NPR Smears Food Stamp Program

NPR News at 7 am: w/o context, it says cost of food stamp program has doubled since 2008. But that’s because more Americans are poor, not due to government waste. Another way they contribute to the right-wing agenda.

Obsessed with PRISM

I admit it: I’m obsessed with the NSA’s recently revealed PRISM program. Is it just me? I’m still thinking about and commenting on this, but I wonder if this is like torture and drones — just another scandal no one really cares about but the victims.

Are There 10,000 Potential Terrorists on Facebook?

That’s how many requests Facebook for customer data Facebook says it got from the NSA.

Could there really be 10,000 potential terrorists on Facebook? If so, maybe the the solution is to shut down that nest of vipers.

Seriously, sounds like Obama’s NSA is interested in stuff other than terrorism. Occupy movement, anyone?

LinkedIn Cuts Out Writers

For content providers, the Internet is usually a good news – bad news story. It initially sounds like good news; once you dig a little deeper, you learn about the rotten underbelly. And so it goes with today’s New York Times article about LinkedIn and the fact that they are offering original content by the rich and famous.

For free.

LinkedIn is offering original content by content providers, in the form of essays about how to improve your career prospects among other things.

Read down a little bit and you quickly learn that the rich and famous people who have been asked to contribute are not being compensated. Which makes you ask: how did they get these people to do it? Well, the truth is they aren’t.

People like President Clinton don’t write their own opinion columns, they’re ghostwritten by interns. Personally, I don’t think that this should be permitted. If someone’s byline appears under an article, it seems to me to be a basic predicate of journalistic ethics that that piece should be offered by the person it purports to be authored by.

So why do they do it? Or more accurately, why do their interns do it? For the free publicity. For politicians and other people who make their living by selling influence – and speeches and books – it makes sense to promote yourself anyway you can. It doesn’t matter that they don’t get paid.

The problem is, this practice leads to a lot of crappy content by people looking to promote themselves and it drives down the prices for those of us you were actually trying to learn a living as writers. It’s ugly, it’s nasty, and I don’t know when it’s going to come to an end.

The Classified Information Highway

Expect more walls, barriers and checkpoints along the information highway, where everything you type or download is considered a potential unexploded roadside device requiring a three million spook ordnance disposal team to pre-emptively detonate your thought bombs. The internet is being transformed into a military-occupied space, warns Wikileaks founder Julian Assange, commenting on NSA whistleblower Edward Snowden’s revelations that the US government had every one of its internet connected citizens under surveillance with the cooperation of the telecom and tech giants who store and organize your data. Iraq and Afghani civilians have known for decades what it’s like to be considered an “enemy combatant” on their own turf – guilty until proven dead. Every man, woman and child in Palestine could also tell you what it’s like to live under a military occupation on your own land, forced to navigate a maze of heavily armed checkpoints, making a 15 minute trip to your olive grove a seven hour ordeal involving interrogations and strip searches.

If internet giants have their way, netizens will have to confront prepaid toll booths along a classified information highway to gain access to selected sites able to afford the increased bandwidth fees that will be imposed upon them, while low-paying users will be diverted to a potholed cattle path to reach a slow loading site whose accessibility will be determined by how much you pay in fees to your internet carrier. In this world, cyber ‘haves’ are waved through fiber optic checkpoints, while the ‘have nots’ endlessly navigate obstacles and barricades put in place by the gatekeepers of information. This may explain Microsoft, Verizon, Google, et al’s willingness to hand over your data to the government. It’s cheaper than paying lobbyists to make the case for dismantling existing regulatory frameworks that provide equal access to all users. Even under existing laws, broadband has been almost completely deregulated in the USA, resulting in sub-par, extremely expensive internet access compared to any other industrialized country. Companies on the list of firms revealed to have complied with government demands for customers’ data (Comcast, AT&T, Time Warner, etc.) have done so willingly in exchange for favorable treatment from the FCC. The government can easily get what it wants from these companies already unencumbered by federal oversight, merely by muttering “FCC” under its breath at high level meetings in boardroom bunkers where attendees slip in and out of non-existent (really!) ‘back doors’.

Repeated attempts to ‘gentrify’, so to speak, cyberspace and transform it into a wholly commercial real estate zone have now given way to a full-blown military occupation implemented in part by the tech firms working in tandem with the government as private contractors, helping to root out “insurgents”.

We shouldn’t be surprised that our Imperial overlords have finally trained their sights on us and quietly declared us enemies of the state. Predator drones, like chickens, have a boomerang-like tendency to come home to roost. So you’re not bothered by a lack of privacy – good little lickspittle grunt that you are in the Brave New World Order of liberal cruise missiles raining down on evil-doers overseas who have crossed “red lines”. Perhaps you still believe that President Sparkle Pony is helpless against the predations of his own government, which he “inherited from Bush”. Perhaps you consider his unmanned flying machines vague and distant abstractions – a “better, less messy option” than more “boots on the ground”, while erasing the term “kill list” and the name ‘Bradley Manning’ (who?) from your mental hard drive, coz nothing harshes the mellow of a capital ‘O’ believer than the possibility their hero actually has authority. But maybe you should be concerned that the internet has been declared a military zone, because even good little lickspittle grunts could find themselves in a Homeland Security dragnet when they become expendable as surplus labor in the global sweatshop. Don’t believe me? Just ask a Mexican.

SYNDICATED COLUMN: 10 Things You Don’t Know About How the NSA Spies on You

The Least Most Untruthful Analysis of Obama’s Orwellian Dystopia

Glenn Greenwald of The Guardian says “a lot more significant revelations” about America’s colossal Orwellian surveillance state are coming down the pike — courtesy of the thousands of pages of classified documents he obtained from Edward Snowden, the heroic former CIA contractor. That should be fun.

In the meantime, we’ve got a pair of doozies to digest: Verizon’s decision to turn over its the “metadata” — everything about every phone call (except the sound) to the NSA, and the PRISM program, under which the biggest Internet companies (Google, Facebook, Apple, Microsoft, etc., pretty much all the top outfits except Twitter) let the NSA read our emails, see our photos, even watch our Skype chats.

Establishment politicians and their media mouthpieces are spinning faster than a server at the NSA’s new five zettabyte data farm in Utah, doing everything they can to obfuscate in the hope that we’ll forget this whole thing and climb back into our pods in The Matrix.

So let’s get some clarity on what’s really going on with 10 things you probably don’t know about the NSA scandals.

1. PRISM, not Verizon, is the bigger story.

Government-aligned mainstream media outlets like The New York Times and NPR focus more on Verizon because — though what the phone company did was egregious — it’s less indefensible. “Nobody is listening to your telephone calls,” Obama says. (When that’s what passes for reassurance, you’ve got a PR problem.) PRISM, they keep saying, is targeted at “foreigners” so Americans shouldn’t be angry about it. But…
2. PRISM really is directed at Americans.

“Unlike the call data collection program, this program focuses on mining the content of online communication, not just the metadata about them, and is potentially a much greater privacy intrusion,” notes Popular Mechanics.

Director of National Intelligence James Clapper testified to Congress that the NSA does not collect “any type of data at all on millions or hundreds of millions of Americans.” “Not wittingly.” As The New York Times said in an uncharacteristically bold post, this is a lie. Here’s what’s behind the Rumsfeldian logic of what Clapper describes as his “least most untruthful” testimony: “What I was thinking of,” explains Clapper, “is looking at the Dewey Decimal numbers of those books in the metaphorical library. To me the collection of U.S. persons’ data would mean taking the books off the shelf, opening it up and reading it.”

In other words, the NSA collects the search histories, emails, file transfer records and actual live chats of every American. They store them in a data farm. Whenever the NSA wants to look at them, they can. But according to Clapper, this isn’t “collecting.” It’s only “collecting” when they choose to read what they have.

I have bought several books. They’re on my shelf. I haven’t read them yet. Have I “collected” them? Of course.

I don’t want the NSA to read my sexts or look at my dirty pictures. The fact that they may not have gotten around to it yet — but have them sitting on their shelves — doesn’t make me feel better.

3. President Obama should be impeached over this.

Richard Nixon was. Or would have been, if he hadn’t resigned. Obama, his top officials and his political surrogates have repeatedly and knowingly lied to us when they said the NSA didn’t “routinely sweep up information about millions of Americans.” He should go now. So should others who knew about this.

4. PRISM and other NSA spy programs are not approved by courts or by Congress.

White House defenders say the surveillance — which is, remember, a comprehensive vacuuming up of the entire Internet, and of every phone call ever made — has been approved by the legislative and judicial branches, so there’s nothing to worry about. But that isn’t true. The “FISA court” is so secret that, until last week, no one had ever seen a document issued by it. It’s not a real court. It’s a useless rubber stamp panel that literally approves every surveillance request the government asks for. In 2012, that’s 1856 requests and 1856 approvals.

Very few members of Congress were aware of the Verizon or PRISM programs before reading about them in the media. Members of the Senate Intelligence Committee, a few select Friends of Barack, that’s it. That’s not Congressional oversight. Real oversight occurs in full session, in public, on C-SPAN.

5. There is no evidence that NSA spying keeps America safe. And so what if it did?

According to government officials, PRISM saved the New York City subways from being bombed in 2009. Actually, the alleged would-be terrorist was caught by old-fashioned detective work, not data-mining. There is zero evidence that the NSA has saved a single American from being blown up.

But so what if it did? In recent years, between 15 and 17 Americans a year died worldwide from terrorist attacks. You’re as likely to be crushed to death by your television set. It’s sad for the dozen and a half victims, of course. But terrorism is a low, low national priority. Or it should be. Terrorism isn’t enough of a danger to justify taking away the privacy rights of 320 million people.

6. This is not a post-9/11 thing.


We’re being told that PRISM and the latest Patriot Act-approved surveillance state excesses date back to post-9/11 “make us safe at any cost” paranoia. In fact, the NSA has been way up in your business long before that.

Back in December 1998 the French newsweekly Le Nouvel Observateur revealed the existence of a covert partnership between the NSA and 26 U.S. allies. “The power of the network, codenamed ECHELON, is astounding,” the BBC reported in 1999. “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism…the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analyzed.” ECHELON dates back to the 1980s. PRISM picks up where ECHELON left off, adding the Internet to its bag of tricks.

7. Edward Snowden expects to be extradited.

U.S. state media wonders aloud, “puzzled” at whistleblower Snowden’s decision to go to Hong Kong, which routinely extradites criminal suspects to the United States. But Snowden’s explanation is crystal clear. All you have to do is listen. “People who think I made a mistake in picking HK as a location misunderstand my intentions,” he told a local newspaper. “I am not here to hide from justice; I am here to reveal criminality.” Snowden could go to Ecuador, or perhaps Venezuela or Iceland. He’s staying put because he wants to face trial in the U.S. And I doubt he’ll cop a plea when he does. He wants a political hearing so he can put the system on trial. In the meantime, he’ll use the time it’ll take Obama’s legal goons to process the extradition to talk to journalists. To explain himself. To make his case to the public. And, of course, to help shepherd those new revelations Greenwald mentioned.

8. Caught being evil — or collaborating with evil — Google and other tech companies are scared shitless.

And they should be. Consumers and businesses know now that when Big Brother comes calling, Big Tech doesn’t do what they should do — protect their customers’ privacy by calling their lawyers and fighting back. This could hurt their bottom lines. “Other countries will start routing around the U.S. information economy by developing, or even mandating, their own competing services,” speculates Popular Mechanics. Europe, worried about the U.S. exploiting the NSA for industrial espionage, began working on work-around systems that avoid U.S. Internet concerns.

9. 56% of Americans trust the government’s PRISM program, which the government repeatedly lied about. What people don’t know should worry them.

You’re not a terrorist. You don’t hang out with them. So why worry? Because the data collected by the NSA isn’t likely to stay locked up in Utah forever. Data wants to be free — and hackers have already proven they can access the NSA. Some want to sell it to private concerns. To insurance companies, so they can determine whether your buying habits make you a suitable risk. To banks. To security outfits, to run background checks for their clients. To marketers. Mining of Big Data can screw up your life — bad credit, can’t get a job — and you’ll never know what you hit you. Oh, and don’t forget: governments change. Nixon abused the IRS and FBI to attack political opponents. Innocuous census data that collected religious affiliations was used by the Nazis to round up Jews when they came to power.

10. In the long run, the end of privacy will liberate us.

Everyone (who isn’t boring) has a dirty secret. The way things are going, all those secrets will be as out as Dan Savage — and just as happy and self-assured. Blackmail — the nobody-talks-about-real-reason-PRISM-is-creepy — only works if most dirty secrets are hard to come by. But if everyone’s got a nude photo online, if everyone’s sexual deviations are searchable and indexed, the power of shame goes away as quickly as it does at a nudist colony. By the time the surveillance state plays out, we may look back at 2013 as the year when America began to move past Puritanism.

If we’re not in a gulag.

(Ted Rall’s website is tedrall.com. His book “After We Kill You, We Will Welcome You Back As Honored Guests: Unembedded in Afghanistan” will be released in 2014 by Farrar, Straus & Giroux.)

COPYRIGHT 2013 TED RALL

css.php