The State May Kill Intellectual Property

After thinking about the State Department’s attempt to censor 3D printable firearms I came to the realization that the destroyer of intellectual property may very well be the entity that created it. The state has never shied away from censorship but its desire to control information is obviously increasing. What will happen if the state continues to censor more and more material that it defines as objectionable? In all likelihood more information will be published anonymously.

How many people will attach their name to something if they know it will land them in prison or cause them to be murdered by the state? I think that list is pretty short. Most people would prefer to release such material anonymously. When material doesn’t have a name attached to it there is nobody to claim a copyright on it and therefore nobody to initiate an intellectual property lawsuit. In effect the state, through its efforts to censor information, may kill intellectual property. It would be fitting that the creator became the destroyer.

You Can’t Stop the Signal

It finally happened, the state finally made it’s move to suppress 3D printable firearms:

On Thursday, Defense Distributed founder Cody Wilson received a letter from the State Department Office of Defense Trade Controls Compliance demanding that he take down the online blueprints for the 3D-printable “Liberator” handgun that his group released Monday, along with nine other 3D-printable firearms components hosted on the group’s website Defcad.org, while it reviews the files for compliance with export control laws for weapons known as the International Traffic in Arms Regulations, or ITAR. By uploading the weapons files to the Internet and allowing them to be downloaded abroad, the letter implies Wilson’s high-tech gun group may have violated those export controls.

“Until the Department provides Defense Distributed with final [commodity jurisdiction] determinations, Defense Distributed should treat the above technical data as ITAR-controlled,” reads the letter, referring to a list of ten CAD files hosted on Defcad that include the 3D-printable gun, silencers, sights and other pieces. “This means that all data should be removed from public acces immediately. Defense Distributed should review the remainder of the data made public on its website to determine whether any other data may be similarly controlled and proceed according to ITAR requirements.”

I think we all knew this was coming. To tell the truth I hoped it would come. This was the overt act of censorship that was needed kick the Streisand effect into action and, in so doing, ensure that the 3D printer models created and hosted by Defense Distributed will never die. As it stands the number of seeds for the Defense Distributed files has jumped to several hundred. I’ve even found a Tor hidden service that is hosting the files (you need to use the Tor Browser Bundle to access that link). As I’ve heard several people say, you can’t stop the signal.

As I stated in my post explaining methods to render the Cyber Intelligence Sharing and Protection Act (CISPA) irrelevant, the need for anonymity and strong encryption is greater today than ever. The state is trying to spy on our communications and censor material posted online. While some may wish to beg the state to allow information to flow freely we know they aren’t going to comply. Because of their desire to control information we must bypass their ability to detect and censor information they find objectionable.

When the state makes attempts like this to censor information it allows us to test our ability to preserve said information. As it stands more people have downloaded the 3D printer models provided by Defense Distributed than would have if the state hadn’t made an effort to censor the models. In fact I’ve had several friends who were uninterested in 3D printed guns ask if I knew where to get the files. Now that the files have been declared verboten everybody wants a copy. The state really shot themselves in the foot with this one.

How Private Corporations and the State Team Up to Spy on You

Most people who travel in libertarian circles are quick to point out the dangers of government spying. Many of those same people are unconcerned with spying performed by private entities. After all private entities are good, right? If we lived in a black and white world where public and private entities were clearly divided that would be true but we live in a world where private corporations are married to the state in such a way that it’s almost impossible to tell the two apart. Do libertarians who oppose state spying but condone spying done by private corporations oppose or support private corporations that spy on users and sell that data to the state? It’s an important question to ask because we live in a world where that happens with increasing frequency:

It’s no secret that we’re monitored continuously on the Internet. Some of the company names you know, such as Google and Facebook. Others hide in the background as you move about the Internet. There are browser plugins that show you who is tracking you. One Atlantic editor found 105 companies tracking him during one 36-hour period. Add data from your cell phone (who you talk to, your location), your credit cards (what you buy, from whom you buy it), and the dozens of other times you interact with a computer daily, we live in a surveillance state beyond the dreams of Orwell.

It’s all corporate data, compiled and correlated, bought and sold. And increasingly, the government is doing the buying. Some of this is collected using National Security Letters (NSLs). These give the government the ability to demand an enormous amount of personal data about people for very speculative reasons, with neither probable cause nor judicial oversight. Data on these secretive orders is obviously scant, but we know that the FBI has issued hundreds of thousands of them in the past decade — for reasons that go far beyond terrorism.

NSLs aren’t the only way the government can get at corporate data. Sometimes they simply purchase it, just as any other company might. Sometimes they can get it for free, from corporations that want to stay on the government’s good side.

Scenarios such as this moved me away from my original libertarian roots that believed private entities had a right to do as they please so long as they didn’t harm anybody to viewing many of those private entities are mere extensions of the state. These scenarios also jump-started with interest in crypto-anarchy, specifically the need for anonymity and strong encryption of communications. In our world we must assume that everybody is spying on you and take appropriate measures.

Encrypt Your Data

Do you want another reason to encrypt your data? According to a former Federal Bureau of Investigations (FBI) counter-terrorism agent everything electronic communication is being intercepted:

On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:

BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It’s not a voice mail. It’s just a conversation. There’s no way they actually can find out what happened, right, unless she tells them?

CLEMENTE: “No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It’s not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.

BURNETT: “So they can actually get that? People are saying, look, that is incredible.

CLEMENTE: “No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.”

Is Mr. Clemente telling the truth? Are all electronic communications being intercepted or is he putting out misinformation to make people believe the state is omnipotent? I’m not sure but encrypting your communications is the best defense against pervasive snooping and would render the state’s surveillance powers irrelevant.

Obama’s Empty Gitmo Promise

After reneging on his original promise to close the Guantanamo Bay prison (Gitmo) Mr. Obama promised that he would really close Gitmo this time. Of course he has no intention of closing Gitmo because if he did then the facility would be closed:

The relevant law is the National Defense Authorization Act of 2012 (NDAA). This statute confirms the president’s power to wage war against al-Qaida and its associates, which was initially given to him in the Authorization for Use of Military Force (AUMF) passed shortly after 9/11. The NDAA also authorizes the president to detain enemy combatants, and bans him from transferring Guantanamo detainees to American soil.

The NDAA does not, however, ban the president from releasing detainees. Section 1028 authorizes him to release them to foreign countries that will accept them—the problem is that most countries won’t, and others, like Yemen, where about 90 of the 166 detainees are from, can’t guarantee that they will maintain control over detainees, as required by the law.

There is another section of the NDAA, however, which has been overlooked. In section 1021(a), Congress “affirms” the authority of the U.S. armed forces under the AUMF to detain members of al-Qaida and affiliated groups “pending disposition under the law of war.” Section 1021(c)(1) further provides that “disposition under the law of war” includes “Detention under the law of war without trial until the end of the hostilities authorized by” the AUMF. Thus, when hostilities end, the detainees may be released.

The president has the power to end the hostilities with al-Qaida—simply by declaring their end. This is not a controversial sort of power. Numerous presidents have ended hostilities without any legislative action from Congress—this happened with the Vietnam War, the Korean War, World War II, and World War I. The Supreme Court has confirmed that the president has this authority.

Since nothing is preventing Mr. Obama from closing Gitmo he must want it open, which means his promise to close the facility is empty. Somehow Obama’s supporters still believe he is against war. In reality Obama is just like Bush, a warmonger who gets off on the fact that he can personally order the assassination of anybody he wants. In fact Obama so enjoys order assassinations that he actually had to redefine “enemy combatant” and create new classes of enemies because he was running out of people to have butchered.

Happy Slave Day

I almost forgot to wish everybody a happy Loyalty Day:

In order to recognize the American spirit of loyalty and the sacrifices that so many have made for our Nation, the Congress, by Public Law 85-529 as amended, has designated May 1 of each year as “Loyalty Day.” On this day, let us reaffirm our allegiance to the United States of America, our Constitution, and our founding values.

NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, do hereby proclaim May 1, 2013, as Loyalty Day. This Loyalty Day, I call upon all the people of the United States to join in support of this national observance, whether by displaying the flag of the United States or pledging allegiance to the Republic for which it stands.

Demonstrate your loyalty to your masters but public demonstrating your willingness to obey. Fly the colors of your master, pledge your undying allegiance, and acknowledge that the United States is a country founded on obedience to our masters in Britain! If you’ll excuse me the Two Minutes Hate is about to begin and I plan to scream extra loud at the image of Emmanuel Goldstein to prove my undying loyalty!

The Ouroboros of War

People in this country often assume that the people labeled terrorists hate us because of our freedom. It’s an absurd concept on the surface. Why would people in a foreign country give a damn about the freedoms a person living in a foreign country enjoys? Unless they have nothing else to worry about they most likely are going to invest their time, money, and lives on such matters. If the terrorists don’t hate us because of our freedoms then why do they hate us? It’s simple, our government is bombing them:

For the first time, a civilian affected by a US drone strike in Yemen has testified before members of Congress. Farea al-Muslimi, an American-educated Yemeni journalist whose home village of Wessab had been attacked by a US drone just six days prior, went before the Senate’s Subcommittee on the Constitution, Civil Rights and Human Rights yesterday, during a special hearing on the effects of America’s secret drone wars on civilian populations and the US rule of law. But despite previous commitments, representatives of the Obama administration were notably absent.

“The drone strike and its impact tore my heart, much as the tragic bombings in Boston last week tore your hearts and also mine,” said Muslimi to the bipartisan panel of US Senators, which included committee chair Dick Durbin (D-IL), Ted Cruz (R-TX), and Al Franken (D-MN). The strike killed six people including its intended target, Hamid Radman al Manea, a local man suspected to have ties with Al-Qaeda in the Arabian Penninsula (AQAP). Muslimi was not an eyewitness to the strike, but he claims that the man was well-known around his home town and could have easily been arrested by local authorities — seemingly at odds with the US government’s legal position that drone strikes are only justified when capture is “unfeasible.”

[…]

Muslimi described his experience living in America as having changed his life, and has spoke highly of the US to his fellow Yemenis ever since his return. “Now, however, when they think of America, they think of the terror they feel from the drones that hover over their heads, ready to fire missiles at any time,” he said, describing the anger he has seen play into the hands of terrorist recruiters. “What the violent militants previously failed to achieve, one drone strike accomplished in an instant… This is not an isolated instance. Drone strikes are the face of America to many Yemenis.”

Most people remember how they felt during 9/11. First they were shocked then, after the shock wore off, they became angry. The same thing happened after the bombing in Boston, people were first in a state of shock and became angry afterward. It’s no different for people living in other parts of the world. When an American drone bombs a village and takes out several children along with the target the people of that community, especially the people who knew the victims, become furious. They want justice, they want to strike back at the monster that struck their community.

War is a self-feeding cycle. One group bombs another group, the other group bombs the first group back, the first group retaliates for the other group’s bombing by bombing them back, the other group retaliates for the first group’s retaliation, and so on. Eventually everybody is either dead or one side is out of soldiers, ordinance, or willpower to continue the fight. Nobody really wins. Sure, one group gets to declare victory but their victory only came at a tremendous cost.

Considering the fact that the United States is bombing people in the Middle East is it any surprise that the bombing in Boston was likely a retalitatory strike:

The two suspects in the Boston bombing that killed three and injured more than 260 were motivated by the U.S. wars in Iraq and Afghanistan, officials told the Washington Post.

Dzhokhar Tsarnaev, “the 19-year-old suspect in the Boston Marathon bombings, has told interrogators that the American wars in Iraq and Afghanistan motivated him and his brother to carry out the attack,” the Post writes, citing “U.S. officials familiar with the interviews.”

Patriotic folk are usually quick to say “We’re bombing military targets, they’re bombing civilian targets. It’s completely different!” That sentiment is bullshit. The United States has been targeting specific individuals and hasn’t made a notable attempt to avoid taking out innocent bystanders in its quest. Instead of using snipers or other assassins to take out targets in a manner that carriers minimal risk to bystanders the United States has taken the lazy route of dropping Hellfire missiles on suspects (since there is no trial to affirm guilt the people being bombed are merely suspects). Then, to compound its stupidity, it drops another bomb to ensure the target’s death and often kills emergency responders who arrive to care for the victims of the initial blast. There is no notable difference between bombing suspects with drones and the tactics of the people labeled by the state as terrorists.

Another thing often said by patriotic folk is “They’re targeting civilians, we’re not!” Ironically these are the same people who blame all Muslims and Middle Easterners for the actions of a handful of individuals. These bombers were likely patriotic folk themselves and, like patriotic folk here, lay the blame for the actions of a handful of American individuals on all Americans. In other words they don’t see their actions as targeting civilians just as many patriotic folk here don’t see dropping bombs from drones on civilian populations as targeting civilians. When you assign blame collectively don’t be surprised when your enemy does the same.

So here we sit. The government which claims to represent us has declared war on the people of the Middle East. Knowing they cannot win a conventional war they have opted to use the only tactic that has been effective at fighting the United States, fourth generation warfare. Many people here claim that the Muslims, Middle Easterners, or Muslim Middle Easterners are attacking us and we need to attack them back. When the people of the Middle East are attacked they claim that the Americans are attack them and see the need to return the favor. This cycle will continue until one side either wises the hell up or runs the other out of resources. Unless the United States does the former the people we call terrorists will do the latter. Until one of those two conditions are met the cycle will continue, bombs will be dropped, people will die, and demands for revenge will continue.

Californians are Paying for Their Own Oppression

It’s bad enough that the state steals money from the general populace but it adds insult to injury when the state uses that stolen money to further oppress the very people it’s stealing from. The Californian government has set aside $24 million of stolen funds to steal peoples’ guns:

The California state legislature passed a bill Thursday approving $24 million to expedite the confiscation of the estimated 40,000 handguns and assault weapons illegally owned by Californians.

SB 140, authored by Sen. Mark Leno (D-San Francisco), seeks to remedy the gun-confiscation backlog that has left thousands of illegal guns on the streets, including those owned by those with criminal convictions or serious mental illness.

“We are fortunate in California to have the first and only system in the nation that tracks and identifies individuals who at one time made legal purchases of firearms but are now barred from possessing them,” Leno said in a statement. “However, due to a lack of resources, only a few of these illegally possessed weapons have been confiscated, and the mountain of firearms continues to grow each day.”

What Mark Leno should have said was “We are fortunate in California to have a detailed firearm registration system that allows us to confiscate firearms we later declare verboten from people we no longer approve of.” This exemplifies the dangers of gun registries, they always end in confiscation. It also demonstrates why people should take a serious look at buying firearms on the “black” market. Instead of worrying about whether the state is later going to confiscate your legally purchased, and therefore registered, firearm you can sleep well at night knowing that your property is unknown to the state and therefore less likely to be stolen from you. That’s the only good thing about gun control laws, they encourage people to move their firearm purchased underground away from the Big Brother’s watchful gaze.

More Thoughts on CISPA

HR3523, the Cyber Intelligence Sharing and Protection Act (CISPA), which passed the House today, has been making news as of late. If passed into law, the bill would allow government agencies to share data with one another and allow private corporations to share data with the state without concerning themselves with any contractual obligations:

At that Committee meeting (1:01:45), the bill’s chief sponsor Chairman Rogers emphatically repeated his earlier assertions that CISPA wouldn’t breach private contracts in response to questions from Jared Polis:

Polis: Why wouldn’t it work to leave it up, getting back to the contract part, and I think again there may be a series of amendments to do this, if a company feels, if it’s voluntary for companies, why not allow them the discretion to enter into agreements with their customers that would allow them to share the information? …

Rogers: I think those companies should make those choices on their own. They develop their own contracts. I think they should develop their own contracts. They should enforce their own contracts in the way they do now in civil law. I don’t know why we want to get in that business.

[…]

And yet… for all Rogers’ bluster, CISPA moots private contracts—and House Republican leadership won’t fix the problem, even when five of their GOP colleagues offer a simple, elegant fix.

This is the same stubborn refusal to accept criticism and absorb new information that brought us SOPA, PIPA and a host of other ill-conceived attempts to regulate the Internet. It’s the very opposite of what should be the cardinal virtue of Internet policy: humility. Tinkering with the always-changing Internet is hard work. But it’s even harder when you stuff your fingers in your ears and chant “Lalalala, I can’t hear you.”

I think this brings up an important point that is often lost on people. As it currently stands most people rely on the service provider to protect their privacy. People who use services such as Gmail, Yahoo! Mail, Facebook, Twitter, etc. assume that those companies will prevent prying eyes from viewing unauthorized third-parties. This is a poor assumption for multiple reasons. First, most service providers make their money off of selling their customers’ information. There is an assumption that such information is anonymized to a point but there is no guarantee. I believe the conflict of interest is obvious. Reason number two is that even if a service provider does protect your privacy there is no guarantee that unauthorized third-parties won’t gain access by bypassing implemented security measures. The third reason is that customer information is often an asset that is sold off when a company becomes insolvent. If your e-mail provider were to enter bankruptcy they may be required to sell you information as part of their asset sale. Fourth, the state reserves the right to render contractual agreements irrelevant with the mere issuance of a subpoena. CISPA, ultimately, isn’t granting private entities the ability to violate their contractual agreements without legal consequences, it merely removes the requirement that a subpoena be issued before the contract can be violated.

The reason I advocate crypto-anarchy is because it’s a solution to all of the above mentioned problems. Imagine a world where everybody encrypted their e-mails. While the e-mails may be stored on an e-mail provider’s server the data would be unusable to them or unauthorized third-parties. The same applies to encrypted instant messages, web page requests, etc. Anonymizing tools can prevent service providers and anybody with access to their data from identifying your person or your location. Having encrypted data from an unknown person makes decryption difficult since you don’t know who to coerce the required keys out of.

Even if CISPA is passed there are many ways for your information to fall into unauthorized hands. Crypto-anarchy renders all of these threats irrelevant while begging politicians to not pass CISPA doesn’t. Solve all of the problems instead of a single minor one, use cryptographic tools today.

Demands to Expand the Surveillance State Arrive on Schedule

I said the first thing the state would grab for after the bombings in Boston were more surveillance powers. As if on queue a Republican from New York is using Monday’s tragedy to demand more cameras to spy on the general populace:

ANDREA MITCHELL, MSNBC: Congressman, briefly, do you think that this will lead to more cameras? I know it’s controversial, there are privacy issues. Boston does have a lot of cameras. European cities, led by London, have the most. Are Americans going to have to get used to more surveillance on a daily basis?

REP. PETER KING (R-NY): I think we do because I think privacy involves being in a private location. Being out in the street is not an expectation of privacy. Anyone can look at you, can see you, can watch what you’re doing. A camera just makes it more sophisticated, but it’s no different from your neighbor looking out the window at you or a police officer looking at you walking down the street.

So, I do think we need more cameras.

Surveillance powers are always the first thing the state grabs for after a tragedy. It’s a fairly safe thing to demand because the general population often view more state surveillance powers are rather benign. Another benefit of surveillance powers is that it expands the state’s watch without having to expand the number of people employed by the state to any notable extent, which keeps more money in the hands of the politicians. Before you know it we’ll be emulating London’s Big Brother situation.