The Democrats Want to Prohibit Muslims from Owning Firearms

Yesterday the Democrats had a little sit-in. They were trying to prevent any politicking from happening until the Republicans agree to vote for a gun control bill. Let me start off by saying that preventing politicking from happening is a noble thing. I think the Democrats were being a shining example for their fellow politicians. More politicians should sit around and do nothing. The longer they sit and do nothing the longer they’re not voting on measures and the longer the people can enjoy relief from the tyranny of law makers.

But it behooves us to look at their motives. Many Democrats cheered their fellow politicians on. They believed this sit-in is noble because of what the Democratic politicians were trying to achieve. However, what they were trying to achieve was to prohibit Muslims from owing firearms:

While sit-in participants are also advocating for expanded background checks and an assault weapons ban, their primary call to action is for a vote on a measure that would ban gun sales to people listed on a federal government watchlist – a move clearly designed more for its political potency than for its effectiveness.

And the government’s consolidated terrorist watchlist is notoriously unreliable. It has ensnared countless innocent Americans, including disabled war veterans and members of Congress. Nearly half of the people on these watch lists were designated as having “no recognized terrorist group affiliation,” according to documents obtained by The Intercept in 2014.

What little we do know about the terrorist watch lists, thanks to a handful of leaks, is that over 40 percent of the names on them aren’t affiliated with any known terrorist organizations and that many of the names sound Muslim. There’s nothing noble about trying to block people of a specific religion from buying firearms. In fact, not to go all Godwin (since this is an accurate historical example), that’s exactly what the Nazis did to the Jews.

People criticize the Republicans for persecuting Muslims and rightly so. But the Democrats seem to get a pass even though they’re working towards the same ends. They’re two sides of the same fascist coin.

John Brennan is an Idiot

You probably read the title of this post and wondered what Brennan did this time to piss me off. Truthfully he didn’t really piss me off this time. What he did was make a public statement that really requires being an idiot to make.

Everything old is new again. As before, the United States government is busy debating whether or not mandatory backdoors should be included in civilian encryption. Security experts have pointed out that this is a stupid idea. Crypto-anarchists have pointed out that such a law would be meaningless because the Internet has enabled global communications so finding foreign encryption algorithms that don’t include a United States backdoor would be trivial. Hoping to refute the crypto-anarchists, John Brennan made this statement:

Brennan said this was needed to counter the ability of terrorists to coordinate their actions using encrypted communications. The director denied that forcing American companies to backdoor their security systems would cause any commercial problems.

“US companies dominate the international market as far as encryption technologies that are available through these various apps, and I think we will continue to dominate them,” Brennan said.

“So although you are right that there’s the theoretical ability of foreign companies to have those encryption capabilities available to others, I do believe that this country and its private sector are integral to addressing these issues.”

Theoretical ability? Let’s have a short discussion about the Advanced Encryption Standard (AES). AES is one of the most prolific encryption standards in use today. Most full disk encryption tools, many Transport Layer Security (TLS) connections, and a load of other security tools rely on AES. Hell, many devices even include hardware acceleration for AES because it’s so heavily used. AES was originally a competition held by the National Institute of Standards and Technology (NIST) to find a modern encryption standard. In the end an algorithm called Rijndael won. Rijndael was created by Joan Daemen and Vincent Rijmen. If those two names sound foreign it’s because they are. Joan and Vincent are Belgians. So one of the most common encryption algorithms in use today, an algorithm chosen by an agency of the United States government no less, was created by two foreigners. I’d say foreign encryption tools are a bit beyond theoretical at this point.

Adding insult to injury, let’s discuss Theo de Raadt. Theo, for those who don’t know, is the creator and lead developer of both OpenBSD and OpenSSH. OpenBSD is an operating system known for being security and OpenSSH is probably the most common secure remote connection tool on the planet. Both of them are developed in Canada:

It’s perhaps easy to forget, but the cryptographic landscape was quite different in 1999. A lot has changed since then. Cryptographic software was available, but not always widespread, in part due to US export controls. International users either had to smuggle it out printed on dead trees, or reimplement everything, or settle for the 40 bit limited edition of their favorite software. Many operating systems originated in the US, so it was difficult to integrate cryptography top to bottom because there needed a way to build the export version without it. OpenBSD had the advantage of originating in Canada, without such concerns. The goto public key algorithm of choice, RSA, was encumbered by a patent for commercial use. The primary symmetric algorithm was still DES. You could use blowfish, of course, but it wasn’t officially blessed as a standard.

Again, the availability of foreign encryption tools is more than theoretical. I would think the director of the Central Intelligence Agency (CIA), which is supposedly tasked with spying on foreign countries, would be very aware of that. But the CIA has a long history of failure so it being unaware of very real encryption tools originating in foreign countries isn’t really that surprising.

“Libertarian” Vice Presidential Candidate

Supposedly the Libertarian Party tries to get libertarians elected into offices. The party has a funny way of going about that goal though. For example, the party hasn’t nominated an actual libertarian presidential candidate for at least as long as I’ve been old enough to vote. This year’s ticket is no different.

Gary “Ban the Burqa” Johnson was nominated to be the Libertarian Party’s presidential candidate this year. Although the Libertarian Party doesn’t allow presidential candidates to outright pick their running mates, the party voters are usually willing to roll over and approve whoever their presidential candidate wants. Johnson wanted Bill Weld and the Libertarian Party, apparently deciding it didn’t want any libertarians on its presidential ticket, was happy to comply.

After the shooting in Orlando Weld decided to show his anti-libertarian colors:

Bill Weld, the former governor of Massachusetts now running as the Libertarian Party’s candidate for vice president, called today for a 1,000-agent task force to combat Islamic State adherents in the United States, and for a tip line where Muslims could inform on radicalism.

“Let’s face it: The United States is under attack right now by ISIS and ISIS copycats,” Weld said. “They have a deep pool to pull from. There are over 3 million Muslims in the United States — maybe Mr. Trump will want to deport them all, but the better approach is to work with the community.”

Weld, who served as U.S. attorney and then assistant attorney general in the DOJ’s criminal justice division, suggested that the DOJ could take a cue from a program that worked in Massachusetts. The “Drop-a-Dime Project,” a nonprofit tip line created by community leaders, was used by law enforcement to pursue tips about crime in Boston’s black neighborhoods and to achieve breakthroughs in drug investigations.

“We’d get all kinds of tips,” Weld said. “The residents of Dorchester and Mattapan were only too happy to help. There may be some people out there leaning toward ISIS, people who would want to shelter the people going around killing other people. But for every pair of ears that would be sympathetic, there will be pairs that will not be sympathetic.”

I thought the Libertarian Party was all about shrinking government, not growing it. I guess this is what happens when the party doesn’t nominates a libertarian for its vice presidential candidate.

I know the Libertarian Party, especially now that it’s pulling people from the Republican Party, has a lot of statists within its ranks so this idea may sound appealing to them. Let’s consider the effectiveness of such a program. I’ll start by once again quoting Bruce Schneier, “If you ask amateurs to act as front-line security personnel, you shouldn’t be surprised when you get amateur security.” This is something libertarians tend to inherently understand. If you setup a program where average Joes are expected to rat out their neighbors you will get a lot of noise and very little, if any, signal.

How do you tell if somebody expressing sympathies for the Islamic State (IS) is merely angry at the way the United States and European countries have treated the Middle East or is planning to commit acts of murder in the organization’s name? Most people can’t tell and that’s the problem with this kind of tip line. It would be flooded with “tips” from people who think somebody speaking out against the United States dropping bombs on wedding parts is sympathizing with IS. Many of the “tips” would likely come from people who just don’t like their Muslim neighbors and see the tip line as a way to get the State to harass them. Well’s proposal would create a 1,000-agent (you do have to appreciate how all of these proposals involve an arbitrary number of agents that is almost always cleanly divisible by 10) task force that does nothing productive (in other words, it’ll be just like every other government agency).

I’m glad I don’t play politics anymore. If I did I’d be depressed this election cycle because there are exactly zero acceptable candidates running for office.

The Most Transparent Government in History

The Freedom of Information Act (FOIA) claims to allow regular people like you and me to request information from the federal government. Each individual state has also implemented legislation to the same effect. But requests made under these laws often result in responses claiming no such information exists or reams of paper with large black blocks concealing any useful information. New York has gone an extra step. In addition to refuting the existence of requested information or handing over redacted information the state can now tell requesters that it cannot confirm or deny the existence of such information:

Normally, when you submit a FOIA request to a government agency, one of three things happens: You get the records you want, the agency says no such records exist, or the agency says the records are exempt from disclosure.

But there’s another possible outcome: You might be told that the agency can “neither confirm nor deny the existence or nonexistence” of the records. That’s been permissible under federal law since 1976. And now, thanks to a case raising concerns in media circles, it’s permissible under state law in New York—where, for the first time, an appellate court has affirmed the use of such a response under the state Freedom of Information Law (FOIL).

Now New York doesn’t even have to play the usual game where they keep denying your request until you make it so specific that they are no longer able to claim that the information doesn’t exist. Instead it can just tell you that it can neither confirm or deny the existence or nonexistence of the information! In other words, the Freedom of Information Law is entirely useless in New York.

If You Don’t Talk To Your Kids About State Violence, Who Will

Those of you who have watched Equilibrium probably remember the protagonist’s son. There are a few scenes in the movie where he, wearing his little jackboot uniform, ensures his father is taking his government mandated drug. In the movie the State trains the children to find offenders who aren’t taking their mandated drugs and goes so far as to train them to spy on their own parents. It’s an idea taken right out of the pages of George Orwell’s Nineteen Eighty-Four.

Sadly, that part of the movie isn’t entirely inaccurate today. Many parents unknowingly have little quislings living in their homes. To make matters worse, they often praise their children’s traitorous behavior. Take the Richardson family as an example:

Little 6-year-old Robbie Richardson called 911 on his dad when he “ran a red light.”

“911 what’s your emergency?,” Quincy Police Dispatcher Michael Bowes asks when he answers the call, a recording of which was obtained by ABC News.

“Um, Daddy went past a red light,” the dutiful kindergartner explained. “Daddy went past a red light. He has a black truck. He was in the brand new car, my mommy’s car, and we had to go to the car wash, and then he went past the red light.”

The 911 operator wasn’t a total douche and didn’t send a law enforcer to thump the father’s skull. But I’m sure the father had a good talk with his son about government violence, right? No:

As for their son, Robbie’s parents are proud of their little law-abiding citizen.

“I am proud of him that he knew if there was an emergency you call 911, but we were kind of in shock,” said McDonald. “We explained to him when we hung up the phone that you don’t call for those things, but if there was an emergency and someone needs to get a hold of the police, then you call.”

She’s now keeping clips of Robbie’s newfound fame because you never know what the future holds.

“He could become a police officer when he’s older and this would be cute to look back on,” she said. “I think I’m going to look into getting him a little ticket book.”

I’m going to have a headache all day from face palming after reading that. State violence begins at home. You should talk to your kids early on about the difference between actual crimes, ones involving a victim, and government decrees. Your children should also know that there is a chance of real violence anytime the police are brought into a situation. What may start as dad growing some cannabis so he can deal with his chronic pain, could end up in dead family pets and dad being kidnapped if a law enforcement agent finds out.

One thing is certain, if you don’t teach your children about government violence the public education system will brainwash them into believing the government is their friend. Programs like D.A.R.E. exist to convince kids at a young age that they can “trust police officers”, that “police officers are their friends”, and that they can always “tell a police officer anything”. These ideas could end up convincing your children to turn you in for violating a government decree.

If you don’t talk to your children about state violence, who will?

The Phones Have Ears

the-walls-have-ears

Smartphone are marvelous devices but they also collect a great deal of personal information about us. Data stored locally can be encrypted but data that is uploaded to third party servers is at the mercy of the security practices of the service provider. If your mobile phone, for example, uploads precise location information to Google’s servers then Google has that information and can be compelled to provide it to law enforcers:

So investigators tried a new trick: they called Google. In an affidavit filed on February 8th, nearly a year after the initial robbery, the FBI requested location data pulled from Graham’s Samsung Galaxy G5. Investigators had already gone to Graham’s wireless carrier, AT&T, but Google’s data was more precise, potentially placing Graham inside the bank at the time the robbery was taking place. “Based on my training and experience and in consultation with other agents,” an investigator wrote, “I believe it is likely that Google can provide me with GPS data, cell site information and Wi-fi access points for Graham’s phone.”

That data is collected as the result of a little-known feature in Google Maps that builds a comprehensive history of where a user has been — information that’s proved valuable to police and advertisers alike. A Verge investigation found affidavits from two different cases from the last four months in which police have obtained court orders for Google’s location data. (Both are embedded below.) Additional orders may have been filed under seal or through less transparent channels.

This problem isn’t unique to location data on Android devices. Both Android and iOS have the ability to backup data to “the cloud” (Google and Apple’s servers respectively). While the data is encrypted in transport it is not stored in an encrypted format, at least no an encrypted format that prevents Google or Apple from accessing the data, on the servers. As Apple mentioned in the Farook case, had the Federal Bureau of Investigations (FBI) not fucked up by resetting Farook’s iCloud password, it would have been feasible to get the phone to backup to iCloud and then Apple could have provided the FBI with the backed up data. Since the backed up data contains information such as plain text transcripts of text messages the feature effectively bypasses the security offered by iMessage. Android behaves the same way when it backs up data to Google’s servers. Because of this users should be wary of using online backup solutions if they want to keep their data private.

As smartphones continue to proliferate and law enforcers realize how much data the average smartphone actually contains we’re going to see more instances of warrants being used to collect user information stored on third party servers.

You Have No Right To Privacy In Minnesota If You Live In A Multiple Unit Dwelling

Are you a Minnesotan who lives in an apartment or condominium? If so, a local court of appeals has ruled that you have no expectation of privacy:

Stuart Luhm of Minnetonka had challenged his conviction on drug and weapons offenses because police did not have a warrant to enter his building in the August 2014 raid that was based on a tip from an informant.

The front door of the building is normally locked, but police used a key in a locked box to which police have access, and Brio the drug-sniffing dog confirmed that drugs were probably in the condo unit Luhm shared with a girlfriend.

That was the point when police got a search warrant and found large quantities of marijuana, 93 oxycodone tablets, 7 firearms, and two bullet-resistant vests.

Two members of the Court of Appeals ruled today that there is no expectation of privacy in the common areas of a condominium building. It also said the fact the building owners make access available to police negated the need for a warrant to enter the building.

What makes this case interesting is that the drug dog alerted in the common area and that gave the law enforcers the justification they needed to pull a warrant. Drug dogs are of questionable effectiveness, so the idea that a warrant can be issued because one alerted is a bit absurd in my book. But this ruling effectively opens the doors for law enforcers to enter multiple unit dwellings with drug dogs but without warrants, allow the dog to sniff around, and pull a warrant for any dwelling that the dog raises an alert on. That sounds like a wonderful revenue raising scam if I’ve ever seen one.

It also raises questions about medical cannabis users. What happens when a dog raises an alert on an apartment because it caught the sent of cannabis? The law enforcer can obtain a warrant, kick in the door, shoot the family pet, and basically force the medical cannabis user to divulge their medical history to somebody who isn’t a medical professional to avoid being kidnapped for the crime of not having purchased a single family house.

Since drug dogs are of questionable in their effectiveness, this ruling also opens the door for legal harassment of non-drug users. If a law enforcer wants to harass somebody living in an apartment all they have to do is bring a drug dog into the common area, claim the dog raised an alert on the apartment, pull a warrant, and legally enter and harass the person for however long they so choose (and maybe find evidence of another crime while they’re tossing the joint).

Of course, privacy has been dead for a long time in this country. This ruling doesn’t change much. But it’s worth noting because it’s a great example of how the courts and law enforcers often work together (as opposed to act as checks and balances against one another) to expand the State’s ability to expropriate wealth from the populace.

The Bill Of Rights Won’t Save You

You really need to use full disk encryption on all of your electronic devices. Modern versions of OS X and Linux make it easy. Windows is a bit hit or miss as BitLocker tries its damnedest to share your key with Microsoft’s servers. iOS has included full disk encryption by default — so long as you set a password — since version 8 and Android also includes support for full disk encryption. Use these tools because the Bill of Rights won’t protect your data from government snoops:

The government can prosecute and imprison people for crimes based on evidence obtained from their computers—even evidence retained for years that was outside the scope of an original probable-cause search warrant, a US federal appeals court has said in a 100-page opinion paired with a blistering dissent.

The 2nd US Circuit Court of Appeals ruled that there was no constitutional violation because the authorities acted in good faith when they initially obtained a search warrant, held on to the files for years, and built a case unrelated to the original search.

The case posed a vexing question—how long may the authorities keep somebody’s computer files that were obtained during a search but were not germane to that search? The convicted accountant said that only the computer files pertaining to his client—who was being investigated as part of an Army overbilling scandal—should have been retained by the government during a 2003 search. All of his personal files, which eventually led to his own tax-evasion conviction, should have been purged, he argued.

From my layman’s understanding of the Fourth Amendment, it’s supposed to protect against government shenanigans such as snooping through your data that was obtained under a valid warrant but was unrelated to the case the warrant was issued for to build another case against you. Although the quote is most likely false, Mr. Bush supposedly said, “It’s just a goddamned piece of paper!” in regards to the Constitution. While the quote is probably false the statement is not.

The Constitution cannot protect you. It is literally a piece of paper with words written on it. If you want some semblance of protection against the State you have to implement it yourself. Encrypting your devices’ storage would guard against this kind of nonsense assuming you weren’t foolish enough to decrypt the data for the State at any point. This is where features such as VeraCrypt’s (a fork of TrueCrypt that is being actively developed) hidden partition feature are nice because you can have a sanitized encrypted partition that you can decrypt and a hidden partition with your sensitive data. Since the hidden partition isn’t detectable the State’s agents cannot know whether or not it exists and therefore cannot compel you to decrypt it.

Utilize the tools available to you to protect yourself. Anybody who has been paying attention to recent American history knows that the supposed legal protections we all enjoy are little more than fiction at this point.

Airport Security Isn’t The Only Security The TSA Sucks At

The Transportation Security Administration (TSA) sucks at providing airport security. But the agency isn’t a one trick pony. Demonstrating its commitment to excellence — at sucking — the TSA is working hard to make its computer security just as good as its airport security:

The report centers on the the way TSA (mis)handles security around the data management system which connects airport screening equipment to centralized servers. It’s called the Security Technology Integrated Program (STIP), and TSA has been screwing it up security-wise since at least 2012.

In essence, TSA employees haven’t been implementing STIP properly — that is, when they’ve been implementing it at all.

STIP manages data from devices we see while going through security lines at airports, namely explosive detection systems, x-ray and imaging machines, and credential authentication.

[…]

In addition to unpatched software and a lack of physical security that allowed non-TSA airport employees access to IT systems, the auditors found overheated server rooms and computers using unsupported systems — and much more.

The observed “lack of an established disaster recovery capability” noted by the OIG is particularly scary. If a data center was taken out by natural disaster, passenger screening and baggage info would be rendered inaccessible.

Not only that, but there was no security incident report process in place, and there was “little employee oversight in maintaining IT systems.” And, auditors were not pleased at all that non-TSA IT contractors maintained full admin control over STIP servers at airports.

At what point do we write the TSA off as a failed experiment? I know, it’s a government agency, it’ll never go away. But the fact that the TSA continues to fail at everything and is allowed to continue existing really demonstrates why the market is superior to the State. Were the TSA forced to compete in a market environment it would have been bankrupted and its assets would have been sold to entrepreneurs who might be able to put them to use.

It’s time to ask the million dollar question. What will happen now? One of the reason government agencies fail to improve their practices is because there’s no motivation to do so. A government agency can’t go bankrupt and very rarely do failures lead to disciplinary action. In the very few cases where disciplinary action does happen it’s usually something trivial such as asking the current head of the agency to retire will full benefits.

Meanwhile air travelers will still be required to submit to the TSA, which not only means going through security theater but now potentially means having their personal information, such as images from the slave scanners, leaked to unauthorized parties.

Being Able To Lookup Your Neighbor’s Income Online Is A Terrible Idea

Statists come up with the dumbest ideas. One of latest stupid statist ideas is the idea that Norway’s practice of posting everybody’s tax returns online is a good idea:

But maybe the demand that Trump post his returns doesn’t go far enough. Maybe everyone’s tax returns should be a matter of public record. It sounds nuts, but in Norway, Sweden, and Finland, it’s the law, and it works. Norway’s been putting out records since 1814; in Sweden, they’ve been public since 1903.

Public tax returns help reduce gender and racial pay disparities, make labor markets more efficient, encourage workers to bargain for higher pay, prevent tax evasion, and create a rich font of data for economists and other researchers. The US ought to give the idea a try.

Why should anybody have any right to privacy at all? We might as well just put our medical records, voting records, and any other type of records online for everybody to see! And fuck those people who want to have control over their personal information. They’re obviously hiding something.

If you read the article you will discover that the author is a jealous individual trying to disguise that jealousy as pragmatism. He starts off by arguing that making tax return information publicly available would improve the job market. This claim is backed up by a great deal of statist nonsense such as imply that markets require perfect information (they don’t) and claiming that it’s impossible for employees to find out what their fellows at other companies are making if tax return records or private (apparently it never occurred to the author that you can just ask). But he eventually get’s to his real point:

Another thing about pay transparency: It makes it harder to evade your taxes. Adding scrutiny from not only the tax collection agency but your neighbors and competitors makes it tougher to fudge your reported income.

Making tax returns publicly available makes it easier for the State to steal wealth to fund its law enforcers, war machine, economic protectionism, and other atrocities. This is ultimately what every statist’s opposition to privacy boils down to. As believers in the One True State, they want to make it as difficult as possible for anybody who opposes their political god. Are private tax returns making it harder for their political god to steal? Make the records public! Is end-to-end cryptography making it harder for their political god to keep the citizenry in line? Restrict effective cryptography! Are anonymizing services allowing people to peacefully cell illicit goods? Ban anonymizing services!

This is why privacy is so important. The State and its worshippers want to know as much about you as possible. That way they can better know what you have so they can steal it and identify dissidents so they can crush them. Know that when somebody advocates that privacy must be curtailed they’re necessarily arguing that the State must be further empowered. Also know that the empowerment of the State always comes at the expense of individual freedom.