Because Punishing The Victim Makes Sense

Hypothetically let’s say a student stole a cell phone from their teacher. The teacher, being an average person and almost entirely ignorant on security, didn’t set a lock code. Because there was no lock code the student was able to log in. After logging in the student found embarrassing pictures of the teacher and sent them to friends.

In this situation would you punish the teacher or the student? Although not setting a lock code on your phone isn’t a wise decision there is no victim involved when somebody is ignorant. There is, however, a victim when a theft occurs. That being the case, I would argue the student should be punished but the teacher should not. Of course, that’s not how things work in our society:

A South Carolina high-school teacher may be charged with contributing to the delinquency of a minor after a student stole her cellphone and distributed partially nude photos from it around the school. Administrators say she should have password-protected the phone.

[…]

One might think that the student would at least face disciplinary action from the school, if not criminal charges of some sort. But thus far, the school has not moved to hold the 16-year-old student accountable at all. Arthur, however, is another story. After teaching in Union County for 13 years, she resigned when district officials gave her the choice to do so immediately or start the firing process.

Interim superintendent David Eubanks told The State that Arthur might also be charged with contributing to the delinquency of a minor. “I think we have a right to privacy, but when we take inappropriate information or pictures, we had best make sure it remains private,” he said.

I would argue that this is the inevitable result of combining zero tolerance policies, a total lack of critical thinking when “it’s for the children”, and having a legal system instead of a justice system.

The only victim here was the teacher because her phone was stolen. But since children saw her nude photos the fact that she was the victim of theft and didn’t send the photos is ignored. To make matters worse, the thief is left unpunished because, well, reasons.

So here we are, continuing to wallow in a society that punishes victims and lets criminals go unscathed.

Brazilian Government Unable To Break WhatsApp’s Encryption, Retaliates By Kidnapping A Facebook Employee

This may be a preview of things to come here. The Brazilian government is a bit peeved that it is unable to bypass WhatsApp’s encryption. Furthermore, it has been unable to convince Facebook, the owner of WhatsApp, to include a backdoor in the software. In what appears to be an act of retaliation the government has decided to harass Facebook by kidnapping one of its employees:

The arrest was made at the request of officials from the state of Sergipe, in Brazil’s north-east. In a statement, the federal police said Facebook/WhatsApp had repeatedly failed to comply with court orders relating to an organized crime and drug-trafficking investigation.

[…]

WhatsApp said in a statement that it was disappointed at the arrest and is unable to provide information it does not have, due to the architecture of its service. “We cooperated to the full extent of our ability in this case and while we respect the important job of law enforcement, we strongly disagree with its decision,” the unit said.

I wish companies would stop including all the nonsense about understanding the important job of law enforcement. Enforcing laws isn’t important. Providing justice to victims is important but that’s not what law enforcers primarily do.

What makes this kidnapping even weirder is that WhatsApp is apparently a separate operational entity from Facebook so the Brazilian government didn’t even kidnap a person who is in any way responsible for the app:

Facebook issued a distinct statement, noting that WhatsApp is operationally separate from the mothership, making the arrest of a Facebook exec “extreme and disproportionate.”

This is what it looks like when a government throws a temper tantrum. Hopefully the Brazilian government will release the poor schmuck it kidnapped. Although it wouldn’t surprise me (OK, it would surprise me a little bit) if it decided to threaten to kill him if Facebook didn’t give in to its demands. Either way, if I were Facebook I’d strongly consider moving all operations out of Brazil. Operating in that country has obviously become a liability.

When Idiots Write About Computer Security

People trying to justify the Federal Bureau of Investigation’s (FBI) demands of Apple are possibly the most amusing thing about the agency’s recent battle with Apple. Siding with the FBI requires either being completely ignorant of security or being so worshipful of the State that you believe any compromise made in the name empowering it is justified.

A friend of mine posted an article that tries to justify the FBI’s demands by claiming Apple is spreading fear, uncertainty, and disinformation (FUD). Ironically, the article is FUD. In fact it’s quite clear that the author has little to no understanding of security:

In its campaign, Apple is mustering all the fear, uncertainty and doubt it can. In an open letter to its customers, it states that “the government would have us write an entirely new operating system for their use. They are asking Apple to remove security features and add a new ability to the operating system to attack iPhone encryption, allowing a passcode to be input electronically. … It would be wrong to intentionally weaken our products with a government-ordered backdoor.” The FUD factor in that statement is “weaken our products.” It is grossly misleading, the plural suggesting that the FBI wants Apple to make this back door a standard part of iPhones. That’s flat-out false. What the government has asked is that Apple modify software to remove a feature that was not present in earlier versions of the software, and then install that new software on the single phone used by the terrorist. Apple can then destroy the software.

Apple’s statement is entirely accurate. The FBI is demanding a signed version of iOS that removes security features and includes a mechanism to brute force the password used to encrypt the contents of the device. Because the firmware would be signed it could be loaded onto other iPhones. We also know the FBI has about a dozen more phones it wants Apple to unlock so this case isn’t about a single phone. This case is about setting a precedence that will make it easier for the State to coerce companies into bypassing the security features of their own products.

The claim that Apple can destroy the software is also naive. In order to unlock the device the software must be loaded onto the phone. Since the phone is evidence it must be returned to the FBI. That means the FBI will have a signed copy of the custom firmware sitting on the phone and the phone will be unlocked so it would be feasible for the FBI to extract the firmware. Furthermore, the process involved in writing software for a court case will likely involve several third parties receiving access to the firmware:

Once the tool is ready, it must be tested and validated by a third party. In this case, it would be NIST/NIJ (which is where my own tools were validated). NIST has a mobile forensics testing and validation process by which Apple would need to provide a copy of the tool (which would have to work on all of their test devices) for NIST to verify.

[…]

During trial, the court will want to see what kind of scientific peer review the tool has had; if it is not validated by NIST or some other third party, or has no acceptance in the scientific community, the tool and any evidence gathered by it could be rejected.

[…]

If evidence from a device ever leads to a case in a court room, the defense attorney will (and should) request a copy of the tool to have independent third party verification performed, at which point the software will need to be made to work on another set of test devices. Apple will need to work with defense experts to instruct them on how to use the tool to provide predictable and consistent results.

It will likely be impossible for Apple to maintain exclusive control over the firmware.

Once the genie is out of the bottle it can’t be put back in. This is especially true with software since it can be reproduced almost infinitely for costs so small they’re practically free. If Apple produces this firmware it will not be able to make it not exist afterward. Let’s continue with the article in question:

More contradictory to Apple’s claims is that the FBI has specifically stated that it does not intend to cause a weakening of the consumer product, so this case cannot be used as a precedent. Should the government at any time attempt to do that so that back doors to be embedded in products, its own words would be the most compelling argument to counter that.

The FBI claims a lot of things. That doesn’t make those claims true. By merely existing this firmware would make consumer products less secure. Currently the iPhone’s security is quite strong as noted by the fact that the FBI has been unable to break into about a dozen phones in its possession. If Apple releases a firmware that can bypass security features on iPhones it necessarily means the overall security of iPhones, which are consumer products, is weakened. There is no way to logically argue otherwise. When something that couldn’t be broken into can be broken into it is less secure than it was. The fact that I felt the need to write the previous sentence causes me great pain because it speaks so ill of the education of the author.

The FUD continues, with Apple saying, “Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case.” That might very well be the case. But it has zero relevance. Each of those cases could be resolved only with a court order of its own, regardless of what happens with the San Bernardino iPhone. Even if this case were not in front of the court at the moment, any state, local or federal law enforcement agency could bring a similar case forward.

Actually, it’s entirely relevant. The FBI wants the court precedence so prosecutors in other cases can compel companies to bypass security features on their products. Apple isn’t simply fighting the creation of a purposely broken firmware, it’s fighting a precedence that would allow other courts to coerce companies into performing labor against their will. Obviously the author’s understanding of the legal system, specifically how precedence works, is as lacking as his understanding of security.

Gaining access to locked data is a legitimate law enforcement issue, and whatever your personal beliefs, all law enforcement officers have a responsibility to attempt to collect all information that is legally possible to collect.

While law enforcers may have a responsibility to attempt to collect all information within their power to collect that doesn’t mean they should be able to compel others to assist them at the point of a gun.

In other forums, Apple has been claiming that if the U.S. requires Apple to cooperate in providing access to the phone, all other governments around the world will then expect the same sort of cooperation. It is a bogus claim — more FUD. Do Apple’s lawyers really not know that the law of one country does not apply to another? Apple’s winning its case in the U.S. would do nothing to stop another country from initiating a similar action. Its losing its case should have no influence on whether other countries decide to pursue such matters.

I see the author doesn’t pay attention to world events. Oftentimes when a government sees another government get away with something nasty it decides it can also get away with it. Take Blackberry, for example. India demanded that Blackberry give it access to a backdoor and Blackberry complied. Seeing India getting what it wanted the government of Pakistan demanded the same. Monkey see, monkey do. It should be noted that Blackberry actually left Pakistan but it was obviously for reasons other than the backdoor demands.

Apple knows that if it rolls over it will encourage other governments to demand the same as the FBI. If, however, it digs its heels in it knows that it will discourage other governments from demanding the same. This is the same principle as not negotiating with terrorists. If you give in once it will encourage others to pull the same shit against you.

But of all of Apple’s arguments, the one that is most ludicrous, or perhaps the most damning of its much-touted security prowess, is revealed in this response to the government’s request for a key that could unlock one phone:

“Of course, Apple would do our best to protect that key, but in a world where all of our data is under constant threat, it would be relentlessly attacked by hackers and cybercriminals. As recent attacks on the IRS systems and countless other data breaches have shown, no one is immune to cyberattacks.”

First, Apple is already relentlessly attacked by hackers and criminals. I would like to hope that Apple has better security practices than the IRS. But when you unpack this statement, you are left with the impression that we should not trust any of Apple’s software or products. You have to assume that, should Apple write the software that the FBI wants, it would be among the most protected software in the company. If Apple is concerned about this software being compromised, what does that say about all of its other software?

This is another claim that can only be made by somebody who doesn’t understand security. This firmware wouldn’t be entirely in Apple’s hands. As noted above, the FBI would possess a phone with the firmware installed on it. And anybody who has paid attention to the various congressional hearings on the numerous federal network breaches knows the federal government’s network is incapable of protecting anything of value.

This firmware isn’t like a private key, which can serve its purpose even if you keep it within your exclusive control. It’s a piece of software that must be loaded onto a device that is evidence in a crime, which necessarily means it must leave your exclusive control. So Apple’s security isn’t the only cause for concern here.

Even assuming that a bad guy gets hold of just the software that law enforcement wants created, it would have to be signed by Apple’s security certificate to load on any phone.

Which the copy on the phone and any copies sent out for independent testing would be.

If the criminal gets a copy of the software and it has already been signed with the certificate, Apple could revoke the certificate.

If the author read the Electronic Frontier Foundation’s (EFF) excellent technical overview of this case he would know that the public key is built into the hardware of the iPhone. This is actually a smart security practice because it prevents malware from replacing the public key. If the public key was replaced it would allow malware to load its own code. The downside to this is that Apple can’t revoke the public key to prevent software signed with the corresponding private key from loading.

But if a bad guy gets hold of Apple’s digital certificate, then the whole Apple software base is at risk, and this feature that the FBI wants bypassed is irrelevant. After all, Apple has stated that it is not immune from attack, and it has implied it is a reasonable concern that its most protected software can be compromised.

I’m going to take this opportunity to write about a specific feature of public key cryptography that is relevant here. Public key cryptography relies on two keys: a private key and a public key. The private key, as the name implies, can be kept private. Anything signed with the private key can be verified by the public key. Because of this you only need to hand out the public key.

I have a Pretty Good Privacy (PGP) key that I use to encrypt and sign e-mails. Anybody with my public key can validate my signature but they cannot sign an e-mail as me. If, however, they had my private key they could sign e-mails as me. Because of this I keep my private key very secure. Apple likely keeps its software signing key in a vault on storage media that is only ever connected to a secure computer that has no network connectivity. Under such circumstances an attacker with access to Apple’s network would still be unable to access the company’s software signing key. For reasons I stated earlier, that’s not a model Apple can follow with the firmware the FBI is demanding. Apple’s security concerns in this case are entirely unrelated to the security practices of its private key.

In addition to his technical incompetence, the author decided to display his argumentative incompetence by closing his article with a pretty pathetic ad hominid:

But Apple, seeming to take a page from Donald Trump’s presidential campaign, is using the situation to promote its brand with free advertising.

If all else fails in your argument just compare your opponent to Trump.

Los Angeles Teaching Homeless People To Not Be Homeless By Stealing Their Homes

Governments hate the homeless. Some people find this surprising but only because they don’t understand the nature of the State. The State exists on and for plunder. Every law it creates is created to further its plundering. That being the case, people who have nothing to take are effectively worthless to the State. Because rounding them up and killing them wouldn’t go over well with the general populace local municipalities have opted for another solution to their homeless “problem.” They try to make the lives of homeless individuals so miserable that they go elsewhere and becomes another municipality’s problem.

Los Angeles may be sinking to a new low in this endevour though. Recently city officials have begun teaching the homeless a lesson about being homeless by taking their homes:

Escalating their battle to stamp out an unprecedented spread of street encampments, city officials have begun seizing tiny houses from homeless people living on freeway overpasses in South Los Angeles.

Three of the gaily painted wooden houses, which come with solar-powered lights and American flags, were confiscated earlier this month and seven more are planned for impound Thursday, a Bureau of Sanitation spokeswoman said.

As is always the case in these situations, city officials are citing their own bureaucratic nonsense. These thefts are being perpetrated under the guise of sanitation. City officials also, as it always the case, claimed to be offering a better solution without offering any other solution:

Mayor Eric Garcetti’s spokeswoman, Connie Llanos, said he is committed to getting homeless people into permanent and not makeshift housing.

“Unfortunately, these structures can be hazardous to the individuals living in them and to the community at large,” Llanos said in a statement on the mayor’s behalf.

“When the city took the houses, they didn’t offer housing, they straight kicked them out,” Summers said.

What Mr. Garcetti means by permanent housing is getting the homeless out of the city so they’re no longer his problem. Maybe the homeless population of Los Angeles should consider seizing some of the government’s buildings. They’re technically unowned (since the State, being a criminal organization that has acquired everything in its possession through theft, cannot legitimately own property) and would provide permanent housing.

Due Process Was A Pain In The Ass Anyways

I like to believe that a previous age existed where due process was value. If such an age existed it is obvious long since gone. More and more people seem willing to toss due process aside whenever it negatively impacts their ideological opposites. Throwing out due process is done in many ways. Some of those ways are as blatant as denying people rights based on where they were born. Other ways are more subtle, such as creating a new permit in order to punish an unreleased action:

As it stands, cops who suspect someone of prostitution must actually prove it before arresting them. But that’s a lot of work. So Eau Claire, Wisconsin, officials have a new plan: make non-sexual commercial companionship illegal without the proper paperwork.

To this end, the Eau Claire City Council is considering an ordinance that would require anyone advertising as an escort to get an occupational license from the government.

[…]

But because being an escort does not necessarily mean one is engaged in prostitution, police can’t just go around arresting anyone who advertises as an escort. Not yet, anyway. Ostensibly, cops must still interact with the individual and get them to agree to some sort of sexual activity for a fee. As Eau Claire Assistant City Attorney Douglas Hoffer put it, police are forced to do “intensive investigations” and get their targets to use “explicit language” in order to make charges stick.

Now city officials want to change that. Under their proposed legislation, escorts and escort businesses would have to be licensed by the city and subject to extensive regulations. Any escort operating without a license would be subject to a fine of up to $5,000.

But that’s not all: the proposed law would also punish customers who contract with unlicensed escorts. Hoffner said the idea is to end “demand” for prostitution. Anyone attempting to hire an unlicensed escort could also be charged up to $5,000, as well.

As the article notes, police cannot go after any escort business because many aren’t offering illegal services. This means the police have to effectively create a case with a sting operation or find evidence that a law was broken (but not evidence of a crime being committed since crimes require victims and voluntary prostration involves no victims). When situations like this arise it’s common for the local authorities to create some kind of permit requirement.

With permit requirements in place a police officer can arrest an escort and their customer on the grounds of the escort not having the proper paperwork. It’s a much easier violation to prove than prostitution. In fact the Eau Claire City Attorney admitted to exactly that:

Said Eau Claire City Attorney Stephen Nick: “This is another means, as opposed to actually having evidence of an act of prostitution, pandering, or offering a sexual act for money, so we can follow up” on sex-work suspects.

Cases like this should receive more publicity. It’s not enough for people to only get up in arms over overt violations of due process. People must learn about the more subtle methods as well.

Bill Gates Sides With The FBI

Microsoft has always enjoy a cozy relationship with the State. This isn’t surprising to anybody who has paid attention to Bill Gates and his ongoing love affair with the State. It’s also not surprising that he is siding with the Federal Bureau of Investigations (FBI) against Apple:

Technology companies should be forced to cooperate with law enforcement in terrorism investigations, Gates said, according to a Financial Times story posted late Monday.

“This is a specific case where the government is asking for access to information. They are not asking for some general thing, they are asking for a particular case,” he said.

This statement by Gates is laughable. The FBI is demanding Apple create a custom signed version of iOS that doesn’t include several security features and includes builtin software to brute force the decryption key set by the user. That is not a general thing for a particular case, that’s a general tool that can used on many iPhones.

What is funny about this though is that Bill Gates tried to backpedal but in so doing only said exactly the same thing over again:

In an interview with Bloomberg, Bill Gates says he was “disappointed” by reports that he supported the FBI in its legal battle with Apple, saying “that doesn’t state my view on this.”

Still, Gates took a more moderate stance than some of his counterparts in the tech industry, not fully backing either the FBI or Apple but calling for a broader “discussion” on the issues. “I do believe that with the right safeguards, there are cases where the government, on our behalf — like stopping terrorism, which could get worse in the future — that that is valuable.” But he called for “striking [a] balance” between safeguards against government power and security.

Any “balance” would require Apple to create firmware that includes a backdoor for government use. In other words, it would require exactly what the FBI is demanding of Apple.

Cryptography is math and math belongs to that very small category of things that are either black or white. Either the cryptography you’re using is effective and only allows authorized parties to access the unencrypted content or it is ineffective. There is no middle ground. You cannot break cryptography just a little bit.

Although the existence of a version of iOS with a backdoor is frightening in of itself, the idea that a single judge can enslave software developers by issuing a writ is terrifying. That’s an aspect of this case that is getting glossed over a lot. Apple has already publicly stated it has no desire to write a weakened version of iOS. If the court sides with the FBI it will try to force Apple to write software against its will. Why should any individual have the power to legally do that?

The Party Of Fascism

I believe that getting into bed with social conservatives was one of the worst things to happen to libertarianism. Now that election season is upon us I’m reminded of this every day. Self-proclaimed libertarians are openly declaring their support for Republican frontrunners that continue to remind us that their interests aligned with fascism, not libertarianism.

The recent kerfuffle between Apple and the Federal Bureau of Investigations (FBI) is yet another demonstration of this. Using the All Writs Act, a federal court is trying to make literal slaves out of Apple’s iOS developers. Anybody who subscribed to even very basic libertarian principles would oppose this order. But a fascist, whose loyalty is to the State above all else, would support. So where does Donald Trump stand?

GOP presidential front-runner Donald Trump is insisting that Apple unlock the iPhone of one of the shooters in the San Bernardino, Calif., terrorist attack.

[…]

Trump disagreed stridently on Wednesday, calling it a matter of “common sense.”

“I agree 100 percent with the courts,” the business mogul said. “In that case, we should open it up. I think security over all — we have to open it up, and we have to use our heads. We have to use common sense.”

Donald believes Apple’s software developers are property of the State and should be compelled to write software. Let’s look at the current favorite amongst so-called libertarians, Ted Cruz (and we’ll throw in his buddy Carson as an added bonus):

Cruz said, “Apple has a serious argument” in protecting users’ privacy but said resisting the FBI’s request for help amounted to defying a search warrant. Carson said that Apple should find a way to get over mistrust of the government, but then added that might have to wait until President Obama leaves office, allowing for a delay that the FBI would probably oppose.

As if defying a terrible court order is a bad thing. My “libertarian” friends that support Cruz keep telling me he’s for small government and individual liberty but I can’t fathom how a man who thinks a court has a right to enslave software developers is for small government. Carson also demonstrates his love of government by criticizing Apple for being mistrustful of it.

Finally, just for fun, I’m going to throw in Tom “I Hate Due Process” Cotton for giggles:

“As a society, we don’t allow phone companies to design their systems to avoid lawful, court-ordered searches,” Cotton said in the statement. “If we apply a different legal standard to companies like Apple, Google, and Facebook, we can expect them to become the preferred messaging services of child pornographers, drug traffickers, and terrorists alike — which neither these companies nor law enforcement want.”

Whereas the other Republicans at least tried to sound kind of reasonable, Cotton went straight for the “messaging service of child pornographers, drug traffickers, and terrorists” line.

The Republican Party really is the party of fascism (as opposed to their close rival, the Democratic Party, which prefers its socialism be international). Not only are the policies put forth by Republican lawmakers generally fascist in nature but its members can’t help themselves when an opportunity to go on television and public declare their fascist policies presents itself. How this is supposed to be the party libertarians can prevail with is beyond me.

Doublethink

In George Orwell’s Nineteen Eighty-Four doublethink is described as, “The power of holding two contradictory beliefs in one’s mind simultaneously, and accepting both of them… To tell deliberate lies while genuinely believing in them, to forget any fact that has become inconvenient, and then, when it becomes necessary again, to draw it back from oblivion for just as long as it is needed, to deny the existence of objective reality and all the while to take account of the reality which one denies – all this is indispensably necessary.” That is the most accurate term to describe the White House’s claim that what the Federal Bureau of Investigations (FBI) is demanding of Apple isn’t a back door:

The White House says a court ruling asking Apple to help the FBI access data on a phone belonging to the San Bernardino gunman does not mean asking for a “back door” to the device.

By definition a backdoor, as it pertains to security, is a purposely placed mechanism that allows an unauthorized party to bypass security measures. What the FBI is asking Apple to develop is a special version of iOS that attempts to brute force the device’s password and doesn’t contain the increasing timed lockout functionality when entering incorrect passwords or the functionality that erases the phone after 10 incorrect passwords have been entered. The FBI is asking for a backdoor.

Just because the FBI is demanding this special firmware for a specific iPhone doesn’t mean the firmware isn’t a backdoor. But through the magic of doublethink the White House is able to claim what the FBI is demanding isn’t a backdoor.

Legally Speaking, You’re The Property Of The State

The All Writs Act is a piece of legislation that made it clear in vague but certain terms that everybody in the United States is the property of the State:

Basically, it’s “a very short, cryptic statute” that gives the courts “all sorts of incidental powers” to require things not specifically covered by other laws, according to Stephen Vladeck, a law professor at American University.

In the past, the act has been used to compel non-parties — like service providers of tech companies — to help in criminal investigations, Vladeck said. But that help has typically been limited to straightforward requests, like activating or turning off particular features and using systems that are already in place, he said.

The new order is different: It tells Apple to help the government by creating an entirely new software to help investigators bypasses security features. “That requires Apple to go much further than any company has ever been required to go in one of these cases,” said Vladeck.

Although the statue is short and rather vague its intention is quite clear: to give the State the legal authority to compel people into performing actions. It’s currently being cited to compel Apple to create a custom backdoor for the Federal Bureau of Investigations (FBI). But this isn’t he first time this archaic law has been used to force technology companies to perform the State’s will.

Can a court compel a person to act? If so that effectively makes everybody the slave of any judge with an order. It’s clear that the State believes a judge has such authority because it allows them to hold disobedient individuals in a cage for being in contempt of court. Therefore it must be said that the All Writs Act creates a form of legalized slavery.

TANSTAAFL

Free K-12 schooling! Free college! Free healthcare! The State sure is magnanimous!

Unfortunately, to the chagrin of utopians, there ain’t no such thing as a free lunch:

WILLOW RIVER — Scott Killerud was about to throw away a mailing about the 2016 enrollment period for MNsure last November when something caught his eye.

“Just as I was going to drop it in the trash, I was like — wait a second. What did I just read?” the Pine County farmer said.

What caught his eye was a notification that if you’re 55 or older and on Medical Assistance — Minnesota’s version of Medicaid — the state places an estate claim with which to recover its costs after you and your spouse have died.

Killerud was younger than 55, but his wife, Ellen, had reached that age the previous September. The couple, who supplement their farm income with part-time jobs, were told when they signed up for insurance through MNsure in 2014 that their income level qualified them for Medical Assistance.

But they didn’t know about the estate claim until Scott saw that mailing.

The State is in the business of stealing wealth, not handing it out. Whenever it claims to be giving something out for free you can be assured it’s part of a scam that is actually granting it further power to plunder the people.

Health insurance is the peak of the latest pyramid scheme. Acknowledging the fact that income taxes offer little in the way of plunder from people with little income, the State has created a program that allows it to take assets instead. This is especially important because it’s not unusual for retired individuals to have little in the way of income but a sizable sum in assets. By getting these individuals to sign up with MNsure, the State of Minnesota can give itself access to wealth that was previously outside of its grasps.

There is a lengthy list of things you should always be wary off. At the top of that list should people offering free stuff.