Title : Phrack World News
Author : Phrack Staff
==Phrack Inc.==
Volume 0x0b, Issue 0x3d, Phile #0x0f of 0x0f
|=--------------=[ P H R A C K W O R L D N E W S ]=------------------=|
|=-----------------------------------------------------------------------=|
|=------------------=[ Phrack Combat Journalistz ]=----------------------=|
Content
1 - Quickies
2 - Hacker Generations by Richard Thieme
3 - Citizen Questions on Citizenship by Bootleg
4 - The Molting Wings of Liberty by Beaux75
|=-----------------------------------------------------------------------=|
|=-=[ Quick News ]=------------------------------------------------------=|
|=-----------------------------------------------------------------------=|
Microsoft got hit by SQL slammer worm:
[1] http://www.cnn.com/2003/TECH/biztech/01/28/microsoft.worm.ap/index.html
[2] http://www.thewmurchannel.com/technology/1940013/detail.html
They say they cought 'Fluffi Bunny':
[1] http://www.salon.com/tech/wire/2003/04/29/fluffi_bunni/index.html
[2] http://www.nandotimes.com/technology/story/872265p-6086707c.html
How Geroge W. Bush Won the 2004 Presidential Election. This article
outlines the danger of electronic voting systems. It explains why voting
systems are vulnerable to fraudulent manipulation by the companies
manufactoring and supervising the systems.
[1] http://belgium.indymedia.org/news/2003/07/70542.php
FBI Says Iraw Situation May Spur 'Patriotic Hackers'
[1] http://www.washingtonpost.com/wp-dyn/articles/A64049-2003Feb12.html
Over 5 million Visa/MasterCard accounts hacked into. This happens all the
day long but once in a while is one journalist making a media hype out of
it and everyone starts to go crazy about it. Wehehehhehee.
[1] http://www.forbes.com/markets/newswire/2003/02/17/rtr881826.html
The Shmoo group build a robot that drives around to find WiFi AccessPoints.
Wonder how long it will take until the first hacker mounts a WiFi + Antenna
under a low-flying zeppelin / model aircraft...
[1] http://news.com.com/2100-1039_3-5059541.html
Linux achieved the Common Criteria security certification and is now
allowed to be used by the federal government and other organizations.
[1] http://www.fcw.com/fcw/articles/2003/0804/web-linx-08-06-03.asp
$55 million electronic voting machines can be hacked into by a
15-year-old newbie. Guess who will win the 2004' election?
[1] http://www.washingtonpost.com/wp-dyn/articles/A25673-2003Aug6.html
UK Intelligence and Security Report Aug 2003. I like the quote: "Britain
has a complicated and rather bureaucratic political control over its int
elligence and security community and one that tends to apply itself to
long-term targets and strategic intelligence programs, but has little real
influence on the behaviour and operations of SIS or MI5."
[1] http://cryptome.org/uk-intel.doc
Man jailed for linking to bomb-side. Judge, psst, *hint*: Try
http://www.google.com -> homemade bombs -> I feel lucky. Eh? Going to jail
google now? Eh?
[1] http://www.cnn.com/2003/TECH/internet/08/05/anarchist.prison.ap/index.html
The military is thinking of planting propaganda and misleading stories in
the international media [1]. A new department has been set up inside the
Pentagon with the Orwellian title of the Office of Strategic Influence.
The government had to rename the new department when its name leaked ([2]).
[1] http://news.bbc.co.uk/1/hi/world/americas/1830500.stm
[2] http://www.fas.org/sgp/news/secrecy/2002/11/112702.html
[3] http://www.fas.org/sgp/news/2002/11/dod111802.html
|=-----------------------------------------------------------------------=|
|=-=[ Hacker Generations ]=----------------------------------------------=|
|=-----------------------------------------------------------------------=|
Hacker Generations
by
Richard Thieme <rthieme at thiemeworks.com>
Richard Thieme speaks writes and consults about life on the edge,
creativity and innovation, and the human dimensions of technology. His
exploraitions of hacking, security, and many other things can be found at
http://www.thiemeworks.com). A frequent speaker at security conferences, he
keynoted the Black Hat Briefings - Europe in Amsterdam this year, the
security track of Tech Ed sponsored by Microsoft Israel in Eilat, and
returns to keynote Hiver Con in Dublin for a second time in November. In
addition to numerous security cons (Def Con 4,5,6,7,8,9,10,11and Black Hat
1,2,3,4,5,6,7, Rubicon 2,3,4,5), he has spoken for the FBI, Infragard, the
FS-ISAC, Los Alamos National Laboratory, and the US Department of the
Treasury. Clients include Microsoft Israel, GE Medical Systems, and Network
Flight Recorder.
First, the meaning of hacker
============================
The word originally meant an inventive type, someone creative and
unconventional, usually involved in a technical feat of legerdemain, a
person who saw doors where others saw walls or built bridges that others
thought were planks on which to walk into shark-filled seas. Hackers were
alive with the spirit of Loki or Coyote or the Trickster, moving with
stealth across boundaries, often spurning conventional ways of thinking and
behaving. Hackers see deeply into the arbitrariness of structures, how form
and content are assembled in subjective and often random ways and therefore
how they can be defeated or subverted. They see atoms where others see a
seeming solid, and they know that atoms are approximations of energies,
abstractions, mathematical constructions. At the top level, they see the
skull behind the grin, the unspoken or unacknowledged but shared
assumptions of a fallible humanity. Thats why, as in Zen monasteries, where
mountains are mountains and then they are not mountains and then they are
mountains again, hacker lofts are filled with bursts of loud spontaneous
laughter.
Then the playful creative things they did in the protected space of
their mainframe heaven, a playfulness fueled by the passion to know, to
solve puzzles, outwit adversaries, never be bested or excluded by arbitrary
fences, never be rendered powerless, those actions began to be designated
acts of criminal intent.. That happened when the space inside the
mainframes was extended through distributed networks and ported to the rest
of the world where things are assumed to be what they seem. A psychic space
designed to be open, more or less, for trusted communities to inhabit,
became a general platform of communication and commerce and security became
a concern and an add-on. Legal distinctions which seemed to have been
obliterated by new technologies and a romantic fanciful view of cyberspace
a la Perry Barlow were reformulated for the new not-so-much cyberspace as
cyborgspace where everyone was coming to live. Technologies are first
astonishing, then grafted onto prior technologies, then integrated so
deeply they are constitutive of new ways of seeing and acting, which is
when they become invisible.
A small group, a subset of real hackers, mobile crews who merely
entered and looked around or pilfered unsecured information, became the
definition the media and then everybody else used for the word "hacker. "A
hacker became a criminal, usually defined as a burglar or vandal, and the
marks of hacking were the same as breaking and entering, spray painting
graffiti on web site walls rather than brick, stealing passwords or credit
card numbers.
At first real hackers tried to take back the word but once a word is
lost, the war is lost. Hackernow means for most people a garden variety of
online miscreant and words suggested as substitutes like technophile just
don't have the same juice.
So let's use the word hacker here to mean what we know we mean because
no one has invented a better word. We dont mean script kiddies, vandals, or
petty thieves. We mean men and women who do original creative work and play
at the tip of the bell curve, not in the hump, we mean the best and
brightest who cobble together new images of possibility and announce them
to the world. Original thinkers. Meme makers. Artists of pixels and empty
spaces.
Second, the meaning of hacker generations
=========================================
In a speech at the end of his two terms as president, Dwight Eisenhower
coined the phrase "military-industrial complex" to warn of the consequences
of a growing seamless collusion between the state and the private sector.
He warned of a changing approach to scientific research which in effect
meant that military and government contracts were let to universities and
corporations, redefining not only the direction of research but what was
thinkable or respectable in the scientific world. At the same time, a
"closed world" as Paul N. Edwards phrased it in his book of the same name,
was evolving, an enclosed psychic landscape formed by our increasingly
symbiotic interaction with the symbol-manipulating and identity-altering
space of distributed computing, a space that emerged after World War II and
came to dominate military and then societal thinking.
Eisenhower and Edwards were in a way describing the same event, the
emergence of a massive state-centric collaboration that redefined our
psychic landscape. After half a century Eisenhower is more obviously
speaking of the military-industrial-educational-entertainment-and-media
establishment that is the water in which we swim, a tangled inescapable
mesh of collusion and self-interest that defines our global economic and
political landscape.
The movie calls it The Matrix. The Matrix issues from the fusion of
cyborg space and the economic and political engines that drive it, a
simulated world in which the management of perception is the cornerstone of
war-and-peace (in the Matrix, war is peace and peace is war, as Orwell
foretold). The battlespace is as perhaps it always has been the mind of
society but the digital world has raised the game to a higher level. The
game is multidimensional, multi-valent, played in string space. The
manipulation of symbols through electronic means, a process which began
with speech and writing and was then engineered through tools of literacy
and printing is the currency of the closed world of our CyborgSpace and the
military-industrial engines that power it.
This Matrix then was created through the forties, fifties, sixties, and
seventies, often invisible to the hackers who lived in and breathed it. The
hackers noticed by the panoptic eye of the media and elevated to niche
celebrity status were and always have been creatures of the Matrix. The
generations before them were military, government, corporate and think-tank
people who built the machinery and its webbed spaces.
So I mean by the First Generation of Hackers, this much later
generation of hackers that emerged in the eighties and nineties when the
internet became an event and they were designated the First Hacker
Generation, the ones who invented Def Con and all its spin-offs, who
identified with garage-level hacking instead of the work of prior
generations that made it possible.
Marshall McLuhan saw clearly the nature and consequences of electronic
media but it was not television, his favorite example, so much as the
internet that provided illustrations for his text. Only when the Internet
had evolved in the military-industrial complex and moved through
incarnations like Arpanet and Milnet into the public spaces of our society
did people began to understand what he was saying.
Young people who became conscious as the Internet became public
discovered a Big Toy of extraordinary proportions. The growing availability
of cheap ubiquitous home computers became their platform and when they were
plugged into one another, the machines and their cyborg riders fused. They
co-created the dot com boom and the public net, and made necessary the
security spaceperceived as essential today to a functional society. All day
and all night like Bedouin they roamed the network where they would, hidden
by sand dunes that changed shape and size overnight in the desert winds.
That generation of hackers inhabited Def Con in the "good old days," the
early nineties, and the other cons. They shaped the perception as well as
the reality of the public Internet as their many antecedents at MIT, NSA,
DOD and all the other three-letter agencies co-created the Matrix.
So I mean by the First Generation of Hackers that extended or
distributed network of passionate obsessive and daring young coders who
gave as much as they got, invented new ways of sending text, images, sounds,
and looked for wormholes that let them cross through the non-space of the
network and bypass conventional routes. They constituted an online
meritocracy in which they bootstrapped themselves into surrogate families
and learned together by trial and error, becoming a model of self-directed
corporate networked learning. They created a large-scale interactive system,
self-regulating and self-organizing, flexible, adaptive, and unpredictable,
the very essence of a cybernetic system.
Then the Second Generation came along. They had not co-created the
network so much as found it around them as they became conscious. Just a
few years younger, they inherited the network created by their elders. The
network was assumed and socialized them to how they should think and act.
Video games were there when they learned how to play. Web sites instead of
bulletin boards with everything they needed to know were everywhere. The
way a prior generation was surrounded by books or television and became
readers and somnambulistic watchers , the Second Generation was immersed in
the network and became surfers. But unlike the First Generation which knew
their own edges more keenly, the net made them cyborgs without anyone
noticing. They were assimilated. They were the first children of the Matrix.
In a reversal of the way children learned from parents, the Second
Generation taught their parents to come online which they did but with a
different agenda. Their elders came to the net as a platform for business,
a means of making profits, creating economies of scale, and expanding into
a global market. Both inhabited a simulated world characterized by porous
or disappearing boundaries and if they still spoke of a digital frontier,
evoking the romantic myths of the EFF and the like, that frontier was much
more myth than fact, as much a creation of the dream weavers at CFP as the
old west was a creation of paintings, dime novels and movies.
They were not only fish in the water of the Matrix, however, they were
goldfish in a bowl. That environment to which I have alluded, the
military-industrial complex in which the internet evolved in the first
place, had long since built concentric circles of observation or
surveillance that enclosed them around. Anonymizers promising anonymity
were created by the ones who wanted to know their names. Hacker handles and
multiple nyms hid not only hackers but those who tracked them. The extent
of this panoptic world was hidden by denial and design. Most on it and in
it didn't know it. Most believed the symbols they manipulated as if they
were the things they represented, as if their tracks really vanished when
they erased traces in logs or blurred the means of documentation. They
thought they were watchers but in fact were also watched. The Eye that
figures so prominently in Blade Runner was always open, a panoptic eye.
The system could not be self-regulating if it were not aware of itself,
after all. The net is not a dumb machine, it is sentient and aware because
it is fused bone-on-steel with its cyborg riders and their sensory and
cognitive extensions.
Cognitive dissonance grew as the Second Generation spawned the Third.
The ambiguities of living in simulated worlds, the morphing of multiple
personas or identities, meant that no one was ever sure who was who.
Dissolving boundaries around individuals and organizational structures
alike ("The internet? C'est moi!") meant that identity based on loyalty,
glue born of belonging to a larger community and the basis of mutual trust,
could not be presumed.
It's all about knowing where the nexus is, what transpires there at the
connections. The inner circles may be impossible to penetrate but in order
to recruit people into them, there must be a conversation and that
conversation is the nexus, the distorted space into which one is
unknowingly invited and often subsequently disappears. Colleges,
universities, businesses, associations are discovered to be Potemkin
villages behind which the real whispered dialogue takes place. The closed
and so-called open worlds interpenetrate one another to such a degree that
the nexus is difficult to discern. History ends and numerous histories take
their place, each formed of an arbitrary association and integration of
data classified or secret at multiple levels and turned into truths,
half-truths, and outright lies.
Diffie-Hellman's public key cryptography, for example, was a triumph of
ingenious thinking, putting together bits of data, figuring it out, all
outside the system, but Whit Diffie was abashed when he learned that years
earlier (1969) James Ellis inside the closed worldof British intelligence
had already been there and done that. The public world of hackers often
reinvents what has been discovered years earlier inside the closed world of
compartmentalized research behind walls they can not so easily penetrate.
(People really can keep secrets and do.) PGP was well, do you really think
that PGP was news to the closed world?
In other words, the Second Generation of Hackers, socialized to a
networked world, also began to discover another world or many other worlds
that included and transcended what was publicly known. There have always
been secrets but there have not always been huge whole secret WORLDS whose
citizens live with a different history entirely but thats what we have
built since the Second World War. Thats the metaphor at the heart of the
Matrix and that's why it resonates with the Third Generation. A surprising
discovery for the Second Generation as it matured is the basis for
high-level hacking for the Third.
The Third Generation of Hackers knows it was socialized to a world
co-created by its legendary brethren as well as numerous nameless men and
women. They know that we inhabit multiple thought-worlds with different
histories, histories dependent on which particular bits of data can be
bought on the black market for truth and integrated into Bigger Pictures.
The Third Generation knows there is NO one Big Picture, there are only
bigger or smaller pictures depending on the pieces one assembles.
Assembling those pieces, finding them, connecting them, then standing back
to see what they say - that is the essence of Third Generation hacking.
That is the task demanded by the Matrix which is otherwise our prison,
where inmates and guards are indistinguishable from each other because we
are so proud of what we have built that we refuse to let one another escape.
That challenge demands that real Third Generation hackers be expert at
every level of the fractal that connects all the levels of the network. It
includes the most granular examination of how electrons are turned into
bits and bytes, how percepts as well as concepts are framed and transported
in network-centric warfare/peacefare, how all the layers link to one
another, which distinctions between them matter and which dont. How the
seemingly topmost application layer is not the end but the beginning of the
real challenge, where the significance and symbolic meaning of the
manufactured images and ideas that constitute the cyborg network create a
trans-planetary hive mind. That's where the game is played today by the
masters of the unseen, where those ideas and images become the means of
moving the herd, percept turned into concept, people thinking they actually
think when what has in fact already been thought for them has moved on all
those layers into their unconscious constructions of reality.
Hacking means knowing how to find data in the Black Market for truth,
knowing what to do with it once it is found, knowing how to cobble things
together to build a Big Picture. The puzzle to be solved is reality itself,
the nature of the Matrix, how it all relates. So unless youre hacking the
Mind of God, unless you're hacking the mind of society itself, you arent
really hacking at all. Rather than designing arteries through which the oil
or blood of a cyborg society flows, you are the dye in those arteries, all
unknowing that you function like a marker or a bug or a beeper or a gleam
of revealing light. You become a means of control, a symptom rather than a
cure.
The Third Generation of Hackers grew up in a simulated world, a
designer society of electronic communication, but sees through the fictions
and the myths. Real hackers discover in their fear and trembling the
courage and the means to move through zones of annihilation in which
everything we believe to be true is called into question in order to
reconstitute both what is known and our knowing Self on the higher side of
self-transformation. Real hackers know that the higher calling is to hack
the Truth in a society built on designer lies and then the most subtle,
most difficult part - manage their egos and that bigger picture with
stealth and finesse in the endless ambiguity and complexity of their lives.
The brave new world of the past is now everyday life. Everybody knows
that identities can be stolen which means if they think that they know they
can be invented. What was given to spies by the state as a sanction for
breaking laws is now given to real hackers by technologies that make spies
of us all.
Psychological operations and information warfare are controls in the
management of perception taking place at all levels of society, from the
obvious distortions in the world of politics to the obvious distortions of
balance sheets and earnings reports in the world of economics.
Entertainment, too, the best vehicle for propaganda according to Joseph
Goebbels, includes not only obvious propaganda but movies like the Matrix
that serve as sophisticated controls, creating a subset of people who think
they know and thereby become more docile. Thanks for that one, SN.
The only free speech tolerated is that which does not genuinely
threaten the self-interest of the oligarchic powers that be. The only
insight acceptable to those powers is insight framed as entertainment or an
opposition that can be managed and manipulated.
Hackers know they don't know what's real and know they can only build
provisional models as they move in stealthy trusted groups of a few. They
must assume that if they matter, they are known which takes the game
immediately to another level.
So the Matrix like any good cybernetic system is self-regulating,
builds controls, has multiple levels of complexity masking partial truth as
Truth. Of what else could life consist in a cyborg world? All over the
world, in low-earth orbit, soon on the moon and the asteroid belt, this
game is played with real money. It is no joke. The surrender of so many
former rights - habeas corpus, the right to a trial, the freedom from
torture during interrogation, freedom of movement without papers in ones
own country - has changed the playing field forever, changed the game.
Third Generation Hacking means accepting nothing at face value,
learning to counter counter-threats with counter-counter-counter-moves. It
means all means and ends are provisional and likely to transform themselves
like alliances on the fly.
Third Generation Hacking is the ability to free the mind, to live
vibrantly in a world without walls.
Do not be deceived by uniforms, theirs or ours, or language that serves
as uniforms, or behaviors. There is no theirs or ours, no us or them. There
are only moments of awareness at the nexus where fiction myth and fact
touch, there are only moments of convergence. But if it is all on behalf of
the Truth it is Hacking. Then it can not fail because the effort defines
what it means to be human in a cyborg world. Hackers are aware of the
paradox, the irony and the impossibility of the mission as well as the
necessity nevertheless of pursuing it, despite everything. That is, after
all, why they're hackers.
Thanks to Simple Nomad, David Aitel, Sol Tzvi, Fred Cohen, Jaya Baloo, and
many others for the ongoing conversations that helped me frame this article.
Richard Thieme
|=-----------------------------------------------------------------------=|
|=-=[ Citizen Questions on Citizenship ]=--------------------------------=|
|=-----------------------------------------------------------------------=|
by Bootleg
(Please READ everything then check out my posts by Bootleg on this forum:
http://forums.gunbroker.com/topic.asp?TOPIC_ID=22130)
"A Citizen Questions on Citizenship" or "Are outlaws screwing your inlaws
without laws?"
What's the difference in "Rights" between a citizen who is an excon and
a citizen who is not? What law gives the government the right to
permanently take away certain rights from an excon without a judge
proscribing the rights be taken away? When has an excon ever been taken to
court to have his civil rights stripped away permanently?
When has an excon ever been arrested and prosecuted on any law that
specifically says since they are excons they must now go to trial to fight
for their right to keep all their civil rights? In American law, ONLY a
JUDGE can proscribe penalties against a citizen and only after being
allowed a trial by his peers and only for specific charges brought against
him. How then can an excons rights be stripped away if he has never been in
front of a judge for a charge of possessing civil rights illegally? What
law exists that states certain civil rights exist only for certain people?
I've been convicted of several felonies and not once during sentencing
has any judge ever said I was to loose any of my civil rights as part of my
sentence! If no judge has ever stripped my rights as part of any criminal
sentence they gave me, how then can I not still have them? Furthermore...
why does my wife and children also loose some of their civil rights simply
because they are part of my family even though they have never committed
any crime????
Are excons having their civil rights taken WITHOUT due process and
without equal protection the true intent of the Bill of Rights and the
Constitution? Or should all rights be restored after an excon pays his debt
to society like they have always been throughout our history? Since an
excon is still a citizen, then what kind of citizen is he under our
Constitution that states all citizens have equal rights? If the government
can arbitrarily take most of an excons rights away without due process, can
they then take one or more rights away from other groups of citizens as
they see fit thus making a layered level of citizenship with only certain
groups enjoying full rights? Either they can do this or they can't
according to the Constitution. If they do it to even one group of
citizens...excons, then are they not violating the Constitution? Are all
American citizens "EQUAL" the Constitution and is that not the intent of
those that wrote the constitution as evidenced by their adding the "Bill of
Rights" guaranteeing "Equality" for ALL citizens?
Just as "blacks" were slaves and had no rights even as freemen in the
past, even as women couldn't vote till the 20th century, even as the aged
and disabled were denied equal rights till recently, so now does one more
group of millions of citizens exist that are being uncoonstitutionally
denied their birthright as American citizens. This group is the millions of
American citizens that are exconvicts and their families! ARE THEY CITIZENS
OR NOT? The law says they still are citizens even if they are excons. If
this is the case, then under our Constitution, are not ALL citizens equal
having equal rights?
If so, then exconvicts are illegally being persecuted and discriminated
against along with their families. How would you rectify this?
Nuff Said-
Bootleg
|=-----------------------------------------------------------------------=|
|=-=[ The Molting Wings of Liberty ]=------------------------------------=|
|=-----------------------------------------------------------------------=|
by Beaux75
Thesis: The USA PATRIOT Act (USAPA) is too restrictive of the rights
mandated by the Constitution and must be repealed.
I. Introduction
A. Circumstances leading up to the USAPA
B. A rushed job
C. Using public anxiety and war fever to push an unjust bill
II. Domestic spying and the end of probable cause
A. Breaking down restrictions on unlawful surveillance
B. Side-stepping court orders and accountability
C. Sneak and peek
III. Immigrants as suspects
A. Erosion of due process for legal immigrants
B. Criminal behavior now subject to detention and deportation
C. Denying entry based on ideology
IV. Defining the threat
A. Accepted definition of terrorism
B. The USAPA and its overbroad definition
C. "Domestic terrorism"
V. Silencing dissent
A. Questioning government policy can now be terrorism
B. Public scrutiny encouraged by present administration
1. Recruiting Americans to inform on Americans
2. Blind faith in political matters
3. Keeping our leaders in check and our citizens informed
VI. Refuting common retort
A. "I do not want to be a victim of terrorism."
B. "I have nothing to worry about because I am not a terrorist."
C. "I am willing to compromise my civil rights to feel safer."
VII. The future of civil rights at the present pace
A. Expansion of unprecedented and unchecked power
B. The illusion of democracy and our descent into fascism
C. Our leaders no longer have the public's best interests in mind
VIII. Conclusion
A. The USAPA trounces the rights guaranteed to all Americans
B. People must stay informed
C. Vigilance in the struggle to maintain freedom
Pros:
1. Act is unjust and violates civil liberties
2. Definition of "terrorist" reaches too far
3. Act is a stepping-stone toward fascism
4. Signals the decline of a democracy
Cons:
1. Limits the effectiveness of anti-terrorism efforts
2. No longer have broad and corruptible powers
3. Must find new ways to prevent terrorism
4. Must maintain the rights of the people
The Molting Wings of Liberty
In the darker alleys of Washington, DC, something very disturbing
is taking shape. Assaults on our civil liberties and our very way of life
are unfolding before us, yet somehow we are blind to it. What is shielding
us from the truth about the future of America is the cataract of ignorance
and misinformation brought on by mass paranoia. One thing is definite and
overwhelming when the haze is lifted: our elected officials are knowingly
sacrificing our rights under the guise of national security.
In the six weeks after the worst terrorist attacks on US soil, a
bill was hastily written and pushed through congress granting the executive
branch extensive and far reaching powers to combat terrorism. Thus, the
awkwardly named "Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism" or USA PATRIOT Act
(USAPA) was signed into law on October 26, 2001. President George W. Bush,
in his remarks on the morning of the bill's signing stated, "Today we take
an essential step in defeating terrorism, while protecting the
constitutional rights of all Americans" (1). How can it be said that this
law protects our constitutional rights when it can be utilized to violate
five of the ten amendments in the Bill of Rights? The USAPA is a classic
example of political over-correction: it may provide our government and law
enforcement agencies with "appropriate tools" for combating terrorism, but
at what cost to the basic freedoms that this country was founded upon?
Simply put, the USA PATRIOT Act is extremely dangerous to the
American people because its potential for corruptibility is so great.
Still, the 342-page tract was forced through Congress in near record time
with next to no internal debate and very little compromised revision.
Despite massive objection from civil rights watchdogs, it passed by an
unprecedented vote of 356-to-66 in the House of Representatives, and
98-to-1 in the Senate (Chang). The Bush administration considered the
USAPA an astounding bipartisan success, but neglected to inform the public
of exactly what its provisions called for and conveniently left out that,
in order to gain such an encompassing victory, many of the new powers were
superceded by a "sunset clause" making some of the more sweeping and
intrusive abilities subject to expiration on December 31, 2005. Most
recently, there have been numerous reports of the Republican controlled
Congress and their attempts to lift the sunset clause making these broad
powers permanent ("GOP Wants")
Admittedly, the abilities mandated in the USAPA might help to
counteract terrorism to a minor degree, but the price of such inspired
safety means the systematic retooling of the very principles that every
American citizen is entitled to. There is no doubt that this legislation
is a result of public outcry to ensure the events of September 11, 2001
never happen again, but the administration's across-the-board devotion to
internal secrecy was largely able to keep the bill from public eyes until
after it was jettisoned into law. Even now, more than a year and a half
after its inception, no one seems to know what the USAPA is or does.
From the Senate floor, under scrutiny for his lone vote against the
USAPA legislation, Wisconsin Senator Russ Feingold delivered his thoughts
on the bill:
There is no doubt that if we lived in a police state, it would be
easier to catch terrorists. If we lived in a country where police
were allowed to search your home at any time for any reason; if we
lived in a country where the government is entitled to open your
mail, eavesdrop on your phone conversations, or intercept your
e-mail communications; if we lived in a country where people could
be held in jail indefinitely based on what they write or think, or
based on mere suspicion that they are up to no good, the
government would probably discover more terrorists or would-be
terrorists, just as it would find more lawbreakers generally. But
that wouldn't be a country in which we would want to live. (qtd.
in Hentoff)
Senator Feingold's words make up a very relevant issue that has
been mentioned, but largely ignored by the Bush administration. It seems
reasonable that most Americans would be willing to compromise certain
liberties in order to regain the necessary illusion of safety. But what is
not universal is that those compromises become permanent. In the wake of
recent Republican activity and the other proposed methods of quashing
terrorism, it is becoming more and more vital that the people of America
educate themselves on this issue and urge their leaders to repeal the USAPA
on the grounds that it is grossly unconstitutional.
At the heart of the USAPA, is its intent to break down the checks
and balances among the three branches of government, allowing for a
wholesale usurping of dangerous powers by the executive branch. Because of
this bill, the definition of terrorism has been broadened to include crimes
not before considered such; our first amendment rights of free speech,
assembly and petition can now fall under the heading of "terrorist
activity" and thusly, their usage will surely be discouraged; by merely
being suspected of a crime, any crime, it can strip legal immigrants of
their civil rights and subject them to indefinite detainment and possible
deportation; and most alarmingly of all, in a fit of extreme paranoia, it
allows for unprecedented domestic spying and intelligence gathering in a
cold war like throwback to East Berlin's Ministry of State Security
(STASI).
On the subject of domestic spying, news analyst Daniel Schorr, in
an interview during All Things Considered on National Public Radio in the
latter half of 2002 said, "Spying on Americans in America is a historic
no-no that was reconfirmed in the mid-1970s when the CIA, the FBI and the
NSA got into a peck of trouble with congress and the country for conducting
surveillance on Vietnam War dissenters. A no-no, that is until September
11th. Since then, the Bush administration has acted as though in order to
protect you, it has to know all about you and everyone" (Neary).
Never before in the United States have law enforcement and
intelligence agencies had such sweeping approval to institute programs of
domestic surveillance. In the past, things like wire-tapping, Internet and
e-mail monitoring, even access to library records were regulated by
judicial restrictions in conjunction with the fourth amendment and
"probable cause." Because of the USAPA, warrants have been made virtually
inconsequential and probable cause has become a thing of the past. Medical
records, bank transactions, credit reports and a myriad of other personal
records can now be used in intel gathering (Collins). Even the
restrictions on illegally gained surveillance and so-called "sneak and
peek" searches (that allow for covert, unwarranted, and in many cases
unknown, searches and possible seizures of private property) have been
lifted to the point of perhaps being admissible as evidence. Mind you,
this is not just for suspicion of terrorist activity, but rather all
criminal activity and it can be corrupted to spy on anyone, regardless of
being a suspect or not. In addition to all of this, there is a clause in
the USAPA that insulates the agencies who use and abuse these powers from
any wrong doing as long as they can illustrate how their actions pertain to
national security (Chang). Under these provisions, everyone is a suspect,
regardless of guilt. When no meaningful checks and balances are in play,
there is enormous capacity for corruption.
For the sake of argument, say that an administration has a faceless
enemy in which they know to be affiliated with an organization that
questions recent government policy. With this new power, the entire
organization and all of its present, past and future members can be spied
on by local and national law enforcement agencies. Thanks to unchecked
sneak and peek searches, the members' private lives are now open for
scrutiny and the intelligence gathered can be used to trump up charges of
wrong-doing, even though the organization and its members have had their
first and fourth amendments clearly violated. And because of asset
forfeiture laws already long in place, the government can now seize the
organization's and its members' property at will as long as they are
labeled as suspects. Whether the case makes it to a courtroom or not is
irrelevant. The government can now publicly question the integrity of the
organization, thereby damaging its credibility and possibly negating its
cause. All this, and much worse, can now be done legally and virtually
without accountability.
This closely parallels the 1975 Watergate investigation. On this
topic, Jim McGee, journalist for The Washington Post, writes, "After wading
through voluminous evidence of intelligence abuses, a committee led by Sen.
Frank Church warned that domestic intelligence-gathering was a 'new form of
governmental power' that was unconstrained by law, often abused by
presidents and always inclined to grow" (1).
Another flagrant disregard for basic civil and human rights is the
USAPA's stance on criminality and immigration. We have already seen
immigrants suspected of crimes being detained unjustly. In the near
future, we should expect to see a rise in deportation as well as a further
erosion of due process for legal immigrants. It has now become legal to
detain immigrants, whether under suspicion of criminality or not, for
indefinite periods of time and without access to an attorney (Chang). This
is in clear violation of their constitutional rights, but with the fear of
terrorism looming overhead, anyone who champions their cause is subject to
public survey. Immigration is a hot potato of unjust activity, but one
that many Americans seem apt to ignore. Newcomers to our country are
already treated as inferiors by our government and now, because of the
USAPA legislation, they are treated as suspects before any crime is even
committed. More alarmingly, federal law enforcement agencies now have
influence to keep certain ethnicities out of America based on "conflicting
ideologies" (Chang). The message being sent: conform to American standards
and belief systems or risk deportation. The clause sounds more like a
scare tactic in order to keep what some deem as undesirables at bay, rather
than a tool for preventing terrorism.
Even the definition of "terrorism" has undergone a major overhaul
in the USAPA. Since 1983, the United States defined terrorism as "the
premeditated, politically motivated violence perpetrated against
noncombatant targets by subnational groups or clandestine agents, usually
intended to influence an audience" (Chang). Essentially, it draws the line
at people who intend to impact a government through violence of its
civilians. This definition has been around for close to twenty years and
has served its purpose well because of its straightforwardness. It
addresses the point, and it does not overreach its bounds by taking into
consideration acts or organizations that are not related to terrorism. As
of October 26, 2001, the definition has become muddled enough to include
"intimidation of civilian population," "affecting the conduct of government
through mass destruction, assassination or kidnapping," or any act that is
"dangerous to human life." It also spurs off to include "domestic
terrorism" which is an act of terrorism by an internal organization (ACLU
04-Apr-03). All of these pieces can be legitimately molded to include
activists, protestors, looters and rioters (all potentially dangerous to
human life); embezzlers and so-called computer hackers (dangerous to
financial institutions and therefore intimidating to civilians and
government); serial killers, mass murderers, serial rapists (dangerous to
human life and intimidation of civilians); and can even be stretched to the
point of including writers, publishers, journalists, musicians, comedians,
pundits and satirists based solely on their scope of influence. To think
that by increasing the size of the terrorism umbrella, organizations like
People for the Ethical Treatment of Animals (PETA), Food Not Bombs (FNB),
and Anti-Racist Action (ARA) not to mention hundreds of thousands of
outspoken protestors and activists for political and social change can be
lumped in with the same international terrorist factions we have been
hearing about for years.
In a report from the ACLU dated December 14, 2001, Gregory T.
Nojeim, Associate Director of the Washington National Office stated:
There are very few things that enjoy almost unanimous agreement in
this country. One of the most important is our collective
dedication to the ideals of fairness, justice and individual
liberty. Much of our government is structured around the pursuit
of each of these ideals for every American citizen. The
Administration's actions over the past three months - its
dedication to secrecy, the tearing down of barriers between
intelligence gathering and domestic law enforcement and the erosion
of judicial authority - are not in tune with these ideals. (ACLU
20-Apr-03)
All of these provisions taken into account, it makes one wonder if
the Bush administration's commitment to ending terrorism is part of a
larger commitment to end political dissent in general. After all, why
else would a bill that so blatantly violates our basic civil liberties have
been rushed through congress and signed into law on the horns of legitimate
public anxiety and war fever? Thanks to the USAPA, the war on terrorism no
longer seems concentrated on reducing the loss of innocent life at the
hands of those who would kill to influence our government so much as it
focuses on anyone who would like to influence the government regardless of
their means or intended ends.
Now is the time, when our leaders see fit to begin whittling away
at our basic rights that we need to be and stay informed and be as vocal as
possible. Unfortunately, being outspoken may now land us in hot water, as
we are now subject to the frivolous and unjust laws contained in the USAPA.
Logic follows that if a government sees its own people as a threat, then it
will do what it can to effectively gag them. Why would the American people
be seen as a threat? All we have to do is wait out the current term and
vote someone else into his or her place. That is, unless the right to vote
is next on the chopping block.
Never before has their been a time when questioning government
action can turn someone into a terrorist and therefore an enemy of his own
country. Standing up for beliefs is terrorist activity? Voicing opinions
and writing letters to officials is terrorist activity? The right to
privacy and against unreasonable searches and seizures without probable
cause is now terrorist activity? No! These are rights guaranteed to us by
our country's charter!
Our leaders have seen fit to draw lines on the pavement and demand
its allies on one side and its enemies on the other. They are recruiting
Americans to spy and inform on other Americans without discretion while
needlessly inflating the importance of such buzzword-labels as
"unpatriotic," and "un-American." In addition, they are requiring those on
their side to have blind faith in their leadership. Blind faith is a good
thing to have in certain walks of life, but political matters are most
assuredly not one of them. The main reason being that we are all humans
and therefore subject to the same shortcomings and corruptibility as every
other human being. For our leaders to somehow suggest that they are above
this means that they are extremely misguided in their pursuits and may no
longer hold the public's best interests in mind.
A report issued by the Center for Constitutional Rights (CCR) one
year after September 11, 2001 contained this apt summation:
The Bush Administration's war against terrorism, without boundary
or clear end-point, has led to serious abrogation of the rights of
the people and the obligations of the federal government. Abuses,
of Fourth and Fifth Amendment rights in particular, have been
rampant, but more disturbing is the attempt to codify into law
practices that erode privacy, free speech, and the separation of
powers that is the hallmark of our democracy. (CCR 16)
Now is the time to become and stay informed and make sure that our
leaders know that we are. There is a complacency that has permeated our
culture, which dictates that people can not be bothered to take an interest
in political policy. "Leave the politics to the politicians," is the usual
cry. Many people don't even try to learn about governmental policy because
they do not think they will understand it. Admittedly, politics is not as
palatable as several thousand other things; root canal surgery somehow
seems less painful. But it is imperative that we make the effort to
protect ourselves from an administration that sees us as unwitting sheep.
Especially now, when checks and balances are systematically being broken
down within the structure of our governing body, it is upon us to keep our
leaders from becoming excessively corrupt and hold them accountable for
trying to trample on our freedoms.
The public anxiety caused by recent events has been overwhelming.
There is no one in this country that wishes to be a victim of terrorism,
and the odds of it happening are miniscule at best. Terrorism itself is a
minor occurrence, but the fear of it has ballooned to the point of mass
paranoia, which today, seems to be more of a mode of operation rather than
a temporary affliction. It is wrong for our leaders to use that fear and
paranoia in order to limit our freedoms, regardless of the cost.
There are those who feel that they have nothing to worry about
because they are not terrorists. This logic is faulty because it assumes
that our law enforcement agencies see us as innocents, which is no longer
the case under the USAPA. Everyone is treated as a suspect until proven
otherwise, and even then, the connotation of being a suspected terrorist is
enough to ruin an innocent person's life. Under the 1983 definition of
terrorism, far fewer people than what we are now told would fit the bill.
By suspecting everyone, more overall undesirables will be weeded out but
only a few of those will actually be terrorists.
Since the World Trade Center disaster, there has been mass
speculation as far as what liberties we, as a nation, may have to give up
as a result of national security. And there are those who are so afraid of
the threat that they are willing to go along with this one-sided argument.
The other side, being both safe and free, has been largely ignored in the
media and dodged right and left by the president's administration. It is
perfectly normal to fear something, even to the point of being willing to
give up anything just to make the fear subside, but it cannot be expected
that everyone, or even a simple majority, feel the same way. The
difference in opinion must be addressed and the sound basis of freedoms
that our country was founded upon must remain intact if we are still to be
entitled to life, liberty and happiness.
Some would say that the future of our civil rights is hazy and
unforeseeable. When examining the USAPA and the precedents it sets, the
future becomes very clear. If we allow the provisions contained in the
USAPA to linger, we can expect an expansion of that kind of unchecked
power. In fact, plans are already underway. Attorney General John
Ashcroft is one of the parties involved in drafting what has been called
"Patriot II." If the bill is passed, the entropy of civil liberties in
America will continue unhindered. The bill will further erode governmental
checks and balances and expand the already loose definition of terrorism to
incorporate all outspoken dissidents, and hold media outlets responsible
for airing or printing what would be deemed as domestic terrorism. Under
this power, mass media would theoretically cease any kind of editorial,
unpopular opinion, quite possibly even normal news coverage out of fear of
responsibility.
If our country remains on its current course, it is said that we
will become less and less of a democracy and more of a fascist
parliamentary dictatorship. Eventually, our way of life will be hollowed
out from the inside and only the most trivial of freedoms will remain.
Deeper down, we will become a nation of benign citizens under state
control, and the smart money says that we will still be told that America
is the greatest democracy in the world.
This is why we must stay informed and why we must remain vigilant
in our struggle to maintain our freedom. The USAPA is detrimental to
American society because at its core, it operates under the assumption that
anyone could be a terrorist, or more generally, a threat to government
policy. In a true democracy, organizations like the ACLU, Bill of Rights
Defense Committee (BORDC), and Center for Constitutional Rights (CCR) would
not be needed because all laws would be passed with our basic civil
liberties in mind. Unfortunately, this is no longer (has it ever truly
been?) the case.
The freedoms to voice our opinions and to assemble with others of a
like-mind have been instrumental rights that we have utilized in order to
make sure our government hears us. Beyond that, they have played a major
role in keeping our leaders from excessive corruption. When our officials
begin to make laws that counteract our freedoms, then it is time to raise
our voices in unity despite the possibility of being called un-American.
When our government begins to recruit Americans to inform on other
Americans, then it is time for open defiance because living in a world
where you can't trust your neighbor is not a world worth living in and a
government that cannot trust its own citizens is a government that itself
cannot be trusted. When our leaders tell us that our voices and our
actions are only aiding America's enemies, then it is time to stand up and
show our leaders that we are not the servile sheep that they think we are.
As a people, we need to send a clear, resounding message to our
elected officials that we deserve our rights, and we deserve leaders who do
not try to undermine them. But we also deserve safety. Our government has
done some nasty things overseas, mostly without public knowledge or
consent, so is it any wonder that terrorists lash out at our leaders by
lashing out at us? After all, we are easy targets because we take for
granted that out government will protect us. The demand that we compromise
our freedoms in order to obtain that protection is not just grossly
insubordinate, it is indicative of a government that is quickly losing
interest in the needs of its people.
Works Cited
American Civil Liberties Union (ACLU) 04 April 2003
<http://www.aclu.org/NationalSecurity/NationalSecurity.cfm?ID=11437&c=111>
American Civil Liberties Union (ACLU) 20 April 2003
<http://www.aclu.org/NationalSecurity/NationalSecurity.cfm?ID=9857&c=24>
Bush, George W. "Remarks on Signing the USA PATRIOT Act of 2001." Weekly
Compilation of Presidential Documents 37 (2001): 1550-1552.
Center for Constitutional Rights (CCR) 20 April 2003
<http://www.ccr-ny.org/v2/reports/docs/Civil_Liberties.pdf>
Chang, Nancy. Center For Constitutional Rights (CCR) 18 April 2003
<http://www.ccr-ny.org/v2/reports/docs/USA_PATRIOT_ACT.pdf>
Collins, Jennifer M. "And the Walls Came Tumbling Down: Sharing Grand Jury
Information with the Intelligence Community Under the USA PATRIOT Act."
American Criminal Law Review 39 (2002): 1261-1286.
"GOP Wants to Keep Anti-Terror Powers." San Francisco Chronicle
09 April 2003: A15
Hentoff, Nat. "Resistance Rising!" Village Voice 22 November 2002.
McGee, Jim. "An Intelligence Giant in the Making." Washington Post
04 November 2001: A4.
Neary, Lynn. "Commentary: Worrisome Trend of Bush Administration Efforts to
Expand Their Collection of Information Data on American Citizens." All
Things Considered National Public Radio. 18 November 2002.
|=[ EOF ]=---------------------------------------------------------------=|