between their legs rather than stand up for what is right and fair and just. Cowards. But to be fair, because of their bosses, they don’t have much of a choice unless someone is willing to give up their career to stand up and fight. Even then, it’s generally just a little flair-up int the news that also gets twisted by mainstream media, and/or is quickly forgotten, ignored and buried.

(The article below was taken from the ActivistPost.com website. Thanks!)

Years in Jail for Exposing A Corporate Mistake?

Luke Rudkowski got a chance to meet and interview well-known hacker, Andrew Auernheimer, also known by his pseudonym, Weev. Weev was recently convicted for two felonies and currently is free on bail until sentencing, The court convicted him on one count of identity fraud and one count of conspiracy to access a computer without authorization. In this interview Weez explains what lead to these charges and how he is dealing with the situation.

View the YouTube Video. To find out more about Weev check out his website: http://freeweev.info/

(The following article was taken from the freeweev.info site. Thanks!)

I know this guy, “weev”. Real name: Andrew Auernheimer. He is almost always offensive. He constantly says things that brutally offend my liberal sensibilities. He never takes anything seriously and generally treats life as a piece of performance art. He’s undisciplined and lazy. I can’t believe I count him amongst my acquaintances, but he’s very charming and funny at a dinner party. That doesn’t really change how gigantic of a jackass he is. As the world’s most notorious Internet troll, his ability to repulse is quite high.

Unfortunately, it has become essential to our first amendment freedoms to keep this jackass troll out of jail.

In June of 2010, there was a public AT&T webserver that was publishing iPad 3G user email addresses. When I say “publishing”, I mean it. This thing had no password, no firewall, no authorization mechanism stopping any member of the public from collecting this data. One man, Daniel Spitler, collected a sample of this data. He brought it to Andrew Auernheimer. Andrew gave it to a journalist because he feels that when a big company puts you at risk, you deserve to know about it and the company responsible deserves to be held to account and publicly shamed.

As his reward for performing a public service, Andrew is now facing two consecutive 5-year felonies. No good deed goes unpunished.

Much more worrisome than the injustice that Andrew is receiving is the precedent it creates against us. The Computer Fraud and Abuse Act, or CFAA, isn’t just a criminal statute, it is civil. Andrew’s co-defendant accessed a publicly available webserver and Andrew gave the data to a single journalist. This means that any time you visit a URL if the web operator later decides they just don’t like you, you may face prison.

You may also just get sued by a gigantic company with more resources than you.

 THE CHARGES

Andrew is indicted on two charges, USC 1030 “Conspiracy to access a computer device without authorization” in furtherance of a violation of a New Jersey state statute. The New Jersey state statute includes the language “discloses”, which means the federal government is saying that the very act of giving something to a journalist to inform the public is a criminal act. This represents an extremely dangerous prior restraint upon free speech. Beyond that, if you run any sort of business that touches the Internet at all, you should be concerned about the language behind USC 1030. If you query an API that a company makes public as part of their web app, and later they decide that your technology is too disruptive or you provide competition to a feature they’re planning, they can have you imprisoned or sued.

Andrew is also charged with USC 1028, “identity theft”, for possessing a list of email addresses. The statute is so broad that it criminalizes possessing home addresses, which means you’re a criminal every time you walk down the block of a suburb and look at house numbers.

“He that would make his own liberty secure, must guard even his enemy from oppression; for if he violates this duty, he establishes a precedent that will reach to himself.” – Thomas Paine, Dissertation on First Principles of Government

Regardless of what you think of Andrew’s identity, associations or politics, you must understand the urgency of helping fight the case against him. The interpretation the justice department is putting forward in this case affects everyone that opens a web browser, writes a web app that references external APIs or talks to a journalist about any externally acquired data. This case reeks of dangerous prior restraint upon free speech, and a guilty verdict that sticks will harm the free and open internet as badly as SOPA/PIPA would have.

Legal defense costs money. Federal criminal defense generally takes a hundred thousand dollars. By helping Andrew you safeguard your own liberties from the assault of a tyrannical government. Andrew needs a large amount of money. Please consider giving a donation or a loan.

Read Full Post »

Older Posts »

JONATHAN TURLEY

Res ipsa loquitur ("The thing itself speaks")

Amber Lyon

"Well-behaved women seldom make history..."

Writings of J. Todd Ring

Independent Research and Analysis, Essays in Politics and Philosophy.

________________Child Health Safety_________________

The facts about vaccine safety your government won't give you