For many Americans, it is inconceivable to imagine the United States of America, the so-called “Land of the Free”, as a police state…[but it] is a police state and has been one surreptitiously for decades. [This article clearly outlines why that is the case and what you can do to protect your privacy from government spying.]
So writes James Black (internationalman.com) in edited, and in some cases paraphrased, excerpts from his original article* entitled Privacy in the Face of NSA Abuse.
[The following article is presented by Lorimer Wilson, editor of www.munKNEE.com and the FREE Market Intelligence Report newsletter (sample here) and may have been edited ([ ]), abridged (…) and/or reformatted (some sub-titles and bold/italics emphases) for the sake of clarity and brevity to ensure a fast and easy read. This paragraph must be included in any article re-posting to avoid copyright infringement.]
Black goes on to say in further edited excerpts:
The first step toward living a private life is knowing who your enemy is, and to find your enemy, look no farther than government. Government is the greatest enemy of freedom and privacy. The two principal powers of government are the power of the purse and the power of the sword. Both are utilized to create a highly controlled and regulated society where everyone is monitored from birth to death.
Digital Spying
In the last few months, the world has learned that the National Security Agency (NSA) has been spying on the world’s communications and recording every mobile phone call, email, fax, Internet data, and Voice over Internet Protocol (VoIP) communication. Even more recently, we have learned that the NSA and its partners have been able to defeat or circumvent many protective measures available on the Internet, including some forms of encryption.
It’s important to understand that the US government’s disdain for privacy and the Fourth Amendment is nothing new…
- NSA’s predecessor, Black Chamber, had illegal unfettered access to Western Union’s records.
- Many years after the NSA succeeded Black Chamber, Project Echelon, a then-new satellite-based signals interceptor, was developed and utilized by the US, England, Canada, Australia, and New Zealand, to spy on much of the world’s communications, including on Americans.
- Today, the antithesis of privacy, better known as the NSA, the CIA, and the FBI, are in bed with America’s leading Internet and mobile service providers to circumvent civil liberties on a grand scale. This partnership of government and corporations, colloquially known as “corporatism,” offers many advantages to both partners but none for individuals.
For the government, unfettered backdoor access is granted to trillions of Internet data logs, including search engines, emails, and VoIP applications like Skype. In exchange for their perceived high patriotism and civic duty, corporations are awarded multi-billion dollar government contracts and are promised absolute immunity from all criminal and civil litigation.
When fiber optics were introduced, there was a wealth of information available, which the NSA could not access, and it was illegal for it to do so. But the issue of legality was hardly an impediment. To gain access to this treasure trove of new data, the NSA and its partners illegally tapped underwater fiber optics to gain access to the world’s data communications.
Undersea Fiber Optic Cable Map (Click for Enlarge)
The NSA abuses are also helping to accelerate the internationalization of the Internet’s infrastructure away from U.S. dominance.
Recently, the BRICS countries (Brazil, Russia, India, China, and South Africa) have announced plans to create their own network of fiber optic cables so they do not have to rely on other countries (i.e., the U.S. and the U.K.) for exchanging data—which opens up the opportunity to be spied upon. The BRICS 34,000km (21,000 miles) cable could be operational by the end of 2015. There would also be a link between Brazil and Miami, but it would mean data would not need to go through the US before travelling elsewhere, which is the case right now.
Back in the U.S. the NSA has made secret agreements with AT&T and other mobile network operators to install deep packet inspections, which essentially gathered Internet data from all over the United States. Today, the NSA has backdoor access to all the major Internet services, including Google, Yahoo!, Facebook, and Skype.
Although this is scary enough, it is only the tip of the iceberg. The NSA and its partners are mostly limited to electronic surveillance. However, there is a far more mundane form of surveillance that few take notice of – physical spying.
Physical Spying
- Government-issued identification numbers ensure everyone is categorized and numbered.
- Government-issued privileges (e.g., passports, driver licenses, et al.) ensure all citizens and their whereabouts are accounted for.
- Street cameras and license plate recognition readers, among other things ensure everyone is watched at all times.
- Public databases on the Internet ensure every citizen can be accounted for.
In short, government is the enemy of freedom, free movement, free association, privacy, and anonymity.
Despite the long and intrusive reach of government, it is possible to remain in the shadows. However, to do so, it is important to understand that privacy is a way of life.
Privacy is more than just Tor, an Internet anonymizer, and encryption. There is more to privacy than digital privacy. Regrettably, this is often overlooked.
Many Americans who value their privacy move heaven and earth to remain anonymous on the Internet or to secure their Internet communications but have little understanding how to remain invisible in the real world.
Real world privacy is perhaps even more important than digital privacy and is perhaps more valuable today than ever before.
Here are some concise principles to consider if you desire to maintain some semblance of privacy:
- Consider using anonymous prepaid cards or Bitcoin (when used properly, see here and here).
- Consider using paysafecards or private eMoney (where available) to make anonymous “cash like” transactions.
- Never link your legal name to your legal address—ever.
- Title assets like real estate to an LLC or trust. The principal purpose of this is to avoid public databases, which are ubiquitous on the Internet and in phone books.
- Never link your legal name to your mobile phone, landline, or ISP.
- Never give out a Tax Identification Number (also known as a Social Security Number) unless required to by law. If necessary, it may be preferable at times to use an Employer Identification Number.
- Never show identification unless required by law.
- If identification is required by law, it is preferable to show a passport or a passport card. Unlike a driver license, for example, passports and passport cards do not show a street or mailing address. In addition, unlike a driver license, passport records are much less accessible to law enforcement than DMV records.
[Editor’s Note: The author’s views and conclusions in the above article are unaltered and no personal comments have been included to maintain the integrity of the original post. Furthermore, the views, conclusions and any recommendations offered in this article are not to be construed as an endorsement of such by the editor.]
*http://www.internationalman.com/78-global-perspectives/1012-privacy-in-the-face-of-nsa-abuse (Copyright © 2013 Casey Research, LLC.; James Black is the author of The Privacy Book. For more information, please visit www.sovereignpress.org.)
Related Articles:
1. Think Your Password Is Secure? Hardly!
Most things we think about password security are completely wrong as I found out when I tested one of my passwords against Silent Circle’s crypto analysis tool. Words: 487 Read More »
2. Internationalize Your Internet Address – Here’s Why & How
In this article I explain why you should seriously consider internationalizing your domain name, teach you some basic terms so that you can understand how to choose the jurisdiction of your domain name (as well as make sure that your personal or business information is not leaked out into the public domain) and tell you how to do it. Read on! Read More »
The overreach of the “War on Terror” and heavy-handed copyright laws lend the cover for any US agency to monitor and control your Internet activity. These, and myriad other laws, mean that your personal/business website can be seized at the drop of a hat under the flimsiest of pretexts. Fortunately, it is relatively easy and cheap to move your digital presence across borders where it can dwell in friendlier jurisdictions. Read More »
4. It’s Imperative to Protect Your Security/Privacy Online – Here Are 5 Ways To Do So
Online privacy is becoming more important…Below are five different tools and services that…you can set up…in 5 minutes. Each of them will go a long way in securing your privacy online. Words: 460 Read More »
5. Your Password Isn’t Enough to Keep Your Info Secure on the Internet – So What’s a Person to Do?
With password leaks and dumps becoming common occurrences our lives are simply becoming too easy to crack. That string of characters you use as a password can’t protect you any more. What’s being done about improving the situation? What’s being done about making our lives more secure? This infographic attempts to answer those questions and more. Read More »
6. Google Yourself and You May Be Amazed – Or Even Dismayed – At What People Know About YOU!
To answer the question “How much can people learn about me by simply Googling me?” just Google yourself, or as some people say, complete your own “vanity search”. You may be amazed – and perhaps even dismayed – at what is out there about you! Why should you care? Because friends, relatives, employers, recruiters, hiring managers, and even strangers may be searching for information about you on the web so shouldn’t you better control what people can learn about you online? Read More »
7. Social Media Sites are Tracking You! Here’s How to Better Manage Your Online/Phone Apps
As our lives become increasingly digital it is easy to share more and more information online and with our phones. Some of these sites and apps that you use, however, may not be as trustworthy as you think. This extremely informative infographic shows quite clearly what is going on and what you can do to stop apps from either tracking you altogether or to the extent that they currently are.
8. Become a PT: Live the “5 Flags of Freedom” – Here’s How
It takes time to get out of the system legally and into freedom. Frankly, most people are too conditioned to go for it. They are stuck in the system and are convinced it’s the only way so it’s not for everyone. For those of you who truly seek freedom and are willing to take on the challenge, though, it’s 100% possible. Think about it! Read More »