Nothing Is Hidden

Nothing Is Hidden
By Jessica Harvey February 25, 2015

 The above image is the result of looking up 13 different government ran agencies on Google Maps.

     
     Imagine for a second, a private place: the bedroom, car, backyard, or perhaps the office?  How can one be absolutely certain a particular place is one hundred percent secure?  Simply put, they cannot.  Since the twin towers fell on 9/11, the “War on Terror” has rapidly progressed.  Similar to “Big Brother” in George Orwell’s 1984, the U.S. Government has invaded every facet of privacy possible.  From Law Enforcement, to the FBI, NSA, CIA, and beyond, countless federal agencies and private companies have invaded privacy with the use of technology.  In addition to the infringement of civil rights, the data collected can and will be held against American citizens.  After all, the central government determines what’s right and wrong—not the people (Binney).  Of all the technology available, there are four major tools used to collect private data:  Mobile phones, Global Positioning Systems (GPS), the Internet, and Video Surveillance.

     As I previously mentioned, the government gathers information through hand-held devices such as mobile phones.  As of 2006, the George W. Bush administration began tracking and storing all phone calls made within the United States (Dilanian).  In addition to the “Foreign Intelligence Surveillance Act” (FISA), the “Telephone Records and Privacy Protection Act of 2006,” confirms in section two article four that, “Telephone records have been obtained without the knowledge or consent of consumers. . .”  Not only has the government gathered information via phone calls, but they also collect data from phone companies and “unauthorized Internet access to account data” (Telephone Records and Privacy Protection Act of 2006).  After the Boston Marathon bombings in 2013, Katherine Russell, the wife of Tamerlan Tsarnaev—one of the bombers—was held liable for a conversation she had over the phone with her husband before he died.  In fact, former FBI counterterrorism agent—Tim Clemente admitted to Erin Burnett on CNN, “We certainly have ways in national security investigations to find out exactly what was said in that conversation” (Payton 187).  Another method called “pretexting” is commonly taken advantage of by government agencies and spies.  According to TechTarget.com, “Pretexting is a form of social engineering in which an individual lies to obtain privileged data” (Rouse).  As a matter of fact, the very definition of pretexting suggest false motivation.  In this case, the false motivation is called the “War on Terror.”  Over two and a half years ago, a former federal contractor—Edward Snowden—released top secret documents from the FBI.  One such document revealed the government’s alliance with Verizon to download and record all mobile communications (Payton 106).  Moreover, the NSA uses a program called Dishfire to intercept with over 200 million text messages daily (Ball).  The evidence is overwhelming and blatantly obvious: the government is storing phone calls regardless of whether or not they suspect suspicious behavior.  
        
     Another primary tool used for collecting data is the Global Positioning System (GPS).  Geolocation tracking is an efficient way to keep tabs on the whereabouts of every U.S. citizen under the sun.  Even if a smart phone’s GPS is supposedly turned off, preloaded applications such as the weather app, can send out signals that leave GPS fingerprints (Payton 98).  Thus, a person’s location can be pinpointed through the pinging of cell towers.  In a report conducted by Wired, they discovered that researchers can identify a target within four “data points” (Zetter).  An Investigator can also use pen registers—a tool that tracks phone signals—to locate a target without a warrant or probable cause.  Furthermore, they can simulate cellphone towers with stingrays, which “locate a phone even if it isn’t making a call” (Valentino-DeVries).  With the advancement of GPS technology, one can easily determine an individual’s private affairs.  As explained by the federal appeals court in Washington, D.C.:

A person who knows all of another's travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups — and not just one such fact about a person, but all such facts (United States of America, Appellee v. Lawrence Maynard, Appellant 30).

     Another means of geolocation tracking is through the GPS devices installed in cars.  Though, it is debatable whether or not a warrant should always be required in order to track a car via GPS (Payton 135).  According the Fourth Amendment, the protection against unlawful searches and seizures is a fundamental right.  However, that hardly prevents Policemen and Investigators from using geolocation tracking without a warrant.  While the Geolocational Privacy and Surveillance Act (H.R. 1312) was under consideration, ACLU’s Chris Calabrese stated,

Police routinely get people’s location information with little judicial oversight because Congress has never defined the appropriate checks and balances . . . Under the GPS Act, all that would change. Police would need to convince a judge that a person is likely engaging in criminal activity before accessing and monitoring someone’s location data. Innocent people shouldn’t have to sacrifice their privacy in order to have a cellphone (Zetter).

In certain cases, Law Enforcement will ignore the law entirely.  For instance, in January of 2012, the FBI secretly attached a GPS tracker to a man’s car, then proceeded to track him for 28 days (DesMarais). 

     Outside of hand-held devices, desktop computers and other digital communications can be used to track people via the Internet.  The World Wide Web plays a fundamental role in the invasion of privacy.  Supposedly Google, Apple, Facebook, Microsoft, Yahoo, and other online companies, have assisted the government in their PRISM program.  At its core, “PRISM is a system the NSA uses to gain access to the private communications of users of nine popular Internet services” (Lee).  Indeed, no social media platform is secure.  In an article published by Computerworld, writer Jay Alabaster shared that, “The Library of Congress is now storing 500 million tweets per day as part of its efforts to build a Twitter archive, and has added a total of about 170 billion tweets to its collection” (Alabaster). 

     In addition to the NSA and Library of Congress taking advantage of the Internet, the FBI shares a similar interest in gathering online data.  According to a CBS News report from 2001, the FBI uses a system called “Magic Lantern” to decrypt messages outside of encryption programs with keystroke-logging (FBI's Secret Cyber-Monitor).  Stored information includes: Photos, videos, emails, social media communications, online purchases, government transactions (i.e. taxes), and traveler data (Payton 42).  Every once in a while, federal judges meet for a special court gathering called the Foreign Intelligence Surveillance Court (FISA court), in order to review millions of phone and Internet records. Generally, all the information discussed in the FISA court is kept confidential (Quigley).  If our lack of privacy wasn’t infuriating enough, the NSA decided to create a program called XKeyscore—a program that files information from all internet sources.  When an NSA official wants information about a particular person, they can access an unlimited amount of Internet data right at their fingertips.  As a matter of fact, the NSA boast that XKeyscore is the “widest-reaching” system for collecting data from the internet (Greenwald).

     The final means of collecting data is done through video surveillance technology.  Currently, the most common type of video surveillance is through street cameras and license plate readers.  In fact, policemen can take advantage of video cameras to “monitor people walking down a city street—or record the actions of people protesting at a demonstration” (Introduction to Are Privacy Rights Being Violated?: At Issue).  Moreover, facial-recognition technology is already being used to identify citizens in real time, for security purposes.  As the American Civil Liberties Union stated in their article, “National Security Tools Should Not Infringe on Civil Liberties”:

Government data mining is now being replicated in a variety of other programs at the federal, state, and local levels, to spy on Americans in virtually complete secrecy. So-called "suspicious activity reporting" programs, for example, maintain that innocuous and commonplace behavior like photography and note taking about public buildings could be preparation to conduct terrorist attacks, and that the government should collect and retain information about Americans who engage in these activities (American Civil Liberties Union).

How does the government identify these suspicious people?  They record them using security lenses.  If having street cameras on every corner wasn’t bad enough, the U.S. government decided that unmanned aerial drones should be patrolling the skies as well.  These remote-controlled machines can be equipped with advanced features including (but not limited to): Heat sensors, motion detectors, and license plate readers (Boghosian).  Furthermore, these drones possess high-tech cameras for spying on people walking public streets or residing on private property.  In fact, a surveillance drone weighing less than an AA battery is already in the making (Healy).  As author and attorney John W. Whitehead wrote, “In 2007, insect-like drones were seen hovering over political rallies in New York and Washington, seemingly spying on protesters.” He continues with an eyewitness’s report of the drones: “[They] looked kind of like dragonflies or little helicopters” (Whitehead).  With technology that small, recording data in private places would be nearly effortless.  According to a 2010 report from the Department of Defense, they plan to have drones patrolling the entire country by 2015 (The Monitoring of Our Phone Calls? Government Spooks May Be Listening).  Since then, “Congress has provided the drone industry and law enforcement with $64 billion” (Boghosian).  Imagine the implications of having thousands of domestic surveillance drones roaming America’s skies.    

     In conclusion, the government is—without a doubt—invading the rights and privacy of all U.S. citizens.  Through hand-held devices such as mobile phones, the government has been wiretapping, recording, and storing calls and text messages.   Furthermore, Global Positioning Systems (GPS) have been used to pinpoint an individual’s location through satellite signals.  A target can be indemnified, simply by pinging them as they pass cell towers.  Other than phones themselves, the Internet is a key tool for collecting private data.  By allying with major online corporations, key-logging, and using advanced programs such as XKeyscore, the government can access oceans of online data.  Finally, the use of surveillance cameras has swept the nation.  On the corner of every block, video recorders are constantly rolling.  If that wasn’t enough, now surveillance drones are preparing to patrol the entire country.  Clearly, nothing is hidden.  How long can we allow the government to continue in their unlawful schemes?  Will America ever take their loss of privacy seriously?  As Benjamin Franklin once said, “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.”


What Is a Terrorist?

What Is a Terrorist?
By Jessica Harvey 
February 17, 2015





     Honestly, I don’t care what the technical definition of “terrorism” is; I am concerned that the government abuses it.  In fact, their definition of “terrorism” closely relates to Obama’s definition of “gun control”: the need “to reduce the broader epidemic of gun violence in this country” (Levs 153).  If you took the word “gun” out of that sentence, it would fit the ideology of the “War on Terror” almost perfectly.  Yet, we tend to overlook the fact those definitions are lies disguised as truths.  Both are just fancy terms to hide the government’s agenda.  As Paul Joseph Goebbles, a “German politician and Reich Minister of Propaganda in Nazi Germany” once said,

If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.

Terrorist aren’t the problem—the U.S. government is the problem.  As they continue to inject us with the fear serum, they propose a solution: High security, phone tracking, data-mining, nothing can be kept hidden, nothing will remain private, and that will solve everything.  Indeed, their “solution” will cure the illusion of terrorism and replace it with the illusion of safety instead.  Now, the government has to keep the threat of terrorism alive in order to preserve their power.  Our Founding Fathers would be disgraced.   

At what expense are we willing to give up our liberty to fight terrorism? 

     It’s no surprise that the government used 9/11 to further their agenda.  Think about it: planes hit the twin towers, America is in distraught, and the government swoops in to save the day.  On September 20, 2001, George W. Bush said in his address, “Every nation in every region now has a decision to make: Either you are with us or you are with the terrorists.”  Approximately one month after his speech, President Bush signed the Patriot Act.  In our state of fear, we allowed the government to trade our fundamental rights—all in the name of “freedom” from terrorism.  Consider how well planned out that was.  Do you truly believe that the government didn’t know about 9/11 prior to it happening?  If they did, do you think they would try to stop it?  Regardless of whether or not the government was behind the attack, it certainly worked to their advantage. 

     Take a moment to reconsider what George W. Bush said in his address: Anyone who is not an advocate for the “War on Terror,” is against the government.  Since the definition is constantly changing, those who disagree with the government could be labeled as domestic terrorists.  Two years ago, Bradlee Dean—President and CEO of You Can Run But You Cannot Hide International—wrote,

The Equal Opportunity branch of the military put out a training manual labeling "evangelical Christians" as the No. 1 threat to America . . . the USA Today front page stated "Terror Returns" after the Boston marathon bombing, and officials are stating that the suspects are possibly "homegrown terrorists."

Furthermore, in 2009, a report called “The Modern Militia Movement,” was released by state and federal law enforcement agencies.  On February 20, the Missouri Information Analysis Center (MIAC) outlined the alarming classifications for being a domestic terrorist: Conspiracy theorist and supporters of Ron Paul, Chuck Baldwin, or Bob Barr.  As lead writer and editor—Kurt Nimmo—from Infowars.com explains, the report “instructs the Missouri police to be on the lookout for supporters displaying bumper stickers and other paraphernalia associated with the Constitutional, Campaign for Liberty, and Libertarian parties.”

     Also, consider the fact that a suspected terrorist can be denied the right to a public trial or worse: executed instead of internment.  For instance, in February 2013, NBC news released a confidential Justice Department memo that validates the killing of al-Qaida suspects—including Americans.  Not only did they kill Anwar al-Awalki and Samir Khan with drones, but neither were charged with any crimes.  Both suspects were American citizens.       
    
It doesn’t matter what the definition of a terrorist is—the government has already determined that.