Life in the Electronic Concentration Camp: The Surveillance State Is Alive and Well

Guest Post by John W. Whitehead

“Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order […] and the like.”William O. Douglas, Supreme Court Justice

Bottle up the champagne, pack away the noisemakers, and toss out the party hats.

There is no cause for celebration.

We have secured no major victories against tyranny.

We have achieved no great feat in pushing back against government overreach.

For all intents and purposes, the National Security Agency has supposedly ceased its bulk collection of metadata from Americans’ phone calls, but read the fine print: nothing is going to change.

The USA Freedom Act, which claimed to put an end to the National Security Agency’s controversial collection of metadata from Americans’ phone calls, was just a placebo pill intended to make us feel better and let the politicians take credit for reforming mass surveillance.

In other words, it was a sham, a sleight-of-hand political gag pulled on a gullible public desperate to believe that we still live in a constitutional republic rather than a down-and-out, out-of-control, corporate-controlled, economically impoverished, corrupt, warring, militarized banana republic.

You cannot restrain the NSA. The beast has outgrown its chains.

You cannot reform the NSA. A government that lies, cheats, steals, sidesteps the law, and then absolves itself of wrongdoing does not voluntarily alter its behavior.

You cannot put an end to the NSA’s “technotyranny.” Presidents, politicians, and court rulings have come and gone over the course of the NSA’s 60-year history, but none of them have managed to shut down the government’s secret surveillance of Americans’ phone calls, emails, text messages, transactions, communications and activities.

Indeed, the government has become an expert in finding ways to sidestep niggling, inconvenient laws aimed at ensuring accountability, bringing about government transparency and protecting citizen privacy.

It has mastered the art of stealth maneuvers and end-runs around the Constitution.

It knows all too well how to hide its nefarious, covert, clandestine activities behind the classified language of national security and terrorism. And when that doesn’t suffice, it obfuscates, complicates, stymies or just plain bamboozles the public into remaining in the dark.

Case in point: the so-called end of the NSA’s metadata collection of Americans’ phone calls.

This, of course, is no end at all.

On any given day, the average American going about his daily business will still be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears.

More than a year before politicians attempted to patch up our mortally wounded privacy rights with the legislative bandaid fix that is the USA Freedom Act, researchers at Harvard and Boston University documented secret loopholes that allow the government to bypass Fourth Amendment protections to conduct massive domestic surveillance on U.S. citizens.

It’s extraordinary rendition all over again, only this time it’s surveillance instead of torture being outsourced.

In much the same way that the government moved its torture programs overseas in order to bypass legal prohibitions against doing so on American soil, it is doing the same thing for its surveillance programs. By shifting its data storage, collection and surveillance activities outside of the country, the government is able to bypass constitutional protections against unwarranted searches of Americans’ emails, documents, social networking data, and other cloud-stored data.

Heck, the government doesn’t even need to move all of its programs overseas. It just has to push the data over the border in order to “[circumvent] constitutional and statutory safeguards seeking to protect the privacy of Americans.”

Credit for this particular brainchild goes to the Obama administration, which issued Executive Order 12333 authorizing the collection of Americans’ data from surveillance conducted on foreign soil.

Using this rationale, the government was able to justify hacking into and collecting an estimated 180 million user records from Google and Yahoo data centers every month because the data travels over international fiber-optic cables. The NSA program, dubbed MUSCULAR, is carried out in concert with British intelligence.

No wonder the NSA appeared so unfazed about being forced to shut down its much-publicized metadata program. It had already figured out a way to accomplish the same results (illegally spying on Americans’ communications) without being shackled by the legislative or judicial branches of the government.

Mind you, this metadata collection now being carried out overseas is just a small piece of the surveillance pie. The government and its corporate partners have a veritable arsenal of surveillance programs that will continue to operate largely in secret, carrying out warrantless mass surveillance on hundreds of millions of Americans’ phone calls, emails, text messages and the like, beyond the scrutiny of most of Congress and the taxpayers who are forced to fund its multi-billion dollar secret black ops budget.

The surveillance state is alive and well and kicking privacy to shreds in America.

Whether you’re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, will still be listening in and tracking your behavior. This doesn’t even begin to touch on the corporate trackers that monitor your purchases, web browsing, Facebook posts and other activities taking place in the cyber sphere.

We are now in a state of transition with the police state shifting into high-gear under the auspices of the surveillance state.

Having already transformed local police into extensions of the military, the Department of Homeland Security, the Justice Department and the FBI are preparing to turn the nation’s police officers into techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial recognition programs, license plate readers, cell phone Stingray devices and so much more.

Add in the fusion centers, city-wide surveillance networks, data clouds conveniently hosted overseas by Amazon and Microsoft, drones equipped with thermal imaging cameras, and biometric databases, and you’ve got the makings of a world in which “privacy” is reserved exclusively for government agencies.

Thus, telephone surveillance by the NSA is the least of our worries.

Even with restrictions on its ability to collect mass quantities of telephone metadata, the government and its various spy agencies, from the NSA to the FBI, can still employ an endless number of methods for carrying out warrantless surveillance on Americans, all of which are far more invasive than the bulk collection program.

As I point out in my new book Battlefield America: The War on the American People, just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people.

Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies—the police, public health officials, transportation, etc.—and make it accessible for all those in power.

And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine. Indeed, Facebook, Amazon and Google are among the government’s closest competitors when it comes to carrying out surveillance on Americans, monitoring the content of your emails, tracking your purchases and exploiting your social media posts.

“Few consumers understand what data are being shared, with whom, or how the information is being used,” reports the Los Angeles Times. “Most Americans emit a stream of personal digital exhaust — what they search for, what they buy, who they communicate with, where they are — that is captured and exploited in a largely unregulated fashion.”

It’s not just what we say, where we go and what we buy that is being tracked.

We’re being surveilled right down to our genes, thanks to a potent combination of hardware, software and data collection that scans our biometrics—our faces, irises, voices, genetics, even our gait—runs them through computer programs that can break the data down into unique “identifiers,” and then offers them up to the government and its corporate allies for their respective uses.

All of those internet-connected gadgets we just have to have (Forbes refers to them as “(data) pipelines to our intimate bodily processes”)—the smart watches that can monitor our blood pressure and the smart phones that let us pay for purchases with our fingerprints and iris scans—are setting us up for a brave new world where there is nowhere to run and nowhere to hide.

For instance, imagine what the NSA could do (and is likely already doing) with voiceprint technology, which has been likened to a fingerprint. Described as “the next frontline in the battle against overweening public surveillance,” the collection of voiceprints is a booming industry for governments and businesses alike. As The Guardian reports, “voice biometrics could be used to pinpoint the location of individuals. There is already discussion about placing voice sensors in public spaces, and [Lee Tien, senior staff attorney with the Electronic Frontier Foundation] said that multiple sensors could be triangulated to identify individuals and specify their location within very small areas.”

Suddenly the NSA’s telephone metadata program seems like child’s play compared to what’s coming down the pike.

That, of course, is the point.

The NSA is merely one small part of a shadowy permanent government comprised of unelected bureaucrats who march in lockstep with profit-driven corporations that actually runs Washington, DC, and works to keep us under surveillance and, thus, under control. For example, Google openly works with the NSA, Amazon has built a massive $600 million intelligence database for CIA, and the telecommunications industry is making a fat profit by spying on us for the government.

In other words, Corporate America is making a hefty profit by aiding and abetting the government in its domestic surveillance efforts.

At every turn, we have been handicapped in our quest for transparency, accountability and a representative democracy by an establishment culture of secrecy: secret agencies, secret experiments, secret military bases, secret surveillance, secret budgets, and secret court rulings, all of which exist beyond our reach, operate outside our knowledge, and do not answer to “we the people.”

Now there are still those who insist that they have nothing to hide from the surveillance state and nothing to fear from the police state because they have done nothing wrong.

To those sanctimonious few, secure in their delusions, let this be a warning: the danger posed by the American police state applies equally to all of us—lawbreaker and law abider alike, black and white, rich and poor, liberal and conservative, blue collar and white collar, and any other distinction you’d care to trot out.

In an age of too many laws, too many prisons, too many government spies, and too many corporations eager to make a fast buck at the expense of the American taxpayer, there is no safe place and no watertight alibi. We are all guilty of some transgression or other, and eventually, we will all be made to suffer the same consequences in the electronic concentration camp that surrounds us.

Subscribe
Notify of
guest
8 Comments
starfcker
starfcker
December 1, 2015 8:48 am

John, maybe you should try a decaffeinated coffee. The phone company has always had your records, it’s called billing. Paranoia is no way to go through life. Smart phones are the greatest invention in a long , long time. I haven’t had a computer on my desk in years. Yet I am in touch with everything required of me, at whatever pace I choose. It’s stunningly efficient, a galaxy s3 that cost 600 bucks, 2 or 3 years ago can now be replaced by a galaxy prime core, which is faster, for 50 bucks. No need to insure them at that price. Brilliant tools for business

starfcker
starfcker
December 1, 2015 9:14 am

My right hand guy has that. I think it’s called pandora. It is creepy as hell

starfcker
starfcker
December 1, 2015 9:20 am

I’m not a big app guy. But I have 2, and they’re awesome. Skype let’s me video chat with friends overseas for free. Not bad. And I have a little weather thing called radar now that gives me live doppler radar. It’s amazing

I. C.
I. C.
December 1, 2015 11:15 am

The NSA theme-song, “Every Breath You Take”

Every breath you take
And every move you make
Every bond you break
Every step you take
I’ll be watching you

Every single day
And every word you say
Every game you play
Every night you stay
I’ll be watching you

Oh, can’t you see
You belong to me
Now my poor heart aches
With every step you take

Every move you make
Every vow you break
Every smile you fake
Every claim you stake
I’ll be watching you

Since you’ve gone, I’ve been lost without a trace
I dream at night, I can only see your face
I look around but it’s you, I can’t replace
I feel so cold and I long for your embrace
I keep crying baby, baby please

Oh, can’t you see
You belong to me
Now my poor heart aches
Every step you take

Every move you make
Every vow you break
Every smile you fake
Every claim you stake
I’ll be watching you

Every move you make

Every step you take
I’ll be watching you
I’ll be watching you

Every breath you take
Every move you make
Every bond you break
Every step you take
(I’ll be watching you)

Every single day
Every word you say
Every game you play
Every night you stay
(I’ll be watching you)

Every move you make
Every vow you break
Every smile you fake
Every claim you stake
(I’ll be watching you)

Every single day
Every word you say
Every game you play
Every night you stay
(I’ll be watching you)

Every breath you take
Every move you make
Every bond you break
Every step you take
(I’ll be watching you)

Every single day
Every word you say
Every game you play
Every night
(I’ll be watching you)

suzanna
suzanna
December 1, 2015 12:06 pm

Admin.,

Your wife tested an iPhone app and her phone “heard” the music
and the phone then gave data on the music? OMG

I have read that the iPhone can “listen” to what is being said,
even when turned off. Great.

I am aware the smart phones are very clever and that one
can have a fabulous multi-purpose computer in the palm
of one’s hand. I suspect people love them and are “addicted”
to using them/or, can’t live without them. A phone, a camera,
the internet, even a flashlight…wow, how do I resist?

AnthonyH
AnthonyH
December 1, 2015 2:47 pm

THE INVASION OF RIGHTS BY THE NSA IS REALLY NOTHING compared to what the DHS does.
And the problem, from our perspective, is, ‘How do we protect ourselves from their murderous political system?’ How, for example, do we protect our property (from physical gold, to businesses, to stocks and bonds (domestic and foreign)) from seizure by the Department of Homeland Security (DHS)? Furthermore, how do we protect ourselves from informers now being recruited, trained and protected by the DHS?
By the act of Congress that established the DHS (http://redressone.wordpress.com/amss/) a system was created by which informers could make false allegations against anyone they please with near-total impunity. Of course, such informers aren’t described as informers; rather they are given the title “submitting person” and the DHS Act provided that their falsehoods will never be examined by any court or legislature or law enforcement agency. The legislation even specifies how this immunity is obtained. The “submitting person” only has to give an “express statement” that his lies were “voluntarily given” and that he expected “protection from disclosure”. It’s all there, in the act that created the DHS.
I’m sorry guys, but silly season is over. Even if you own physical gold, live in a cabin in the woods along with a stash of ammo and AK-47’s, you lose. If you don’t fall to the horde of hungry homeless, you will fall to DHS death squads. All the homeless have to do is to wait until you collapse from lack of sleep (24, 48, 72 hours), then they march in, slit your throat and… let your imagination run wild.
If you own stocks or bonds, guess what: you’re depending on criminal and useless classes to deliver your purchasing power at the moment of their greatest victory. Did I mention something about ‘silly season’?
If you want to survive, you have to combine with others of like mind for the purpose of mutual protection, among other purposes. The big question now is, ‘HOW is this to be done?’ And the quick answer is, ‘You must establish First-Amendment assemblies – the only historically-proven method by which men have made their lives and property secure from rule by thieves.’ (http://redressone.wordpress.com/locate/)
The American Revolution, for example, was powered by a large network of such assemblies: from town meetings, county meetings, state conventions and, ultimately, to Continental Congresses.
Let’s be realistic: this solution won’t be easy or quick… unprecedented adventures never are.

Westcoaster
Westcoaster
December 1, 2015 5:06 pm

If you’re ever caught in the “Stingray” trap, compel whatever LEO did the snooping to show their FCC license to operate the device. A license is required whenever transmitting anything on the airwaves with an effective radiated power greater than 100 milliwatts.
If they can’t demonstrate they used the device with a valid license, then they broke the law in spoofing your cellphone to connect to their device, and the doctrine of “clean hands” prevails.
Some of you with JD’s should be able to confirm this.