A woman who was identified as a teacher in Anne Arundel County, Maryland made a TikTok video expressing her incredulity that her school district provided a protocol to deal with an alien invasion during a teachers’ meeting for safety. Anne Arundel County contains the state capital of Annapolis and Fort Meade, which is home not only to the National Security Agency, but also to the US Cyber Command and other defense agencies at the US Army post there.
It’s back-to-school season, and teachers and students everywhere are gearing up for an exciting school year. But alongside the purchase of school supplies and the preparation of classrooms, teachers have mandatory safety meetings to attend. These meetings are important ways for schools to communicate with the staff about allergies, fights, fires, natural disasters, and outside threats to the school from anyone who may wish to do the teachers or students any harm.
And apparently in this Maryland school district, that possibility includes extraterrestrials.
This video was posted by a teacher in Anne Arundel County, Maryland, who says that during their safety meeting for teachers, one of the topics was the correct procedure for dealing with alien invasions.
“Honestly, I did not process anything that was said during that part of the presentation,” she claims, “because I couldn’t believe what I was looking at.”
She goes on to ask if anyone else had a similar experience during their opening activities.
Of note: this Maryland County is home to the state capital of Annapolis, as well as Fort Meade, which is home not only to the National Security Agency, but also to the U.S. Cyber Command as well as other defense agencies at the U.S. Army post there.
In other words, all places that would very likely be targeted as part of an invasion or attack of any kind—alien or earthling.
In a vote of 80-16, the US Senate yesterday approved HR 6172, which reauthorizes several surveillance authorities originally passed into law via the USA PATRIOT Act as temporary measures. HR 6172 cements the collection of business records, the “roving wiretap provision,” and the so-called “lone wolf provision,” which allows the surveillance of those with no known connection to terrorist organizations. While the FBI has testified to the Congress that the “lone wolf provision” has never been used, this is widely thought to be inaccurate and that this provision is the authority under which US citizens, activists and journalists, are being widely surveilled.
Several amendments were proposed to the Senate, only one of which passed. Senator Mike Lee, R-Utah, had proposed an amendment which would guarantee the participation of an Amicus Curiae (Friend of the Court) in cases involving requests for permission from FISA to surveil political figures, religious organizations and the press. This amendment passed by a vote of 77-19.
The Wyden-Daines amendment would have restricted the collection of browser activity and internet search history. This amendment also failed.
Senator Rand Paul (R-KY) had proposed a widely publicized amendment which would prohibit the surveillance of American citizens, excluding Americans from the provisions involving wiretapping and data collection tools authorized by the FISA court. This amendment went down in flames, receiving 11 yea votes and 85 votes against.
In a speech on the Senate floor, Paul had this to say about HR 6172:
To those of us that prize the rights guaranteed in the Bill of Rights, the Patriot Act is a violation of our most precious rights. The Patriot Act, in the end, is not patriotic. The Patriot Act makes an unholy and unconstitutional exchange of liberty for a false sense of security.
The failure of Paul’s amendment points to an uncomfortable reality: it is appearing more and more that our government is dedicated to the surveillance of Americans. With Osama Bin Laden dead and ISIS under siege, one would wonder what is so compelling about the phone calls, internet activity and more of a growing number of American citizens who are now watchlisted.
Surveillance and the Coronavirus
It is compelling that Paul’s failed amendment comes at a time when the Department of Defense has just contracted with ApiJect to provide delivery systems for vaccines. ApiJect’s website details its capability to provide RFID tracking to every prefilled vaccine it provides, stating:
Whether health officials are running a scheduled vaccination program or an urgent pandemic response campaign, they can make better decisions if they know when and where each injection occurs. With an optional RFID/NFC tag on each BFS prefilled syringe, ApiJect will make this possible. Before giving an injection, the healthcare worker will be able to launch a free mobile app and “tap” the prefilled syringe on their phone, capturing the NFC tag’s unique serial number, GPS location and date/time. The app then uploads the data to a government-selected cloud database. Aggregated injection data provides health administrators an evolving real-time “injection map.”
ApiJect goes on to say:
Remote, real-time tracking of injections in the field can be achieved by affixing an NFC (Near Field Communication) tag to each BFS prefilled syringe. The NFC tag will hold a unique encrypted serial number. Just prior to injection, the health worker would tap the NFC tag to the back of their smartphone (just like using Apple Pay at a checkout counter). A free mobile app would capture and automatically upload the dose’s serial number, as well as append patient anonymous data including time, date, and GPS location to the government’s designated cloud database. Data would then be aggregated and analyzed to provide real-time coverage maps for more efficient vaccination campaigns.
In other words, everyone who gets the vaccine will have that event recorded and tracked.
It is entirely possible that this level of surveillance might have run into some problems should Senator Paul’s amendment, prohibiting the surveillance of US citizens, have passed the Senate. Clearly, a database concerning who has been vaccinated, when and where constitutes a surveillance authority.
Due to the passage of the Lee amendment to HR 6172, the Bill now goes back to the House to be reconsidered before going to President Trump to be signed into law. Senator Paul has stated he will ask Trump to veto the legislation. Given that Attorney General William Barr is a proponent of the Bill, and given that Trump appears to be on the fence concerning this, it is unknown whether he will veto it or sign it into law.
There is still time to contact the White House and voice your opinion on the tagging, tracking and surveillance of US citizens. Here is the contact information for President Trump: https://www.whitehouse.gov/contact/ You can also telephone the White House at this number and leave a comment for him: 202-456-1111
For a list of which traitors, er Senators that is, voted for the spy bill, you can check them out here:
Janet Phelan is an investigative journalist and author of the groundbreaking exposé, EXILE. Her articles previously appeared in such mainstream venues as the Los Angeles Times, Orange Coast Magazine, Long Beach Press Telegram, etc. In 2004, Janet “jumped ship” and now exclusively writes for independent media. She is also the author of two collections of poetry—The Hitler Poems and Held Captive. She resides abroad. You are invited to support her work on Buy Me A Coffee here: https://www.buymeacoffee.com/JanetPhelan
Being stranded in Moscow seems to come with certain opportunities – just ask Edward Snowden. The NSA whistleblower will appear in the upcoming film “Snowden,” which was partly filmed in the Russian capital, according to the movie’s executive producer.
Although actor Joseph Gordon-Levitt will play Snowden in the upcoming film, the NSA whistleblower will be making an appearance on the silver screen, executive producer Igor Lopatenok told RIA Novosti.
“Edward will appear in the film; he had one day of shooting in Moscow. We shot mostly in Munich, as well as in Hawaii, Hong Kong, and in Washington, where he could not come…,” Lopatenok said.
The executive producer went on to say that Snowden took part in around ten meetings in Moscow for the Oliver Stone film, and that Gordon-Levitt also met with the whistleblower. In fact, one particular scene in the movie will show the real-life Snowden in the same frame as the actor portraying him.
“…We have a moment when they were both in the frame… and I think Joseph was able to convey the character of Edward, he did it,” Lopatenok said.
The film is set to be released in Russia on September 15, and in the US one day later, but Russian viewers will be treated to an extra four minutes of the film, which US viewers won’t see.
“…The Russian audience is lucky to see a little more,” Lopatenok said, adding that some scenes were cut from the US version.
However, regardless of which country the movie is viewed in, it will make film-goers re-evaluate their views on internet privacy and social media, Lopatonok told Sputnik.
“For us, it is not the box office that matters, but the audience’s reaction. Looking at Stone’s previous films, they work for a long time; people keep revisiting them. In this case, we have a big Oliver Stone film, made in his style,” Lopatenok said.
Snowden has approved the film and its story, Lopatenok said, while praising Gordon-Levitt’s portrayal of the whistleblower.
‘The topic of Snowden is very controlled’
The entire topic of Snowden is “controlled,” according to Lopatenok. By way of example, he described a situation involving BMW, which used to sponsor almost all the films shot in Germany produced by Moritz Borman, a famous producer credited for Alexander and Terminator 3: Rise of the Machines, who is involved in the Snowden film production as well.
However, when BMW learned that Borman was producing a film about Snowden this time, it asked him to return the cars, Lopatenok claims.
“We were shooting in Munich, [BMW] gave us cars, and then we got a call from their representatives who asked us to return the cars because their American shareholders were against the story. The subject of Snowden is very controlled,” he said.
The producers feared that American special services might try to hack into the computers being used in the film production process, but Lopatenok believes that they took all possible precautions.
“We were able to take all the precautions [against hacking], however, we haven’t noticed direct intervention of [US] security services. Either we haven’t seen them, or they worked really great,” he joked.
Lopatenok added that the team learned how to use encrypted messenger applications, non-traceable browsers protected by cloud storage, and even how to cover their cameras.
“After this film, people will perceive security of their e-mails and social networks differently,” he concluded.
In 2013, Snowden – a former contractor for the US National Security Agency (NSA) – revealed that the personal communications of dozens of world leaders had been monitored by US intelligence agencies. He has been living in Russia ever since, after being granted asylum on the grounds that he would face espionage charges in the US.
The Intercept is opening up access to the Snowden archive
Starting today, the site will begin publishing internal NSA newsletters.
Nearly three years after Edward Snowden first exposed the NSA’s PRISM electronic data mining program, and his trusted journalist partners are finally ready to bring even more of those documents out into the open. Today, The Interceptannounced two initiatives to further that goal: First, the site is releasing a cache of internal NSA documents that it believes will point other journalists towards noteworthy stories. And second, The Intercept will partner with other national and international media outlets to allow access to the sensitive documents in its possession.
For the first initiative, the site is publishing 166 documents from SIDtoday, the NSA’s internal newsletter that covered everything from “serious, detailed reports on top secret NSA surveillance programs to breezy, trivial meanderings of analysts’ trips and vacations,” according to The Intercept‘s Glenn Greenwald. Although they can occasionally seem trivial, Greenwald notes that the newsletters have been the source of “significant revelations in the past.” Moving forward, the site will periodically release new batches of SIDtoday newsletters with summaries of the content found in each, as they did with this story on the NSA’s involvement in Guantánamo interrogations.
While the second part of The Intercept’s announcement is less visible, the site says they have now navigated the tricky legal and security issues involved in allowing additional access to a wider range of publications of journalists. “We now feel comfortable that we can do so consistent with the responsibility demanded by these materials and our agreement with our source,” Greenwald writes. In addition to the Washington Post, the New York Times and the Guardian — all of which published the original batch of leaks — The Intercept claims it has already shared the documents with more than a dozen media outlets around the globe, thus ensuring local journalists can cover the stories that affect them directly.
Twelve years ago, John Perkins published his book, Confessions of an Economic Hit Man, and it rapidly rose up The New York Times’ best-seller list. In it, Perkins describes his career convincing heads of state to adopt economic policies that impoverished their countries and undermined democratic institutions. These policies helped to enrich tiny, local elite groups while padding the pockets of U.S.-based transnational corporations.
I couldn’t help but think about Flint, Michigan, under emergency management as I read The New Confessions of an Economic Hit Man.
Perkins was recruited, he says, by the National Security Agency (NSA), but he worked for a private consulting company. His job as an undertrained, overpaid economist was to generate reports that justified lucrative contracts for U.S. corporations, while plunging vulnerable nations into debt. Countries that didn’t cooperate saw the screws tightened on their economies. In Chile, for example, President Richard Nixon famously called on the CIA to “make the economy scream” to undermine the prospects of the democratically elected president, Salvador Allende.
If economic pressure and threats didn’t work, Perkins says, the jackals were called to either overthrow or assassinate the noncompliant heads of state. That is, indeed, what happened to Allende, with the backing of the CIA.
Perkins’ book has been controversial, and some have disputed some of his claims, including, for example, that the NSA was involved in activities beyond code making and breaking.
Perkins has just reissued his book with major updates. The basic premise of the book remains the same, but the update shows how the economic hit man approach has evolved in the last 12 years. Among other things, U.S. cities are now on the target list. The combination of debt, enforced austerity, underinvestment, privatization, and the undermining of democratically elected governments is now happening here.
I couldn’t help but think about Flint, Michigan, under emergency management as I read The New Confessions of an Economic Hit Man.
I interviewed Perkins at his home in the Seattle area. In addition to being a recovering economic hit man, he is a grandfather and a founder and board member of Dream Change and The Pachamama Alliance, organizations that work for “a world that future generations will want to inherit.”
There is nothing quite like the image of a tinfoil hat to get people chuckling over the paranoia of “the conspiracy theorist” who takes precautions against brain scanning and electronic mind control. But if one topic has gone from conspiracy theory to conspiracy fact, it is government surveillance. Even more than the “revelations” of Edward Snowden, it was the way the system came out against him, as well as the further rollout of surveillance-friendly legislation that has convinced many average people that indeed sometimes they are actually watching you.
Various solutions have been offered about how to protect your privacy while connected to the Internet or when using your mobile phone, but one new product holds the potential to protect you at the source: your home. It’s not quite tinfoil but it does claim to offer a physical shield against surveillance and attack.
Conductive Composites is a company based in Utah (home of the NSA’s mega data center interestingly), which makes small cases and enclosures for shielding electronics. The company claims that their lightweight material made by layering nickel on carbon could be scaled up and essentially turn your entire home into a Faraday cage capable of blocking efforts at snooping, while also offering protection from electromagnetic radiation and EMP attacks.
As Defense One explains, Faraday cages are in fact routinely used by the military and governments to secure their own sensitive locations:
Today, Faraday cages are all over the place. In 2013, as the College of Cardinals convened to elect a new Pope, the Vatican’s Sistine Chapel was converted into a Faraday cage so that news of the election couldn’t leak out, no matter how hard the paparazzi tried, and how eager the cardinals were to tweet the proceedings. The military also uses Faraday cages for secure communications: Sensitive Compartmented Information Facilities or SCIFs are Faraday cages. You’ll need to be in one to access the Joint Worldwide Intelligence Communication System, or JWICS, the Defense Department’s top-secret internet.
The ongoing threat from EMP attacks, whether man-made or natural, is an additional concern that has become more grave as our society is now fundamentally dependent on computer systems.
Lightning strikes and other large electromagnetic pulse events—such as, say, a high-altitude nuclear explosion or geomagnetic storms caused by solar winds on a larger scale—can destroy electrical and electronic systems, inducing currents in conductors within them and overloading them. Just as generators create electricity by passing a wire through a magnetic field, a strong electromagnetic wave can create current within anything conductive it passes through. (Source)
A lightweight shielding material that is both flexible and scalable could be a key solution for those who wish to have the same level of security as our government and military.
A third area, which still remains somewhat controversial to the average person, is the health hazard of WiFi and other forms of electromagnetic radiation. Here, too, a flexible material that contains the properties of a Faraday cage could offer transportable protection for those who choose to shield themselves from pervasive signals.
The Conductive Composites website does show commercial-level production, but it remains to be seen how easy it will be for individuals to obtain these products – and at what cost. Interestingly, the company’s product page also lists paints, sealants, adhesives, concrete and wall paper, which suggests other protective applications.
This technology appears to be a positive step toward empowering those who have educated themselves about potential threats. Perhaps the largest hurdle, however, is to keep this type of technology legal. We have seen governments assert that the mere act of encryption should be made illegal; protecting yourself from drone surveillance has led to arrests; and sidestepping economic surveillance through technology such as Bitcoin is being viewed as potentially funding terrorism.
However, we also have learned that once technology is invented, those who demand freedom will always find a way to use it for their benefit.
Do you distrust the banking system? Prefer to do business in cash? Complain about the encroachment of Big Brother into every facet of your life?
If you answered “yes” to any of these questions, you’d better watch out. You’re a “person of interest” – and a growing number of businesses must report your “suspicious activities” to the feds. If they don’t, they can be fined and the responsible parties even imprisoned.
These requirements originated in a law called the “Bank Secrecy Act” (BSA). Of course, this Orwellian law has nothing at all to do with protecting bank secrecy. Indeed, the BSA has all but eliminated confidentiality.
Regulations issued under the BSA require financial institutions to notify the Financial Crimes Enforcement Network (FinCEN), a Treasury Department bureau, of any unusual transactions in which their customers engage. Reporting is mandatory for transactions that exceed $10,000 and are not the sort in which the particular customer would normally be expected to engage. For money transmitter businesses, a $2,000 threshold applies.
The businesses covered by these requirements must file “suspicious activities reports” (SARs) secretly, without your knowledge or consent. FinCEN makes the reports available electronically to every US Attorney’s office and to dozens of law enforcement agencies. No court order, warrant, subpoena, or even written request is needed to access a report.
Objecting to completing Currency Transaction Reports (required for transactions over $10,000);
Changing currency from small to large denominations;
Buying cashier’s checks, money orders, or travelers’ checks for less than the reporting limit ($10,000 for a cash transaction);
Making deposits in cash, then having the money wired somewhere else; and
Withdrawing cash without counting the cash first.
Now, FinCEN has issued preliminary regulations that could extend these rules to investment managers. All SEC-registered investment advisers would be required to design and implement an anti-money-laundering program. They would also need to file SARs with FinCEN.
Once these rules come into effect, investment advisors would no longer be accountable to you, their client. Their highest duty, reinforced by civil and criminal sanctions, would be to act as unpaid undercover agents for the US Treasury.
But FinCEN’s suspicious transaction reporting rules are just the tip of the iceberg. For instance, official guidance from the FBI and other government agencies indicate that all of the following actions make you a terror suspect:
Making an inter-library loan request for “The Little Red Book” by former Chinese communist leader Mao Tse-Tung;
[B]eing a citizen is sufficient cause to suspect a person of criminal conduct, thereby constricting civil liberties protections for that person. That situation is hard to distinguish from the legal status of citizens of Nazi Germany.
In a world that views virtually everything you do as suspicious, there aren’t a lot of options to protect yourself. Indeed, simply by expressing your interest in privacy, asset protection, precious metals, or any of the other topics I cover routinely, you’re likely on one government watch list or another already.
However, you can take steps to avoid having a bank or other financial institution – including an investment manager – file an SAR on you. If you’re considering doing anything out of the ordinary in your account, talk to an officer at the bank, brokerage, or other financial institution first. For instance, you might want to let someone know before you pay off a loan or make or receive a large transfer.
If you have a reasonable explanation for the transaction, it’s much less likely to set off an alarm. And in a country in which all citizens are considered criminal suspects, that’s definitely something you want to avoid.
Infographic – Lack of privacy on the Internet and in the real world continues to grow. Many people are becoming aware that what they share on their social networks can find its way to the furthest reaches of the Web. But did you realize that your private life at home could also become public, without your knowledge or consent? Here’s how technologies such as Google Street View and government monitoring initiatives are starting to intrude on people’s personal lives.
It turns out the NSA was collecting voice calls, photos, passwords, documents, and much more
Cale Guthrie Weissman
Jul. 1, 2015
NSA documents leaked to the Guardian in 2013 described a covert program called XKeyscore, which involved a searchable database for intelligence analysts to scan intercepted data.
Now, new documents show the breadth of this program and just what sort of data XKeyscore catalogs.
According to a new report from The Intercept, the amount of data XKeyscore scoops up as well as the sort of data it collects is much larger than originally thought.
Here are a few highlights from the new report:
The XKeyescore database is “fed a constant flow of Internet traffic from fiber optic cables that make up the back of the world’s communication network, among other sources, for processing,” the new report writes. Its servers collect all of this data for up to five days, and store the metadata of this traffic for up to 45 days.
Web traffic wasn’t XKeyscore’s only target. In fact, according to the documents posted by The Intercept, it was able to gather data like voice recordings. A list of the intercepted data included “pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.”
How the search works is very advanced. The new documents detail ways that analysts can query the database for information on people based on location, nationality, and previous web traffic.
XKeyscore was also used to help hack into computer networks for both the US and its spying allies. One document dated in 2009 claims that the program could be used to gain access into unencrypted networks.
Using XKeyscore was reportedly insanely easy. “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds,” security researcher Jonathan Brossard told The Intercept. “Simple. As easy as typing a few words in Google.”
While XKeyscore has been known as an intelligence tool for years now, these new documents highlight just how advanced and far-reaching the program’s surveillance is.
The NSA, in a statement to The Intercept, claims that all of its intelligence operations are “authorized by law.” It added, “NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”
Has everybody gone stupid? The NSA has not stopped spying on Americans… and it never will, either
Tuesday, June 02, 2015
(NaturalNews) There are days I just shake my head in bewilderment at the astonishing, almost incomprehensible gullibility of mainstream Americans and the media that claims to be practicing intelligent journalism. When I see the Associated Press report things like, “The NSA had stopped gathering the records from phone companies hours before the deadline,” I’m almost paralyzed with disbelief.
What’s so funny about that story? For starters, given that the NSA is a super secret organization with ZERO oversight and a history of repeatedly lying about what it’s really doing, how on Earth are we supposed to believe the NSA when it says it suddenly stopped spying on Americans’ phone calls because it “lost the authority” it never recognized in the first place?
Is the mainstream media really just taking the NSA’s word that it has stopped spying on everybody because it no longer has the “legal authority” to do so? There isn’t a single shred of evidence that the NSA has stopped any spying activities at all. Even more, the Associated Press has no way to verify whether anything has been halted. Trusting the NSA’s statement claiming it has halted its spying activities is about as gullible as trusting Iran’s statements on how it has halted its nuclear fuel enrichment program. Geesh… how hard is it for people to understand that governments lie by default?
So now, suddenly, we’re supposed to believe the NSA isn’t spying on us all merely because it says so? Should we pull out our pinkies and do a pinky swear on it, too? Maybe we can be BFF as well?
The NSA recognizes no legal authority, period
It’s just incredible that anyone would think the NSA’s activities are bound by anything even resembling “legal authority.” The NSA does whatever the hell it wants. And why does it do that? Because it can. Because they’ve already gathered up all the records of U.S. Supreme Court judges and they have enough emails, phone calls, web surfing history and search engine history to blackmail practically everyone in Washington D.C. (and everywhere else, for that matter).
“However Congress resolves its impasse over government surveillance, this much is clear: The National Security Agency will ultimately be out of the business of collecting and storing Americans’ calling records,” says the Associated Press. Yeah, right. In your crack-induced fairytale, maybe. But in the real world of hardball politics and blackmail, any organization that has the power to keep collecting all these records will absolutely keep doing so unless and until it is physically forced to stop (i.e. shut off the power, confiscate the servers and close the buildings).
And that’s never gonna happen, folks. Not by a long shot. The spy apparatus is far too valuable to ever be shut down. At best, it will pretend to shut down long enough to shut up the public. But behind the scenes, every single spy server dedicated to this task will continue as normal, without interruption.
Sorry to have to say this so bluntly, but anyone who believes the government is going to voluntarily stop spying on the American people is a complete fool. The way these games are really played is far beyond any recognition of “legal authority.” For example, the NSA can simply take its entire spy operation, transfer the assets to an NSA shell company in the Cayman Islands (without actually moving the servers anywhere), rename it “NSB” and continue operations as normal… all while testifying before Congress that, “The NSA has halted all domestic surveillance operations.” Yep, it has! But NSB has resumed those operations, ha ha.
And if NSB is ever unveiled, they can move it all to “NSC” and so on. The spying never stops, folks. The only thing that changes is the name of the spy organizations conducting it. Does any intelligent person honestly think they’re going to voluntarily shut off all those billions of dollars in servers and storage facilities they built for this purpose? Ain’t gonna happen.
And the way you know this to be true is to ask yourself this question: If you were the director of the world’s most amazing intelligence gathering spy tool that operated utterly without any boundaries or limitations whatsoever, would YOU shut it down? Of course not. No one would. You’d use it precisely because it’s powerful. It’s the Ring of Power from the Lord of the Rings. Almost no human being has the moral integrity to voluntarily part with it. It’s so PRECIOUSSSSS…
True American heroes: Edward Snowden and Rand Paul
Despite the ongoing spy activities of the NSA, it’s worth mentioning something hugely important in all this.
There is only ONE Presidential candidate who has the courage to stand up against the surveillance state and demand an end to these illegal violations of Americans’ privacy. His name is Rand Paul.
As far as I can tell, Rand Paul is the only candidate who has a spine. While Jeb Bush and Hillary Clinton are both total spy state insiders, Rand Paul is risking not just his political career but even his own neck to take a stand against the surveillance state. That’s historic. It’s truly remarkable, and it may uniquely qualify Rand Paul to be the kind of serious reformer who can take on Washington and knock some heads around.
Edward Snowden is also, of course, the key hero in all this, and I strongly recommend you watch the documentary called Citizen Four to gain a better understanding of Snowden’s contributions to privacy and freedom in America. Edward Snowden has quite literally risked his life — and forfeited his own personal freedom — to blow the whistle on the illegal spying being conducted by the U.S. government on the citizens of America.
What should have happened immediately after Snowden’s shocking revelations was a nationwide movement of pissed off people marching in the streets against Orwellian government. But what really happened instead was a nationwide movement of apathetic sheeple turning on Oprah and munching down some Twinkies before injecting themselves with insulin. In other words, nobody gave a damn because they were too busy cowering in blind obedience and practicing cowardice and conformity.
And so they all are getting the government they deserve: an Orwellian spy state that enslaves them all. This is what they are begging for, after all, when they are so gullible that they’ll believe anything the government tells them. The same people who believe the NSA magically stopped spying on them must also believe the FDA protects the people, the DEA wants to eliminate the drug trade, and the CDC is trying to eradicate infectious disease.
Wake up and smell reality, folks. None of these entities give a damn about the People. They all exist for only one purpose: to expand and assert their own power by any means necessary. That’s the fundamental nature of organizational existence, and it’s precisely why Big Government keeps getting bigger, badder and more dangerous unless its power is somehow limited or halted by the People.
Hence the origins of the Bill of Rights in the first place, over two centuries ago.
We’ve been down this road before, of course. This isn’t the first rise of police state tyranny in the history of our world. And it certainly won’t be the last…