💾 Archived View for aphrack.org › issues › phrack61 › 15.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
==Phrack Inc.== Volume 0x0b, Issue 0x3d, Phile #0x0f of 0x0f |=--------------=[ P H R A C K W O R L D N E W S ]=------------------=| |=-----------------------------------------------------------------------=| |=------------------=[ Phrack Combat Journalistz ]=----------------------=| Content 1 - Quickies 2 - Hacker Generations by Richard Thieme 3 - Citizen Questions on Citizenship by Bootleg 4 - The Molting Wings of Liberty by Beaux75 |=-----------------------------------------------------------------------=| |=-=[ Quick News ]=------------------------------------------------------=| |=-----------------------------------------------------------------------=| Microsoft got hit by SQL slammer worm: [1] http://www.cnn.com/2003/TECH/biztech/01/28/microsoft.worm.ap/index.html [2] http://www.thewmurchannel.com/technology/1940013/detail.html They say they cought 'Fluffi Bunny': [1] http://www.salon.com/tech/wire/2003/04/29/fluffi_bunni/index.html [2] http://www.nandotimes.com/technology/story/872265p-6086707c.html How Geroge W. Bush Won the 2004 Presidential Election. This article outlines the danger of electronic voting systems. It explains why voting systems are vulnerable to fraudulent manipulation by the companies manufactoring and supervising the systems. [1] http://belgium.indymedia.org/news/2003/07/70542.php FBI Says Iraw Situation May Spur 'Patriotic Hackers' [1] http://www.washingtonpost.com/wp-dyn/articles/A64049-2003Feb12.html Over 5 million Visa/MasterCard accounts hacked into. This happens all the day long but once in a while is one journalist making a media hype out of it and everyone starts to go crazy about it. Wehehehhehee. [1] http://www.forbes.com/markets/newswire/2003/02/17/rtr881826.html The Shmoo group build a robot that drives around to find WiFi AccessPoints. Wonder how long it will take until the first hacker mounts a WiFi + Antenna under a low-flying zeppelin / model aircraft... [1] http://news.com.com/2100-1039_3-5059541.html Linux achieved the Common Criteria security certification and is now allowed to be used by the federal government and other organizations. [1] http://www.fcw.com/fcw/articles/2003/0804/web-linx-08-06-03.asp $55 million electronic voting machines can be hacked into by a 15-year-old newbie. Guess who will win the 2004' election? [1] http://www.washingtonpost.com/wp-dyn/articles/A25673-2003Aug6.html UK Intelligence and Security Report Aug 2003. I like the quote: "Britain has a complicated and rather bureaucratic political control over its int elligence and security community and one that tends to apply itself to long-term targets and strategic intelligence programs, but has little real influence on the behaviour and operations of SIS or MI5." [1] http://cryptome.org/uk-intel.doc Man jailed for linking to bomb-side. Judge, psst, *hint*: Try http://www.google.com -> homemade bombs -> I feel lucky. Eh? Going to jail google now? Eh? [1] http://www.cnn.com/2003/TECH/internet/08/05/anarchist.prison.ap/index.html The military is thinking of planting propaganda and misleading stories in the international media [1]. A new department has been set up inside the Pentagon with the Orwellian title of the Office of Strategic Influence. The government had to rename the new department when its name leaked ([2]). [1] http://news.bbc.co.uk/1/hi/world/americas/1830500.stm [2] http://www.fas.org/sgp/news/secrecy/2002/11/112702.html [3] http://www.fas.org/sgp/news/2002/11/dod111802.html |=-----------------------------------------------------------------------=| |=-=[ Hacker Generations ]=----------------------------------------------=| |=-----------------------------------------------------------------------=| Hacker Generations by Richard Thieme <rthieme at thiemeworks.com> Richard Thieme speaks writes and consults about life on the edge, creativity and innovation, and the human dimensions of technology. His exploraitions of hacking, security, and many other things can be found at http://www.thiemeworks.com). A frequent speaker at security conferences, he keynoted the Black Hat Briefings - Europe in Amsterdam this year, the security track of Tech Ed sponsored by Microsoft Israel in Eilat, and returns to keynote Hiver Con in Dublin for a second time in November. In addition to numerous security cons (Def Con 4,5,6,7,8,9,10,11and Black Hat 1,2,3,4,5,6,7, Rubicon 2,3,4,5), he has spoken for the FBI, Infragard, the FS-ISAC, Los Alamos National Laboratory, and the US Department of the Treasury. Clients include Microsoft Israel, GE Medical Systems, and Network Flight Recorder. First, the meaning of hacker ============================ The word originally meant an inventive type, someone creative and unconventional, usually involved in a technical feat of legerdemain, a person who saw doors where others saw walls or built bridges that others thought were planks on which to walk into shark-filled seas. Hackers were alive with the spirit of Loki or Coyote or the Trickster, moving with stealth across boundaries, often spurning conventional ways of thinking and behaving. Hackers see deeply into the arbitrariness of structures, how form and content are assembled in subjective and often random ways and therefore how they can be defeated or subverted. They see atoms where others see a seeming solid, and they know that atoms are approximations of energies, abstractions, mathematical constructions. At the top level, they see the skull behind the grin, the unspoken or unacknowledged but shared assumptions of a fallible humanity. Thats why, as in Zen monasteries, where mountains are mountains and then they are not mountains and then they are mountains again, hacker lofts are filled with bursts of loud spontaneous laughter. Then the playful creative things they did in the protected space of their mainframe heaven, a playfulness fueled by the passion to know, to solve puzzles, outwit adversaries, never be bested or excluded by arbitrary fences, never be rendered powerless, those actions began to be designated acts of criminal intent.. That happened when the space inside the mainframes was extended through distributed networks and ported to the rest of the world where things are assumed to be what they seem. A psychic space designed to be open, more or less, for trusted communities to inhabit, became a general platform of communication and commerce and security became a concern and an add-on. Legal distinctions which seemed to have been obliterated by new technologies and a romantic fanciful view of cyberspace a la Perry Barlow were reformulated for the new not-so-much cyberspace as cyborgspace where everyone was coming to live. Technologies are first astonishing, then grafted onto prior technologies, then integrated so deeply they are constitutive of new ways of seeing and acting, which is when they become invisible. A small group, a subset of real hackers, mobile crews who merely entered and looked around or pilfered unsecured information, became the definition the media and then everybody else used for the word "hacker. "A hacker became a criminal, usually defined as a burglar or vandal, and the marks of hacking were the same as breaking and entering, spray painting graffiti on web site walls rather than brick, stealing passwords or credit card numbers. At first real hackers tried to take back the word but once a word is lost, the war is lost. Hackernow means for most people a garden variety of online miscreant and words suggested as substitutes like technophile just don't have the same juice. So let's use the word hacker here to mean what we know we mean because no one has invented a better word. We dont mean script kiddies, vandals, or petty thieves. We mean men and women who do original creative work and play at the tip of the bell curve, not in the hump, we mean the best and brightest who cobble together new images of possibility and announce them to the world. Original thinkers. Meme makers. Artists of pixels and empty spaces. Second, the meaning of hacker generations ========================================= In a speech at the end of his two terms as president, Dwight Eisenhower coined the phrase "military-industrial complex" to warn of the consequences of a growing seamless collusion between the state and the private sector. He warned of a changing approach to scientific research which in effect meant that military and government contracts were let to universities and corporations, redefining not only the direction of research but what was thinkable or respectable in the scientific world. At the same time, a "closed world" as Paul N. Edwards phrased it in his book of the same name, was evolving, an enclosed psychic landscape formed by our increasingly symbiotic interaction with the symbol-manipulating and identity-altering space of distributed computing, a space that emerged after World War II and came to dominate military and then societal thinking. Eisenhower and Edwards were in a way describing the same event, the emergence of a massive state-centric collaboration that redefined our psychic landscape. After half a century Eisenhower is more obviously speaking of the military-industrial-educational-entertainment-and-media establishment that is the water in which we swim, a tangled inescapable mesh of collusion and self-interest that defines our global economic and political landscape. The movie calls it The Matrix. The Matrix issues from the fusion of cyborg space and the economic and political engines that drive it, a simulated world in which the management of perception is the cornerstone of war-and-peace (in the Matrix, war is peace and peace is war, as Orwell foretold). The battlespace is as perhaps it always has been the mind of society but the digital world has raised the game to a higher level. The game is multidimensional, multi-valent, played in string space. The manipulation of symbols through electronic means, a process which began with speech and writing and was then engineered through tools of literacy and printing is the currency of the closed world of our CyborgSpace and the military-industrial engines that power it. This Matrix then was created through the forties, fifties, sixties, and seventies, often invisible to the hackers who lived in and breathed it. The hackers noticed by the panoptic eye of the media and elevated to niche celebrity status were and always have been creatures of the Matrix. The generations before them were military, government, corporate and think-tank people who built the machinery and its webbed spaces. So I mean by the First Generation of Hackers, this much later generation of hackers that emerged in the eighties and nineties when the internet became an event and they were designated the First Hacker Generation, the ones who invented Def Con and all its spin-offs, who identified with garage-level hacking instead of the work of prior generations that made it possible. Marshall McLuhan saw clearly the nature and consequences of electronic media but it was not television, his favorite example, so much as the internet that provided illustrations for his text. Only when the Internet had evolved in the military-industrial complex and moved through incarnations like Arpanet and Milnet into the public spaces of our society did people began to understand what he was saying. Young people who became conscious as the Internet became public discovered a Big Toy of extraordinary proportions. The growing availability of cheap ubiquitous home computers became their platform and when they were plugged into one another, the machines and their cyborg riders fused. They co-created the dot com boom and the public net, and made necessary the security spaceperceived as essential today to a functional society. All day and all night like Bedouin they roamed the network where they would, hidden by sand dunes that changed shape and size overnight in the desert winds. That generation of hackers inhabited Def Con in the "good old days," the early nineties, and the other cons. They shaped the perception as well as the reality of the public Internet as their many antecedents at MIT, NSA, DOD and all the other three-letter agencies co-created the Matrix. So I mean by the First Generation of Hackers that extended or distributed network of passionate obsessive and daring young coders who gave as much as they got, invented new ways of sending text, images, sounds, and looked for wormholes that let them cross through the non-space of the network and bypass conventional routes. They constituted an online meritocracy in which they bootstrapped themselves into surrogate families and learned together by trial and error, becoming a model of self-directed corporate networked learning. They created a large-scale interactive system, self-regulating and self-organizing, flexible, adaptive, and unpredictable, the very essence of a cybernetic system. Then the Second Generation came along. They had not co-created the network so much as found it around them as they became conscious. Just a few years younger, they inherited the network created by their elders. The network was assumed and socialized them to how they should think and act. Video games were there when they learned how to play. Web sites instead of bulletin boards with everything they needed to know were everywhere. The way a prior generation was surrounded by books or television and became readers and somnambulistic watchers , the Second Generation was immersed in the network and became surfers. But unlike the First Generation which knew their own edges more keenly, the net made them cyborgs without anyone noticing. They were assimilated. They were the first children of the Matrix. In a reversal of the way children learned from parents, the Second Generation taught their parents to come online which they did but with a different agenda. Their elders came to the net as a platform for business, a means of making profits, creating economies of scale, and expanding into a global market. Both inhabited a simulated world characterized by porous or disappearing boundaries and if they still spoke of a digital frontier, evoking the romantic myths of the EFF and the like, that frontier was much more myth than fact, as much a creation of the dream weavers at CFP as the old west was a creation of paintings, dime novels and movies. They were not only fish in the water of the Matrix, however, they were goldfish in a bowl. That environment to which I have alluded, the military-industrial complex in which the internet evolved in the first place, had long since built concentric circles of observation or surveillance that enclosed them around. Anonymizers promising anonymity were created by the ones who wanted to know their names. Hacker handles and multiple nyms hid not only hackers but those who tracked them. The extent of this panoptic world was hidden by denial and design. Most on it and in it didn't know it. Most believed the symbols they manipulated as if they were the things they represented, as if their tracks really vanished when they erased traces in logs or blurred the means of documentation. They thought they were watchers but in fact were also watched. The Eye that figures so prominently in Blade Runner was always open, a panoptic eye. The system could not be self-regulating if it were not aware of itself, after all. The net is not a dumb machine, it is sentient and aware because it is fused bone-on-steel with its cyborg riders and their sensory and cognitive extensions. Cognitive dissonance grew as the Second Generation spawned the Third. The ambiguities of living in simulated worlds, the morphing of multiple personas or identities, meant that no one was ever sure who was who. Dissolving boundaries around individuals and organizational structures alike ("The internet? C'est moi!") meant that identity based on loyalty, glue born of belonging to a larger community and the basis of mutual trust, could not be presumed. It's all about knowing where the nexus is, what transpires there at the connections. The inner circles may be impossible to penetrate but in order to recruit people into them, there must be a conversation and that conversation is the nexus, the distorted space into which one is unknowingly invited and often subsequently disappears. Colleges, universities, businesses, associations are discovered to be Potemkin villages behind which the real whispered dialogue takes place. The closed and so-called open worlds interpenetrate one another to such a degree that the nexus is difficult to discern. History ends and numerous histories take their place, each formed of an arbitrary association and integration of data classified or secret at multiple levels and turned into truths, half-truths, and outright lies. Diffie-Hellman's public key cryptography, for example, was a triumph of ingenious thinking, putting together bits of data, figuring it out, all outside the system, but Whit Diffie was abashed when he learned that years earlier (1969) James Ellis inside the closed worldof British intelligence had already been there and done that. The public world of hackers often reinvents what has been discovered years earlier inside the closed world of compartmentalized research behind walls they can not so easily penetrate. (People really can keep secrets and do.) PGP was well, do you really think that PGP was news to the closed world? In other words, the Second Generation of Hackers, socialized to a networked world, also began to discover another world or many other worlds that included and transcended what was publicly known. There have always been secrets but there have not always been huge whole secret WORLDS whose citizens live with a different history entirely but thats what we have built since the Second World War. Thats the metaphor at the heart of the Matrix and that's why it resonates with the Third Generation. A surprising discovery for the Second Generation as it matured is the basis for high-level hacking for the Third. The Third Generation of Hackers knows it was socialized to a world co-created by its legendary brethren as well as numerous nameless men and women. They know that we inhabit multiple thought-worlds with different histories, histories dependent on which particular bits of data can be bought on the black market for truth and integrated into Bigger Pictures. The Third Generation knows there is NO one Big Picture, there are only bigger or smaller pictures depending on the pieces one assembles. Assembling those pieces, finding them, connecting them, then standing back to see what they say - that is the essence of Third Generation hacking. That is the task demanded by the Matrix which is otherwise our prison, where inmates and guards are indistinguishable from each other because we are so proud of what we have built that we refuse to let one another escape. That challenge demands that real Third Generation hackers be expert at every level of the fractal that connects all the levels of the network. It includes the most granular examination of how electrons are turned into bits and bytes, how percepts as well as concepts are framed and transported in network-centric warfare/peacefare, how all the layers link to one another, which distinctions between them matter and which dont. How the seemingly topmost application layer is not the end but the beginning of the real challenge, where the significance and symbolic meaning of the manufactured images and ideas that constitute the cyborg network create a trans-planetary hive mind. That's where the game is played today by the masters of the unseen, where those ideas and images become the means of moving the herd, percept turned into concept, people thinking they actually think when what has in fact already been thought for them has moved on all those layers into their unconscious constructions of reality. Hacking means knowing how to find data in the Black Market for truth, knowing what to do with it once it is found, knowing how to cobble things together to build a Big Picture. The puzzle to be solved is reality itself, the nature of the Matrix, how it all relates. So unless youre hacking the Mind of God, unless you're hacking the mind of society itself, you arent really hacking at all. Rather than designing arteries through which the oil or blood of a cyborg society flows, you are the dye in those arteries, all unknowing that you function like a marker or a bug or a beeper or a gleam of revealing light. You become a means of control, a symptom rather than a cure. The Third Generation of Hackers grew up in a simulated world, a designer society of electronic communication, but sees through the fictions and the myths. Real hackers discover in their fear and trembling the courage and the means to move through zones of annihilation in which everything we believe to be true is called into question in order to reconstitute both what is known and our knowing Self on the higher side of self-transformation. Real hackers know that the higher calling is to hack the Truth in a society built on designer lies and then the most subtle, most difficult part - manage their egos and that bigger picture with stealth and finesse in the endless ambiguity and complexity of their lives. The brave new world of the past is now everyday life. Everybody knows that identities can be stolen which means if they think that they know they can be invented. What was given to spies by the state as a sanction for breaking laws is now given to real hackers by technologies that make spies of us all. Psychological operations and information warfare are controls in the management of perception taking place at all levels of society, from the obvious distortions in the world of politics to the obvious distortions of balance sheets and earnings reports in the world of economics. Entertainment, too, the best vehicle for propaganda according to Joseph Goebbels, includes not only obvious propaganda but movies like the Matrix that serve as sophisticated controls, creating a subset of people who think they know and thereby become more docile. Thanks for that one, SN. The only free speech tolerated is that which does not genuinely threaten the self-interest of the oligarchic powers that be. The only insight acceptable to those powers is insight framed as entertainment or an opposition that can be managed and manipulated. Hackers know they don't know what's real and know they can only build provisional models as they move in stealthy trusted groups of a few. They must assume that if they matter, they are known which takes the game immediately to another level. So the Matrix like any good cybernetic system is self-regulating, builds controls, has multiple levels of complexity masking partial truth as Truth. Of what else could life consist in a cyborg world? All over the world, in low-earth orbit, soon on the moon and the asteroid belt, this game is played with real money. It is no joke. The surrender of so many former rights - habeas corpus, the right to a trial, the freedom from torture during interrogation, freedom of movement without papers in ones own country - has changed the playing field forever, changed the game. Third Generation Hacking means accepting nothing at face value, learning to counter counter-threats with counter-counter-counter-moves. It means all means and ends are provisional and likely to transform themselves like alliances on the fly. Third Generation Hacking is the ability to free the mind, to live vibrantly in a world without walls. Do not be deceived by uniforms, theirs or ours, or language that serves as uniforms, or behaviors. There is no theirs or ours, no us or them. There are only moments of awareness at the nexus where fiction myth and fact touch, there are only moments of convergence. But if it is all on behalf of the Truth it is Hacking. Then it can not fail because the effort defines what it means to be human in a cyborg world. Hackers are aware of the paradox, the irony and the impossibility of the mission as well as the necessity nevertheless of pursuing it, despite everything. That is, after all, why they're hackers. Thanks to Simple Nomad, David Aitel, Sol Tzvi, Fred Cohen, Jaya Baloo, and many others for the ongoing conversations that helped me frame this article. Richard Thieme |=-----------------------------------------------------------------------=| |=-=[ Citizen Questions on Citizenship ]=--------------------------------=| |=-----------------------------------------------------------------------=| by Bootleg (Please READ everything then check out my posts by Bootleg on this forum: http://forums.gunbroker.com/topic.asp?TOPIC_ID=22130) "A Citizen Questions on Citizenship" or "Are outlaws screwing your inlaws without laws?" What's the difference in "Rights" between a citizen who is an excon and a citizen who is not? What law gives the government the right to permanently take away certain rights from an excon without a judge proscribing the rights be taken away? When has an excon ever been taken to court to have his civil rights stripped away permanently? When has an excon ever been arrested and prosecuted on any law that specifically says since they are excons they must now go to trial to fight for their right to keep all their civil rights? In American law, ONLY a JUDGE can proscribe penalties against a citizen and only after being allowed a trial by his peers and only for specific charges brought against him. How then can an excons rights be stripped away if he has never been in front of a judge for a charge of possessing civil rights illegally? What law exists that states certain civil rights exist only for certain people? I've been convicted of several felonies and not once during sentencing has any judge ever said I was to loose any of my civil rights as part of my sentence! If no judge has ever stripped my rights as part of any criminal sentence they gave me, how then can I not still have them? Furthermore... why does my wife and children also loose some of their civil rights simply because they are part of my family even though they have never committed any crime???? Are excons having their civil rights taken WITHOUT due process and without equal protection the true intent of the Bill of Rights and the Constitution? Or should all rights be restored after an excon pays his debt to society like they have always been throughout our history? Since an excon is still a citizen, then what kind of citizen is he under our Constitution that states all citizens have equal rights? If the government can arbitrarily take most of an excons rights away without due process, can they then take one or more rights away from other groups of citizens as they see fit thus making a layered level of citizenship with only certain groups enjoying full rights? Either they can do this or they can't according to the Constitution. If they do it to even one group of citizens...excons, then are they not violating the Constitution? Are all American citizens "EQUAL" the Constitution and is that not the intent of those that wrote the constitution as evidenced by their adding the "Bill of Rights" guaranteeing "Equality" for ALL citizens? Just as "blacks" were slaves and had no rights even as freemen in the past, even as women couldn't vote till the 20th century, even as the aged and disabled were denied equal rights till recently, so now does one more group of millions of citizens exist that are being uncoonstitutionally denied their birthright as American citizens. This group is the millions of American citizens that are exconvicts and their families! ARE THEY CITIZENS OR NOT? The law says they still are citizens even if they are excons. If this is the case, then under our Constitution, are not ALL citizens equal having equal rights? If so, then exconvicts are illegally being persecuted and discriminated against along with their families. How would you rectify this? Nuff Said- Bootleg |=-----------------------------------------------------------------------=| |=-=[ The Molting Wings of Liberty ]=------------------------------------=| |=-----------------------------------------------------------------------=| by Beaux75 Thesis: The USA PATRIOT Act (USAPA) is too restrictive of the rights mandated by the Constitution and must be repealed. I. Introduction A. Circumstances leading up to the USAPA B. A rushed job C. Using public anxiety and war fever to push an unjust bill II. Domestic spying and the end of probable cause A. Breaking down restrictions on unlawful surveillance B. Side-stepping court orders and accountability C. Sneak and peek III. Immigrants as suspects A. Erosion of due process for legal immigrants B. Criminal behavior now subject to detention and deportation C. Denying entry based on ideology IV. Defining the threat A. Accepted definition of terrorism B. The USAPA and its overbroad definition C. "Domestic terrorism" V. Silencing dissent A. Questioning government policy can now be terrorism B. Public scrutiny encouraged by present administration 1. Recruiting Americans to inform on Americans 2. Blind faith in political matters 3. Keeping our leaders in check and our citizens informed VI. Refuting common retort A. "I do not want to be a victim of terrorism." B. "I have nothing to worry about because I am not a terrorist." C. "I am willing to compromise my civil rights to feel safer." VII. The future of civil rights at the present pace A. Expansion of unprecedented and unchecked power B. The illusion of democracy and our descent into fascism C. Our leaders no longer have the public's best interests in mind VIII. Conclusion A. The USAPA trounces the rights guaranteed to all Americans B. People must stay informed C. Vigilance in the struggle to maintain freedom Pros: 1. Act is unjust and violates civil liberties 2. Definition of "terrorist" reaches too far 3. Act is a stepping-stone toward fascism 4. Signals the decline of a democracy Cons: 1. Limits the effectiveness of anti-terrorism efforts 2. No longer have broad and corruptible powers 3. Must find new ways to prevent terrorism 4. Must maintain the rights of the people The Molting Wings of Liberty In the darker alleys of Washington, DC, something very disturbing is taking shape. Assaults on our civil liberties and our very way of life are unfolding before us, yet somehow we are blind to it. What is shielding us from the truth about the future of America is the cataract of ignorance and misinformation brought on by mass paranoia. One thing is definite and overwhelming when the haze is lifted: our elected officials are knowingly sacrificing our rights under the guise of national security. In the six weeks after the worst terrorist attacks on US soil, a bill was hastily written and pushed through congress granting the executive branch extensive and far reaching powers to combat terrorism. Thus, the awkwardly named "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism" or USA PATRIOT Act (USAPA) was signed into law on October 26, 2001. President George W. Bush, in his remarks on the morning of the bill's signing stated, "Today we take an essential step in defeating terrorism, while protecting the constitutional rights of all Americans" (1). How can it be said that this law protects our constitutional rights when it can be utilized to violate five of the ten amendments in the Bill of Rights? The USAPA is a classic example of political over-correction: it may provide our government and law enforcement agencies with "appropriate tools" for combating terrorism, but at what cost to the basic freedoms that this country was founded upon? Simply put, the USA PATRIOT Act is extremely dangerous to the American people because its potential for corruptibility is so great. Still, the 342-page tract was forced through Congress in near record time with next to no internal debate and very little compromised revision. Despite massive objection from civil rights watchdogs, it passed by an unprecedented vote of 356-to-66 in the House of Representatives, and 98-to-1 in the Senate (Chang). The Bush administration considered the USAPA an astounding bipartisan success, but neglected to inform the public of exactly what its provisions called for and conveniently left out that, in order to gain such an encompassing victory, many of the new powers were superceded by a "sunset clause" making some of the more sweeping and intrusive abilities subject to expiration on December 31, 2005. Most recently, there have been numerous reports of the Republican controlled Congress and their attempts to lift the sunset clause making these broad powers permanent ("GOP Wants") Admittedly, the abilities mandated in the USAPA might help to counteract terrorism to a minor degree, but the price of such inspired safety means the systematic retooling of the very principles that every American citizen is entitled to. There is no doubt that this legislation is a result of public outcry to ensure the events of September 11, 2001 never happen again, but the administration's across-the-board devotion to internal secrecy was largely able to keep the bill from public eyes until after it was jettisoned into law. Even now, more than a year and a half after its inception, no one seems to know what the USAPA is or does. From the Senate floor, under scrutiny for his lone vote against the USAPA legislation, Wisconsin Senator Russ Feingold delivered his thoughts on the bill: There is no doubt that if we lived in a police state, it would be easier to catch terrorists. If we lived in a country where police were allowed to search your home at any time for any reason; if we lived in a country where the government is entitled to open your mail, eavesdrop on your phone conversations, or intercept your e-mail communications; if we lived in a country where people could be held in jail indefinitely based on what they write or think, or based on mere suspicion that they are up to no good, the government would probably discover more terrorists or would-be terrorists, just as it would find more lawbreakers generally. But that wouldn't be a country in which we would want to live. (qtd. in Hentoff) Senator Feingold's words make up a very relevant issue that has been mentioned, but largely ignored by the Bush administration. It seems reasonable that most Americans would be willing to compromise certain liberties in order to regain the necessary illusion of safety. But what is not universal is that those compromises become permanent. In the wake of recent Republican activity and the other proposed methods of quashing terrorism, it is becoming more and more vital that the people of America educate themselves on this issue and urge their leaders to repeal the USAPA on the grounds that it is grossly unconstitutional. At the heart of the USAPA, is its intent to break down the checks and balances among the three branches of government, allowing for a wholesale usurping of dangerous powers by the executive branch. Because of this bill, the definition of terrorism has been broadened to include crimes not before considered such; our first amendment rights of free speech, assembly and petition can now fall under the heading of "terrorist activity" and thusly, their usage will surely be discouraged; by merely being suspected of a crime, any crime, it can strip legal immigrants of their civil rights and subject them to indefinite detainment and possible deportation; and most alarmingly of all, in a fit of extreme paranoia, it allows for unprecedented domestic spying and intelligence gathering in a cold war like throwback to East Berlin's Ministry of State Security (STASI). On the subject of domestic spying, news analyst Daniel Schorr, in an interview during All Things Considered on National Public Radio in the latter half of 2002 said, "Spying on Americans in America is a historic no-no that was reconfirmed in the mid-1970s when the CIA, the FBI and the NSA got into a peck of trouble with congress and the country for conducting surveillance on Vietnam War dissenters. A no-no, that is until September 11th. Since then, the Bush administration has acted as though in order to protect you, it has to know all about you and everyone" (Neary). Never before in the United States have law enforcement and intelligence agencies had such sweeping approval to institute programs of domestic surveillance. In the past, things like wire-tapping, Internet and e-mail monitoring, even access to library records were regulated by judicial restrictions in conjunction with the fourth amendment and "probable cause." Because of the USAPA, warrants have been made virtually inconsequential and probable cause has become a thing of the past. Medical records, bank transactions, credit reports and a myriad of other personal records can now be used in intel gathering (Collins). Even the restrictions on illegally gained surveillance and so-called "sneak and peek" searches (that allow for covert, unwarranted, and in many cases unknown, searches and possible seizures of private property) have been lifted to the point of perhaps being admissible as evidence. Mind you, this is not just for suspicion of terrorist activity, but rather all criminal activity and it can be corrupted to spy on anyone, regardless of being a suspect or not. In addition to all of this, there is a clause in the USAPA that insulates the agencies who use and abuse these powers from any wrong doing as long as they can illustrate how their actions pertain to national security (Chang). Under these provisions, everyone is a suspect, regardless of guilt. When no meaningful checks and balances are in play, there is enormous capacity for corruption. For the sake of argument, say that an administration has a faceless enemy in which they know to be affiliated with an organization that questions recent government policy. With this new power, the entire organization and all of its present, past and future members can be spied on by local and national law enforcement agencies. Thanks to unchecked sneak and peek searches, the members' private lives are now open for scrutiny and the intelligence gathered can be used to trump up charges of wrong-doing, even though the organization and its members have had their first and fourth amendments clearly violated. And because of asset forfeiture laws already long in place, the government can now seize the organization's and its members' property at will as long as they are labeled as suspects. Whether the case makes it to a courtroom or not is irrelevant. The government can now publicly question the integrity of the organization, thereby damaging its credibility and possibly negating its cause. All this, and much worse, can now be done legally and virtually without accountability. This closely parallels the 1975 Watergate investigation. On this topic, Jim McGee, journalist for The Washington Post, writes, "After wading through voluminous evidence of intelligence abuses, a committee led by Sen. Frank Church warned that domestic intelligence-gathering was a 'new form of governmental power' that was unconstrained by law, often abused by presidents and always inclined to grow" (1). Another flagrant disregard for basic civil and human rights is the USAPA's stance on criminality and immigration. We have already seen immigrants suspected of crimes being detained unjustly. In the near future, we should expect to see a rise in deportation as well as a further erosion of due process for legal immigrants. It has now become legal to detain immigrants, whether under suspicion of criminality or not, for indefinite periods of time and without access to an attorney (Chang). This is in clear violation of their constitutional rights, but with the fear of terrorism looming overhead, anyone who champions their cause is subject to public survey. Immigration is a hot potato of unjust activity, but one that many Americans seem apt to ignore. Newcomers to our country are already treated as inferiors by our government and now, because of the USAPA legislation, they are treated as suspects before any crime is even committed. More alarmingly, federal law enforcement agencies now have influence to keep certain ethnicities out of America based on "conflicting ideologies" (Chang). The message being sent: conform to American standards and belief systems or risk deportation. The clause sounds more like a scare tactic in order to keep what some deem as undesirables at bay, rather than a tool for preventing terrorism. Even the definition of "terrorism" has undergone a major overhaul in the USAPA. Since 1983, the United States defined terrorism as "the premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience" (Chang). Essentially, it draws the line at people who intend to impact a government through violence of its civilians. This definition has been around for close to twenty years and has served its purpose well because of its straightforwardness. It addresses the point, and it does not overreach its bounds by taking into consideration acts or organizations that are not related to terrorism. As of October 26, 2001, the definition has become muddled enough to include "intimidation of civilian population," "affecting the conduct of government through mass destruction, assassination or kidnapping," or any act that is "dangerous to human life." It also spurs off to include "domestic terrorism" which is an act of terrorism by an internal organization (ACLU 04-Apr-03). All of these pieces can be legitimately molded to include activists, protestors, looters and rioters (all potentially dangerous to human life); embezzlers and so-called computer hackers (dangerous to financial institutions and therefore intimidating to civilians and government); serial killers, mass murderers, serial rapists (dangerous to human life and intimidation of civilians); and can even be stretched to the point of including writers, publishers, journalists, musicians, comedians, pundits and satirists based solely on their scope of influence. To think that by increasing the size of the terrorism umbrella, organizations like People for the Ethical Treatment of Animals (PETA), Food Not Bombs (FNB), and Anti-Racist Action (ARA) not to mention hundreds of thousands of outspoken protestors and activists for political and social change can be lumped in with the same international terrorist factions we have been hearing about for years. In a report from the ACLU dated December 14, 2001, Gregory T. Nojeim, Associate Director of the Washington National Office stated: There are very few things that enjoy almost unanimous agreement in this country. One of the most important is our collective dedication to the ideals of fairness, justice and individual liberty. Much of our government is structured around the pursuit of each of these ideals for every American citizen. The Administration's actions over the past three months - its dedication to secrecy, the tearing down of barriers between intelligence gathering and domestic law enforcement and the erosion of judicial authority - are not in tune with these ideals. (ACLU 20-Apr-03) All of these provisions taken into account, it makes one wonder if the Bush administration's commitment to ending terrorism is part of a larger commitment to end political dissent in general. After all, why else would a bill that so blatantly violates our basic civil liberties have been rushed through congress and signed into law on the horns of legitimate public anxiety and war fever? Thanks to the USAPA, the war on terrorism no longer seems concentrated on reducing the loss of innocent life at the hands of those who would kill to influence our government so much as it focuses on anyone who would like to influence the government regardless of their means or intended ends. Now is the time, when our leaders see fit to begin whittling away at our basic rights that we need to be and stay informed and be as vocal as possible. Unfortunately, being outspoken may now land us in hot water, as we are now subject to the frivolous and unjust laws contained in the USAPA. Logic follows that if a government sees its own people as a threat, then it will do what it can to effectively gag them. Why would the American people be seen as a threat? All we have to do is wait out the current term and vote someone else into his or her place. That is, unless the right to vote is next on the chopping block. Never before has their been a time when questioning government action can turn someone into a terrorist and therefore an enemy of his own country. Standing up for beliefs is terrorist activity? Voicing opinions and writing letters to officials is terrorist activity? The right to privacy and against unreasonable searches and seizures without probable cause is now terrorist activity? No! These are rights guaranteed to us by our country's charter! Our leaders have seen fit to draw lines on the pavement and demand its allies on one side and its enemies on the other. They are recruiting Americans to spy and inform on other Americans without discretion while needlessly inflating the importance of such buzzword-labels as "unpatriotic," and "un-American." In addition, they are requiring those on their side to have blind faith in their leadership. Blind faith is a good thing to have in certain walks of life, but political matters are most assuredly not one of them. The main reason being that we are all humans and therefore subject to the same shortcomings and corruptibility as every other human being. For our leaders to somehow suggest that they are above this means that they are extremely misguided in their pursuits and may no longer hold the public's best interests in mind. A report issued by the Center for Constitutional Rights (CCR) one year after September 11, 2001 contained this apt summation: The Bush Administration's war against terrorism, without boundary or clear end-point, has led to serious abrogation of the rights of the people and the obligations of the federal government. Abuses, of Fourth and Fifth Amendment rights in particular, have been rampant, but more disturbing is the attempt to codify into law practices that erode privacy, free speech, and the separation of powers that is the hallmark of our democracy. (CCR 16) Now is the time to become and stay informed and make sure that our leaders know that we are. There is a complacency that has permeated our culture, which dictates that people can not be bothered to take an interest in political policy. "Leave the politics to the politicians," is the usual cry. Many people don't even try to learn about governmental policy because they do not think they will understand it. Admittedly, politics is not as palatable as several thousand other things; root canal surgery somehow seems less painful. But it is imperative that we make the effort to protect ourselves from an administration that sees us as unwitting sheep. Especially now, when checks and balances are systematically being broken down within the structure of our governing body, it is upon us to keep our leaders from becoming excessively corrupt and hold them accountable for trying to trample on our freedoms. The public anxiety caused by recent events has been overwhelming. There is no one in this country that wishes to be a victim of terrorism, and the odds of it happening are miniscule at best. Terrorism itself is a minor occurrence, but the fear of it has ballooned to the point of mass paranoia, which today, seems to be more of a mode of operation rather than a temporary affliction. It is wrong for our leaders to use that fear and paranoia in order to limit our freedoms, regardless of the cost. There are those who feel that they have nothing to worry about because they are not terrorists. This logic is faulty because it assumes that our law enforcement agencies see us as innocents, which is no longer the case under the USAPA. Everyone is treated as a suspect until proven otherwise, and even then, the connotation of being a suspected terrorist is enough to ruin an innocent person's life. Under the 1983 definition of terrorism, far fewer people than what we are now told would fit the bill. By suspecting everyone, more overall undesirables will be weeded out but only a few of those will actually be terrorists. Since the World Trade Center disaster, there has been mass speculation as far as what liberties we, as a nation, may have to give up as a result of national security. And there are those who are so afraid of the threat that they are willing to go along with this one-sided argument. The other side, being both safe and free, has been largely ignored in the media and dodged right and left by the president's administration. It is perfectly normal to fear something, even to the point of being willing to give up anything just to make the fear subside, but it cannot be expected that everyone, or even a simple majority, feel the same way. The difference in opinion must be addressed and the sound basis of freedoms that our country was founded upon must remain intact if we are still to be entitled to life, liberty and happiness. Some would say that the future of our civil rights is hazy and unforeseeable. When examining the USAPA and the precedents it sets, the future becomes very clear. If we allow the provisions contained in the USAPA to linger, we can expect an expansion of that kind of unchecked power. In fact, plans are already underway. Attorney General John Ashcroft is one of the parties involved in drafting what has been called "Patriot II." If the bill is passed, the entropy of civil liberties in America will continue unhindered. The bill will further erode governmental checks and balances and expand the already loose definition of terrorism to incorporate all outspoken dissidents, and hold media outlets responsible for airing or printing what would be deemed as domestic terrorism. Under this power, mass media would theoretically cease any kind of editorial, unpopular opinion, quite possibly even normal news coverage out of fear of responsibility. If our country remains on its current course, it is said that we will become less and less of a democracy and more of a fascist parliamentary dictatorship. Eventually, our way of life will be hollowed out from the inside and only the most trivial of freedoms will remain. Deeper down, we will become a nation of benign citizens under state control, and the smart money says that we will still be told that America is the greatest democracy in the world. This is why we must stay informed and why we must remain vigilant in our struggle to maintain our freedom. The USAPA is detrimental to American society because at its core, it operates under the assumption that anyone could be a terrorist, or more generally, a threat to government policy. In a true democracy, organizations like the ACLU, Bill of Rights Defense Committee (BORDC), and Center for Constitutional Rights (CCR) would not be needed because all laws would be passed with our basic civil liberties in mind. Unfortunately, this is no longer (has it ever truly been?) the case. The freedoms to voice our opinions and to assemble with others of a like-mind have been instrumental rights that we have utilized in order to make sure our government hears us. Beyond that, they have played a major role in keeping our leaders from excessive corruption. When our officials begin to make laws that counteract our freedoms, then it is time to raise our voices in unity despite the possibility of being called un-American. When our government begins to recruit Americans to inform on other Americans, then it is time for open defiance because living in a world where you can't trust your neighbor is not a world worth living in and a government that cannot trust its own citizens is a government that itself cannot be trusted. When our leaders tell us that our voices and our actions are only aiding America's enemies, then it is time to stand up and show our leaders that we are not the servile sheep that they think we are. As a people, we need to send a clear, resounding message to our elected officials that we deserve our rights, and we deserve leaders who do not try to undermine them. But we also deserve safety. Our government has done some nasty things overseas, mostly without public knowledge or consent, so is it any wonder that terrorists lash out at our leaders by lashing out at us? After all, we are easy targets because we take for granted that out government will protect us. The demand that we compromise our freedoms in order to obtain that protection is not just grossly insubordinate, it is indicative of a government that is quickly losing interest in the needs of its people. Works Cited American Civil Liberties Union (ACLU) 04 April 2003 <http://www.aclu.org/NationalSecurity/NationalSecurity.cfm?ID=11437&c=111> American Civil Liberties Union (ACLU) 20 April 2003 <http://www.aclu.org/NationalSecurity/NationalSecurity.cfm?ID=9857&c=24> Bush, George W. "Remarks on Signing the USA PATRIOT Act of 2001." Weekly Compilation of Presidential Documents 37 (2001): 1550-1552. Center for Constitutional Rights (CCR) 20 April 2003 <http://www.ccr-ny.org/v2/reports/docs/Civil_Liberties.pdf> Chang, Nancy. Center For Constitutional Rights (CCR) 18 April 2003 <http://www.ccr-ny.org/v2/reports/docs/USA_PATRIOT_ACT.pdf> Collins, Jennifer M. "And the Walls Came Tumbling Down: Sharing Grand Jury Information with the Intelligence Community Under the USA PATRIOT Act." American Criminal Law Review 39 (2002): 1261-1286. "GOP Wants to Keep Anti-Terror Powers." San Francisco Chronicle 09 April 2003: A15 Hentoff, Nat. "Resistance Rising!" Village Voice 22 November 2002. McGee, Jim. "An Intelligence Giant in the Making." Washington Post 04 November 2001: A4. Neary, Lynn. "Commentary: Worrisome Trend of Bush Administration Efforts to Expand Their Collection of Information Data on American Citizens." All Things Considered National Public Radio. 18 November 2002. |=[ EOF ]=---------------------------------------------------------------=|