Progressives Will Never Accomplish Their Expressed Goals Through Statism

Today’s political climate is so muddled with doublespeak and doublethink that it’s difficult to have any meaningful conversation. Consider the term progressive. The term indicates a forward movement for society that will hopefully mean a better future for everybody. People who identify themselves as progressives generally claim a desire to support the poor through government programs. They tend to advocate universal healthcare, a guaranteed living wage, welfare, and other programs supposedly aimed at ensuring everybody has the bare necessities of survival. In practice their goals tend to oppose one another.

One of the demographics often exploited by modern progressives is the homeless population. Progressives often claim that they want more government programs to help the homeless. Helping the homeless is a noble cause that I want to see society embrace. However, unlike progressives, I want to see voluntary methods used. Voluntary methods tend to avoid the hypocrisy that runs rampant in statist solutions. On the one hand progressives claim to want to support the homeless, on the other hand they support programs that make it difficult or impossible to help the homeless. There have been numerous instances where state officials used force to stop individuals from providing food to the homeless. Most of these instances were done under the guises of health safety. State officials claimed that there was no way to ensure the donated food met nutritional or safety standards. Instead of being allowed to partake in the generosity of giving individuals the homeless were forced to go hungry because some government thug in a city health department didn’t issue a stamp of approval.

Such an outcome in inevitable when medical costs are paid by the state. As I explained in my post about the state and its love of surveillance, the state has a vested interest in keeping its costs down. Programs that return little, no, or, worst of all, negative profit are either axed or retools to be more profitable. Military might, by allowing the state to expropriate from other states, and police, by allowing the state to expropriate locally, will always receive priority for funding. Healthcare, on the other hand, would normally cost the state money. In order to get around this issue states have done several things. First, most states that claim to offer universal healthcare also maintain an ever diminishing list of covered operations. Second, those states generally maintain a skeleton crew in the healthcare sector meaning the wait time for operations becomes great (and if you die the state doesn’t have to foot the bill for your operation). Third, and for this post most importantly, these states implement regulations aimed at reducing their healthcare costs. Any behavior that may incur healthcare costs by the state are made illegal. New York, being one of the most progressive cities in the United States, has continuously implemented prohibitions aimed at reducing the state’s healthcare costs. The most famous prohibition was the one placed on the sale of sugary drinks exceeding 16 ounces.

In addition to axing or retooling unprofitable programs the state also tries to shed itself of unprofitable population. A homeless individual, being without income and able to buy very little, is unprofitable for the state. They generally pay no income tax and very little, if any, sales or use taxes. Compounding the issue is their general lack of possessions. If you have a home, a bank account, or any other property you have value that the state can seize from you. Therefore you, in the eyes of the state, are profitable population. Just as a dairy farmer has an interest in maintaining the health of his dairy cattle the state has an interest in maintaining your health, so long as you’re not consuming so many of its available resources that you become unprofitable (in other words if you actually need a major medical operation the state would rather see you dead).

Here is where things come full circle. In the hopes of reducing healthcare costs the state ends up waging war against the homeless. In the state’s eyes donated food is a potential healthcare cost because it has set itself up to cover the healthcare costs of those who don’t have insurance or possession to seize. Homeless individuals don’t have insurance or possessions so the state is literally better off if the homeless are dead. Preventing the homeless of eating donated food reduces the state’s infinitesimal risk of caring for uninsured individuals who have nothing to steal. If homeless individuals end up starving to death the state has shed unprofitable population. In other words shutting down programs aimed at providing food for the homeless is a win-win for the state.

Herein lies the problem with progressives: their goals are mutually exclusive. By involving the state in healthcare progressives ensure that the state wages a war against the homeless. Voluntary methods of providing healthcare and helping the poor don’t suffer from such conflict of interests because the interests of the people involve is to help those in need. In other words those donating food to feed the homeless are doing so because they want to help feed the homeless. Since they’re not expropriating wealth they don’t suffer from helping those without wealth. I believe that most self-declared progressives mean well but their strategy ensures that their expressed goals will never be accomplished. Only through voluntary cooperation can people help one another. Once the voluntary component is removed costs will inevitably be faced by those who don’t want to face them. At that point the primary focus moves away from helping those in need to reducing costs.

Violent Criminals are Trying to Recruit Potential Computer Experts

One of the most violent gangs in the United States has begun actively recruiting individuals who show a high aptitude in computer skill. I would advise parents to talk with their children and warn them against joining the ranks of psychopaths such as the National Security Agency (NSA) and Department of Fatherland Motherland Homeland Security (DHS):

The secretary of that agency, Janet Napolitano, knows she has a problem that will only worsen. Foreign hackers have been attacking her agency’s computer systems. They have also been busy trying to siphon the nation’s wealth and steal valuable trade secrets. And they have begun probing the nation’s infrastructure — the power grid, and water and transportation systems.

So she needs her own hackers — 600, the agency estimates. But potential recruits with the right skills have too often been heading for business, and those who do choose government work often go to the National Security Agency, where they work on offensive digital strategies. At Homeland Security, the emphasis is on keeping hackers out, or playing defense.

“We have to show them how cool and exciting this is,” said Ed Skoudis, one of the nation’s top computer security trainers. “And we have to show them that applying these skills to the public sector is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took top spots at the Virginia Governor’s Cup Cyber Challenge, a veritable smackdown of hacking for high school students that was the brainchild of Alan Paller, a security expert, and others in the field.

With military exercises like NetWars, the competition, the first in a series, had more the feel of a video game. Mr. Paller helped create Cyber Aces, the nonprofit group that was host of the competition, to help Homeland Security, and likens the agency’s need for hackers to the shortage of fighter pilots during World War II.

The job calls for a certain maverick attitude. “I like to break things,” Mr. Berman, 18, said. “I always want to know, ‘How can I change this so it does something else?’ ”

Between drones and these types of competitions it appears that the United States government is continuing its track record of exploiting young children by making war feel like a video game. What the government recruiters don’t talk about are the harsh realities of war. In the case of computer security working for the government means working for the entity that is actively trying to suppress free speech on the Internet. This entity has continued to push legislation such as the Stop Online Piracy Act, Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, and Cyber Intelligence Sharing and Protection Act. In addition to pushing destructive legislation this entity has also actively worked against free speech by seizing domain names of websites it finds undesirable (without any due process, of course). This entity has even go so far as to relentlessly pursue an individual for being a proponent of free speech and free information. By every definition of the word the United States government is a terrorist organization.

If you or somebody you know is an upcoming computer expert I urge you to urge them to work on projects that help protect Internet users from the psychopaths in the United States government. The Tor Project and I2P are always looking for more developers. Those of us that want to preserve free speech, free information, and privacy online need more advocates of cryptographic tools such as OpenPGP, Off-the-Record Messaging, and encrypted voice communications. Young computer savvy individuals should work on becoming experts in such technology, encourage their friends to use such technology, and work on the next generation of such technology.

Fortunately, for those of us that work against the United States government’s continuous attempts to censor the Internet, most people described by the state as computer hackers are not fond of authority and are therefore more likely to pursue non-state employment instead of working for the monster that labels them criminals.

Asteroid Mining Rights

Popular Mechanics has posted an article asking who has the right to mine asteroids. Those of us in libertarian circles have been passing this article around as a joke. The article points out the fact that states generally maintain monopolies on mining rights and, in addition to those monopolies, implement numerous regulations on the mining industry. What the article appears to be asking is what laws will the lawyers create regarding asteroid mining:

But remember that open question. If you go get an asteroid and bring it back, is it yours? On Earth, of course, no one would open a mine without being sure they owned the land or at least the mineral rights. The same is true in space. But while mining law on Earth is pretty much settled, asteroid-mining law isn’t so clear yet.

The 1967 Outer Space Treaty prevents nations from making territorial claims beyond Earth: “Outer space, including the moon and other celestial bodies, is not subject to national appropriation by claim of sovereignty, by means of use or occupation, or by any other means,” it states. But what is “national appropriation”? And what is a “celestial body”?

Those are the kinds of issues that lawyers grapple with. Space law used to be mainly an academic pursuit, but no longer—in fact, the American Bar Association just published a guidebook in the field. Most experts—including me—believe that a ban on “national appropriation” doesn’t prohibit private property rights. The Outer Space Treaty was designed to prevent the winner of the 1960s space race from claiming the moon for itself. The United States and the Soviet Union were each worried about what would happen if the other nation beat it there. They were thinking of missile bases and territorial disputes, not mines or lunar tourist resorts. The “celestial bodies” language was added by way of expansiveness, but the Outer Space Treaty doesn’t define the term, except to make it clear that the moon is one.

Who cares what the lawyers think? The question that should be asked is, who can stop non-state entities from mining asteroids? We must remember that the state accomplishes all of its goals through the use of force. When people are outside of a state’s ability to inflict violence on them they are free to act outside of its law. That is the reason people in the United States don’t comply with Saudi Arabia’s laws, the Saudi Arabian state is unable to inflict violence on those of us living in the United States. Therefore we must ask what kind of violence the states of Earth can wield against those in orbit. As it turns out there likely isn’t a lot of violence Earth-based states can inflict on spacefaring individuals. One need only look at the condition of each state’s space program to see how ineffective they are in space. No state, as far as we know, possesses armed spacecraft capable of inflicting its will off of Terra.

What good are state decrees if they cannot be enforced with violence? They’re pointless, just as every unenforceable law. In fact I would say the key to mining asteroids isn’t just getting to the asteroids but is also preventing the states of Earth from inflict their violence off of the planet’s surface. Even if miners aren’t capable of preventing Earth’s states from getting armed craft off of the planet there is still the fact that space is so vast that no entity can patrol even a fraction of it. Once you’ve escaped Earth the only thing you need to do to keep yourself outside of the state’s grasp is to run a little further than it. This fact renders the question of state regulations of asteroid mining irrelevant.

Frontiers have traditionally been refuges from state power. People fled to the American colonies to escape the British Crown’s prejudice. Eventually the American colonies severed their ties entirely with Britain and established their own government. People wanting to flee the United State’s authority began moving into the western frontier. History gives us a numerous examples of individuals fleeing state persecution in frontiers and we are now seeing the beginning of people fleeing Earth to escape the tyranny of its states.

State Surveillance is the Problem, Crypto-Anarchism is the Solution

It’s a new day, which means the state must be planning to expand its surveillance system:

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

The state can’t help but expand its automated surveillance capabilities as automated surveillance systems allow the state to keep more of its stolen wealth for itself. Needless to say we’re not going to see a reduction in the amount of spying the state does on us but we can avoid Big Brother’s gaze. It really is time to start participating in crypto-anarchism. Encrypting e-mail, using anonymizers, accessing information through location hidden services, and performing transactions with crypto-currencies should be standard practice. In fact parents should be teaching their children how to use these technologies at an early age (because we know the state’s indoctrination centers won’t). If you don’t know how to use these technologies you should learn.

The Surveillance State

Via Bruce Schneier’s blog I came across an excellent, and short, essay regarding the surveillance state. Ian Welsh, the essay’s author, sufficiently sums up the tense relationship between the rulers and the enforcers:

This is one of the biggest problems the current elites face: they want the smallest enforcer class possible, so as to spend surplus on other things. The enforcer class is also insular, primarily concerned with itself (see Dorner) and is paid in large part by practical immunity to many laws and a license to abuse ordinary people. Not being driven primarily by justice or a desire to serve the public and with a code of honor which appears to largely center around self-protection and fraternity within the enforcer class, the enforcers’ reliability is in question: they are blunt tools and their fear for themselves makes them remarkably inefficient.

It’s easy to see the state’s motivation for implementing comprehensive automated surveillance. Paying enforcers to perform surveillance manually is expensive. Why would the rulers want to spend large amounts of money on manual surveillance when they can automate a great deal of the work and pocket the saved wealth? This is also the reason why the state tries to involve everybody, whether they’re an enforcer or not, into its surveillance system. How many times have we seen the phrase, “If you see something, say something?” Hell the phrase has its own Department of Motherland Fatherland Homeland Security (DHS) webpage. Every tattling neighbor increases the state’s watchful eye without incurring additional costs. Fortunately surveillance has a weakness:

The reliance on surveillance is however a weakness, one of many. One of the simplest ways to reduce the power and reach of the oligarchy is to destroy surveillance equipment, much of which is very easy to reach. I have frequently said that we will know that people are becoming more serious when they start destroying surveillance equipment, when it becomes an ethical imperative to do so; ideally when people believe that blanket surveillance is an ethical wrong.

I, am, thus interested to see that the Barefoot Bandit Brigade destroying surveillance cameras. In the US, those who oppose current elites directly seem strongest around Oakland and in the Pacific Northwest.

I touched on the strategy of destroying the state’s surveillance system when Minnesota politicians proposed reinstall red light cameras. Welsh puts forth an interesting idea: one can judge how serious people are about avoiding the state’s watchful eye when they begin openly advocating and participating in the destruction of surveillance equipment. It will be interesting to see if organizations like Camover and the Barefoot Bandit Brigade become more prevalent in the United States as the state becomes even more intrusive.

3D Printer Firearm Manufacture Moves to Bypass Censorship and Copyright of CAD Models

Last month DEFCAD was launched to host firearm related 3D printer models after Thingverse implemented site-wide censorship. Cody Wilson, the man behind Defense Distributed, is working on a new endeavor, a commercial version of DefCAD aimed at the free distribution of 3D models and bypassing copyright laws:

Wilson said DefCAD will become a for-profit corporation that will act as a one-stop search engine for “3D printable models” of just about anything. In other words, DefCAD hopes to be an expanded version of the physibles section on the Pirate Bay.

“It maintains all the present features but we step it up a notch,” Wilson told Ars. “The Pirate Bay has the right idea with physibles, but increasingly the fight is going to be about physical copyright—we want to build one of the tools early.”

And like the Pirate Bay, which has thumbed its nose at corporations, copyright, and the legal system for digital goods, Wilson suggests DefCAD would do the same for physical objects as much as possible.

[…]

“Help us turn DefCAD into the world’s first unblockable, open-source search engine for 3D printable parts,” Wilson narrates in the video. “There will be no takedowns. Ever.”

[…]

Wilson acknowledged that like the Pirate Bay, there are “contingency plans” to incorporate or move his operations to other countries not as affected by the DMCA. He specifically mentioned Slovakia, Russia and Singapore as “places we could go.”

The commercial DefCAD site is up and looking for crowd sourced funding. While I admit that this venture may not turn out and there is always the chance that this endeavor is a scam I believe Cody had demonstrated his sincerity by setting up DefCAD.org and developing a 3D printable AR-15 lower. Due to those facts alone dropped them $50.00 because I believe in the cause. I, like Code, am a crypto-anarchist and believe a world where voluntary interactions, not coercive interactions, are the norm:

So what’s Wilson’s endgame? He describes himself as a “crypto-anarchist” who follows the teachings of 19th-century French anarchist philosopher Pierre-Joseph Proudhon.

“I believe in revolution—not the capital-R ‘Revolution,’ but I’m all for the next thing,” Wilson said. “No one can imagine the end of neo-liberal democracy. I don’t believe in socialism from above, but socialism from below. It doesn’t matter what it is, the point is that it’s not imposed. It will be what it needs to look like. [Society will be] based not on coercion but cooperation—I’m a desperate romantic. If any of these things are possible, I don’t want to believe in anything else. I want to see if these are real and can work.”

His viewpoint isn’t that dissimilar from my own:

The revolution won’t be violent, it won’t involve fighting in the streets, it won’t involved people rising up and overthrowing the governments of the world. What the revolution will involve is the continuous decentralization of power. Technology will continue to evolve in a manner that empowers individuals to separate themselves from their rulers. Powerful corporations who have enjoyed protection from competition through the state’s decrees will lose their power as an ever growing number of people are able to replicate their goods from the safety of their own homes. Enforcing patents and regulations will become impossible. As people begin to fabricate needed goods themselves the large corporations and the state will bring in less wealth. People will no longer be forced to buy goods from politically connected corporations or pay sales tax to the state.

3D printers stand to be one of the greatest tools ever devise for stripping power from the handful of centralized entities that currently hold it. The state’s laws become more and more irrelevant as people become less and less reliant on it and its cronies. Gun control laws would be meaningless in a world where any individual can easily fabricate whatever firearm they want. Wealth raked in through sales tax would dwindle as individuals are able to make needed goods themselves. Couple 3D printer technology with anonymizing tools such as Tor and you have a world where information cannot be censored, tied to any specific individuals, and goods can be shipped from designers to customers free of the state’s watchful eye.

We will not achieve liberty, in the firearms community or in general, through political involvement. Begging those in power to cede their power is a foolhardy strategy that is doom from the start. When you involve yourself in politics you involve yourself in a system that was designed and can be redesigned at any time by those currently in power. Playing outside of the political system allows you to play by your own set or rules. Instead of begging those in power for liberty you can develop ways to entirely bypass their tyranny. If you want to ensure the state cannot ban firearms, magazines, or other related accessories it would behoove you to do whatever is in your power to ensure 3D printer technology advances.

Segregation, Jim Crow Laws, and the State’s Involvement

A common criticism of libertarianism is that segregation and Jim Crow laws would still be in place if it wasn’t for the state’s intervention during the Civil Rights Movement. According to statists segregation and Jim Crow laws only ended because the federal government passed the Civil Rights Act of 1964. This argument sounds good on paper but it falls apart when you look at the history of segregation and Jim Crow laws.

The first thing that should be noted is the word “laws” in Jim Crow laws. How did Jim Crow laws come into existence? Through state decree. Statists seem to forget that segregation and Jim Crow laws were put into place by the state. In other words the state didn’t magnanimously bring civil liberties to the downtrodden, it merely repealed its previous laws. Slavery was no different. First slavery was legalized by the state only to later be repealed. Somehow statists equate the abolition of slavery as a magnanimous action on behalf of the state and ignore the fact that the institution of slavery was first legalized by the state.

Let’s look at a slightly different, albeit similar, scenario. If a schoolyard bully and his friends have been beating up on a classmate for years and suddenly, one day, the bully tells his friends to stop we don’t praise the bully for being magnanimous and protecting his classmate. Instead we rightfully point out that the bully and his friends shouldn’t have been beating up their classmate in the first place.

One does not get to call himself a protector if he was the aggressor who decided to stop his aggression. That state doesn’t get to call itself a protector of civil liberties because is stopped persecuting a group of people. To say that the state is responsible for abolishing slavery, segregation, and Jim Crow laws requires ignoring the fact that the state legalized slavery, segregation, and Jim Crow laws.

Bypassing Minnesota’s Alcohol Laws

The history of alcohol laws in Minnesota can best be described as asinine. If you look at the Minnesota Department of Health’s website on alcohol laws you’ll find such gems requiring all alcohol advertisements be approved by the Commissioner of Public Safety and requiring all kegs to be registered. One of the other asinine laws is a prohibition against selling alcohol on Sundays (unless you’re a bar or restaurant). Attempts to repeal the prohibition have been tried numerous times but have continued to fail. Four Firkins, a specialty beer store in Minnetonka, is moving ahead with the latest attempt to strike the prohibition from the books:

Jason Alvey, who runs specialty beer and liquor store The Four Firkens, will try to persuade lawmakers to let he and other liquor stores open on Sundays.

Alvey argues the ban on Sunday sales is outdated and should be repealed.

However, not everyone agrees.

The Minnesota Licensed Beverage Association, along with other liquor store owners, say opening on Sundays would simply pull sales from other days and increase operating costs.

Alvey disagrees and says those who oppose Sunday sales don’t have to open seven days a week if a bill, sponsored by Senator Jeremy Miller, becomes law and repeals the ban. Instead, Alvey says liquor store owners could open on Sundays, reap financial rewards, and close on Mondays when he says sales are generally much slower.

The difficulty of getting the prohibition removed has been Minnesota’s own liquor lobby. As it currently stands most liquor store owners enjoy the prohibition against selling their goods on Sunday because it allows them to reduce their operating costs by not being open one day out of the week without having to suffer consequences of their competition being open on that day.

In addition to this constantly repeating battle another political issue involving alcohol has arrive, a bill that would increase the taxes placed on alcohol sales. Reading the bill will bring to light the fact that the tax increases would be tremendous, which is why I doubt the bill will pass in its current form. In all likelihood the bill is meant to be a “worse option” and a “better option” will be presented after some revisions. By doing this the populace of Minnesota are less likely to resist the increase because they will feel as though they got off lucky.

Being a practical man I wish to present a method that can be used to bypass both laws, along with every other Minnesota law regarding the sale of alcohol. If you’ve been reading this blog for any length of time you’ve likely guessed that the solution I’m going to present is agorist in nature, and you would be correct. The so-called black market can once again provide a solution to tyranny and it only requires producers of desired goods who are willing to ignore the state’s decrees. Are you a person who is willing to brew beer and/or distill liquor illegally? Are you willing to also sell your brewed beer and/or distilled liquor on Sunday? Congratulations, you are the solution! Agorist alcohol stands to be much cheaper since taxes are not applied to the price tag. On top of that agorist brewers and distillers can enjoy the freedom of selling their goods anytime they please. To make things even better no begging the state for permits is required.

Instead of begging the state to allow the sale of alcohol on Sunday or not increase the taxes on alcohol sales as much as they’re currently planning the people of Minnesota can simply start producing alcohol outside of the state’s law. In that way Minnesotans can enjoy cheaper alcohol that is available every day of the week. Furthermore agorist alcohol doesn’t contribute money to the state, which is actively suppressing competition in the alcohol market and making everybody pay a higher price. An added benefit is the fact that alcohol, being a cheap form of entertainment, has traditionally done well during times of economic hardship and therefore stands to make current producers a good amount of profit.

Bitcoin ATMs

The Free State Project held its annual Liberty Forum this weekend, which means that all sorts of subversive ideas were unveiled and shared. One of the ideas that I found very interesting was an Automated Teller Machine (ATM) that turns cash into Bitcoins:

Zach Harvey has an ambitious plan to accelerate adoption of the Internet’s favorite alternative currency: installing in thousands of bars, restaurants, and grocery stores ATMs that will let you buy Bitcoins anonymously.

It’s the opposite of a traditional automated teller that dispenses currency. Instead, these Bitcoin ATMs will accept dollar bills — using the same validation mechanism as vending machines — and instantly convert the amount to Bitcoins and deposit the result in your account.

I mentioned Bitcoin as a tool to fight the Cyber Intelligence Sharing and Protection Act (CISPA) since it allows individuals to make anonymous transactions and thus leave no trail for state agents to trace back to physical individuals. Avoiding having your financial information fall into government hands is very useful. If the state is unable to access your financial information they don’t know what to charge you for taxes and can’t bring criminal charges against you for buying goods it has labeled verboten. The one missing key in the Bitcoin puzzle is turning Federal Reserve notes into Bitcoins anonymously, which is what this ATM could make easier. At Bitcoin continues to gain traction it will be interesting to see what else develops around it.

Fighting CISPA

Remember the Cyber Intelligence Sharing and Protection Act (CISPA) that was introduced last year? Guess what, it’s back. For those of you who weren’t following CISPA the first time around it is a piece of legislation that would introduce exceptions into current privacy laws if those exceptions fell under the vague category of cyber security. Effectively it would render all privacy laws null and void as anything can be twisted into a cyber security threat. The Electronic Frontier Foundation (EFF) is urging people to contact Congress and demand that they vote against CISPA. Unfortunately such a strategy is, at the very best, temporary. The bill was shot down last year only to be reintroduce again this year and if it fails again it will almost certainly be reintroduced at a later date. Until the bill passes there will be a continuous cycle of the legislation getting voted down and reintroduced. This cycle will continue until the bill can be passed, likely as an amendment to a “must pass bill” (think the National Defense Authorization Act) or in a lame duck session on some Christmas Eve.

Fortunately there is good news, the tools to render CISPA entirely irrelevant already exist. Government spying powers become irrelevant if they can’t read acquired data or connect acquired data to real people. Making data unreadable is relatively easy to do using strong encryption tools. All major modern operating systems have built-in full drive encryption capabilities. Microsoft call their drive encryption technology BitLocker, Apple calls theirs FileVault 2, and Ubuntu has the same technology minus a fancy marketing term. When you fully encrypt your drive you make the data inaccessible to anybody who doesn’t have the proper decryption key. What if you don’t have a modern version of Windows, OS X, or Ubuntu? No problem, there’s a wonderful tool called TrueCrypt. TrueCrypt allows you to fully encryption a Microsoft Windows disk or creation encrypted volumes on Windows, OS X, and Linux. You can even use the tool to create a hidden encrypted volume that stores your secure information while keeping junk data in the regular encrypted volume. Doing this allows you to “decrypt” the volume to comply with state demands without having to decrypt your important information.

Encryption shouldn’t stop at your local system though. Every day you probably communicate with other people online and those communications are likely stored on third party servers or can be intercepted en route. There are tools that greatly reduce the risk of both problems. OpenPGP is an e-mail encryption tool that has been around for ages and is still a very effective tool to prevent prying eyes from reading your electronic correspondences. OpenPGP works by using asymmetric encryption. For OpenPGP to work there needs to be two keys, a public certificate and a private certificate. You distribute your public certificate to individuals you want to securely communicate with and, as the name implies, keep your private certificate private. E-mails encrypted with your private certificate can only be decrypted with your public certificate and vise versa. For instant messaging there is a tool called Off-the-Record Messaging (OTR). OTR works on top of currently existing instant messenger services so you can use it to communicate without having to convince all of your friends to switch services (I still have friends who refuse to move away from AOL Instant Messenger).

What about the second problem? How does one stop the state from connecting data to you? Simple, by anonymizing your data. The most popular tool for anonymizing data is Tor. Tor is an onion router, which is a not-so-fancy term for software that encrypts data at an entry point (in the case of Tor, your computer), bounces that encrypted data between multiple nodes on the network, and decrypts the data and sends it to its destination at an exit point. Unless you provide identifying information the exit node is unable to link the data it decrypts to its originator and none of the middle nodes are able to read the data or link it to its originator. Likewise, neither the exit point or intermittent nodes are able to link data that is returned from the receiver. In addition to anonymizing regular Internet traffic Tor allows an individual to run a hidden service. Hidden services only exist on the Tor network and all information communicated between a client and a hidden service is encrypted and bounced between multiple nodes in the network. This means communications between a hidden service and a client are hidden from outside sources and neither the hidden service or the client can identify one another (unless one submits identifying information to the other). If you need a demonstration of the effectiveness of hidden services take a look at Silk Road, a hidden service that allows individuals to sell illegal drugs. Silk Road is so effective that the Drug Enforcement Agency (DEA) has been unable to take it down.

Speaking of buying goods anonymously, let’s discuss payment systems. Silk Road and other “black” market hidden services generally rely on Bitcoin for transactions. Bitcoin is an electronic peer-to-peer currency that is both secure and relatively anonymous. Transactions are performed by sending Bitcoins to published public keys asymmetric encryption at your service, again). The public keys are anonymous unless the holder choose to reveal his identify or his identify is somehow compromised. Information between a sender and receiver of Bitcoins need only know the other person’s public key. Once again the effectiveness of Bitcoin can be demonstrated by the fact that the DEA has been unable to use Bitcoin transaction information to identify sellers on Silk Road.

There are many other tools out there, including I2P and Freenet, that can help denizens of the Internet render CISPA irrelevant. The state can’t do anything with information it can’t read or tie to a real person, which is why the United States has long held a policy prohibiting the export of strong cryptographic technology.