Thursday, June 5, 2014

Science Friday Podcast Recap: What’s ‘I,’ and Why?

How does one define a person? What are the grounds for defining a person – religious, genetic, intellectual, scientific, personal, etc.? Do scientific approaches such as having a genome sequenced serve to be most accurate? What about personality quizzes? Scientific writer Jennifer Ouellette recently attempted to answer that question with her recent publication “Me, Myself, and Why” in which she answers this question from a scientific standpoint. Normally a writer who discusses topics of physics, Ouellette was inspired to write her new book for multiple reasons. One is that she had recently found her perception of herself clashing with what her prior grades told her. She was also inspired by the concept of nature versus nurture that she often finds herself questioning as she is and adopted child. One thing she found difficult about writing this book of hers was defining the terms essential to the book’s overall meaning. For example, defining “self” was most difficult for her. She discovered through research and careful analysis that self is not defined solely by genetics, intellectual standards, or one thing in particular. Rather, she reached the conclusion that self is rather the integration of all of these things into one where “the whole is greater than the sum of its parts.”

Science Friday Podcast Recap: The Lineup of Cancer Threats Is Changing

Though lung cancer is currently and shall most likely continue to be the leading cause of death by cancer in the United States, a recent report projected that by 2030, pancreatic cancer will be only a few paces behind lung cancer in that category. This may have something to do with the frequent late diagnoses that are characteristic of this type of cancer. According to a member of the American Cancer Society, pancreatic cancer currently is the fourth leading cause of death in men and also the fourth leading cause of death in women. Despite this, he says that the reason that pancreatic cancer is not discussed nearly as much as breast cancer and prostate cancer is because this cancer generates very few survivors. Also, the late diagnoses of this disease he affirmed to be part of the reason why it is so deadly, while its fatality also results from the fact that it is a type of cancer more prone to spreading and thus eliminating surgery as an option for treatment. This deadly cancer is, most unfortunately, likely to gain steam over the course of the next few decades.

Science Friday Podcast Recap: The Debate Over Net Neutrality

The Federal Communications Commission or the FCC recently released to the public its net neutrality proposal. The rules set forth in the proposal are intended to promote and protect an open Internet. On the other hand, how to go forward from there and put the plan into motion has yet to be determined. Also, what does this plan mean for Web-users? For those who provide on the Web? Is this proposal bringing about the end of the open Internet? Net neutrality, though there are still conflicting definitions thereof, is that Internet traffic should be treated equally no matter what content of service is being accessed. This limits if not completely removes the power of companies to Internet providers to limit their customers to certain realms of the Internet. The FCC did this for two main reasons. One is that it is an initiative for which President Obama provides hefty support and endorsement. Second, there are currently no established laws of net neutrality in the United States.

Science Friday Podcast Recap: A Decade After the Genome, Scientists Map the 'Proteome'

Only a decade has passed since scientists finished determining the human genome that dwell in the trillions of cells that all people possess. Now, however, scientists are now looking to be able to better distinguish between different types of cells in the human body – and the answer lies in the proteins of a cell. Akhilesh Pandey of Johns Hopkins University discussed recent scientific studies that have been underway in order to create a “proteome” or map of the differing proteins throughout the cells of the human body. According to Pandey, proteins are considered the workhorses of the human body, as they are the source of almost all functions. The millions of proteins that reside within a cell are determined by the genome. Also, these proteins are only able to function once they are folded from their primary to their quaternary structure. Lastly, awareness of this proteome map may help us in curing certain diseases in order to understand what is abnormal, one must first discover the standard of normality set. This protein-mapping, according to Pandey, is the first piece of the puzzle for understanding what is normal.

Science Friday Podcast Recap: How Touch Helps Us Emotionally Experience the World

Touch is perhaps one of the most underrated of the five senses and is only regarded when one encounters a radical sensation thereof, touching something extremely hot or cold. Researchers have recently found a connection between the set of nerves that respond to touching something soft and social cues. Liverpool-based researcher commented on the discrepancies amongst the ways that one responds to touching something. There are many different receptors, for example, that respond to different surfaces with which one’s skin comes into contact. They allow someone to not see the world but rather feel the world. It has been known for a long time that there are different microphones of sorts in the skin that detect mechanical stimulation. The portion of the skin that most quickly responds to touching is of course the hands that send messages of the brain processing the touch in record time allowing a person to feel what their hand touches instantaneously. This, quite literally but also figuratively, prevents things from slipping through our fingers - these things not only being feeling itself but also the emotions that are corresponsive to touch.

Science Friday Podcast Recap: Laser Blast Can Regrow Teeth, in Rats

Stem cells, though they may often be perceived as something that only exists in a laboratory setting, as it turns out, lurk all throughout a person’s body, anywhere from a person’s brain to their heart to their bones. What, then, triggers these cells? Researchers recently discovered a way to manually turn these cells in order to regenerate the tissues in which they live These Harvard-based researchers accomplished this through the use of a laser light on rat teeth. Though the use of lasers is not quite new in the medical field as they have frequently been used to destroy tissue, the key information behind why these methods work has been unclear to scientists. These researchers, however, tried to discover not only the result but also the method itself and the reason why the method works in a recent experiment. They specifically put a filling in the damaged teeth of rats, directed a laser at the damaged teeth, and measured resulting dentin levels of the teeth. They found that dentin regenerated significantly more in the laser-treated teeth than in the untreated teeth, and they activated stem cells to become dentin and regenerate the tooth structure.

Science Friday Podcast Recap: How Can Airline Tracking Improve?

The Malaysian Airline crash that leaves many still wondering what exactly happened to that flight that was missing for longer than one would anticipate in this technological day and age has sparked innovation in regard to airline tracking, in order to prevent this from happening again. Robert Mann of R.W. Mann and Company discussed the basics of airline tracking. According to Mann, while the airplane itself knows very well where it is located, the real question is how well the airplane can communicate that back to air traffic control and what that entails. This, in Mann’s opinion, is not due to a lack of technology. He says that the technology has been well known for a while now, and that they problem is merely that people are not executing. He also said that this would not be an expensive implementation. Thus, the only thing in the way of the advancement of this sort of technology is the people who control it.

Science Friday Podcast Recap: Why Do Some Songs Stick in Our Heads?

What is the science behind what may be referred to as "earworms", or songs that seem to stick in peoples' heads? What makes some songs stick in our heads while others do not? What does the repetitive quality of certain songs have to do with it? Elizabeth Margulis, author of "On Repeat: How Music Plays the Mind" and music professor at the University of Arkansas, has some possible answers to these questions. Earworms, according to Margulis, come to people involuntarily - thus, people do not have a choice as to what song repeats in their head. They also tend to be snippets of songs as opposed to the entire song, these snippets often being portions of the chorus or the most repeated part of the song that is approximately ten seconds long. Margulis also added that earworms have more of an impact upon everyday life than one would think, as many advertisers use songs likely to insinuate these earworms as bait to lure customers to their products with their catchy tunes. On a more neurological level, earworms function in an extraordinary way. When sounds are repeated, people are prone to anticipate the coming sound, and it leads people to sing along. There are even extreme cases of earworms, where certain people cannot seem to rid themselves of the earworm. For more of this podcast episode, see here: http://www.stitcher.com/podcast/science-friday-audio-podcast/episode/34210752?autoplay=true

Science Friday Podcast Recap: Is It Possible to Make Matter From Light?

In 1934, physicists first came up with the theory that light could be turned into matter, and it remained merely a theory for decades. However, recently researchers have created something called a photon-photon collider that may serve as experimental evidence in support of this theory. London-based researcher and physicist Dr. Edward Hill discussed the photon-photon collider that he and his partners recently developed, capable of this monumental task first suggested by Albert Einstein. He discussed why many have not had success in the past with this creation of matter from light, pointing out why the laser-pointed-at-laser tactic has not worked before. He also detailed his experiment that overcomes the obstacles presented in the method commonly used by scientists before. In their study, they first create a bath of x-rays which emanate from a very high-power laser and point it at a minuscule golden can which focuses an immense amount of energy into an extremely small space. This allows each photons therein to possess more energy. After the creation of this can containing a sort of cloud of photons, a shorter laser is used and manipulated with the end result being a beam of gamma rays that is then pointed at the can. The gamma rays are then pointed at the can of x-ray photons, and once they collide, electrons are produced and detected.

President Obama on the Role of the Military, Technology, National Security, and Civil Liberties

President Obama recently visited West Point and gave a speech to the graduating Class of 2014. In his speech, he subtly addressed the issues of national security and civil liberties that have recently had their time in the limelight of American controversy. For example, about midway through his speech, President Obama discussed the issue of national security and the alleged encroachment of civil liberties in terms of transparency, saying, "... we must be more transparent about both the basis of our counterterrorism actions and the manner in which they are carried out. We have to be able to explain them publicly, whether it is drone strikes or training partners. I will increasingly turn to our military to take the lead and provide information to the public about our efforts." In this statement, he puts the responsibility for communicating methods of counterterrorism to the American public partially in the hands of the military. He then seems to condemn the U.S. government's communication gap with its people in recent times - and perhaps even make somewhat of a threat to the graduating class and military at large to ensure that secrets like those of the NSA should not be withheld from the people again as he says, " But when we cannot explain our efforts clearly and publicly, we face terrorist propaganda and international suspicion, we erode legitimacy with our partners and our people, and we reduce accountability in our own government." President Obama then proceeded to add in a justification of the NSA's recent actions, in a statement that illustrated that while the NSA may have violated citizens' right of privacy, they were doing it in the name of counterrorism. The President said, " For the foreseeable future, the most direct threat to America at home and abroad remains terrorism." Here, President Obama is not only suggesting that terrorism is the most immense threat to national and perhaps even global security. He also is subtly proposing that since the U.S.'s greatest threat is the constant terrorist threat, the NSA was justified in its actions, for the NSA was only fighting off the greatest threat to the U.S. and they were only trying to protect American citizens. In the tail end of his speech, President Obama called to mind what he considers true encroachments upon civil liberties that take place in the tyrannical countries around the world - and, according to the President, especially in Arabic countries. He also makes note of how much these tyrannical settings are disappearing from the world. President Obama said, "But remember that...because of American diplomacy and foreign assistance as well as the sacrifices of our military, more people live under elected governments today than at any time in human history...And even the upheaval of the Arab World reflects the rejection of an authoritarian order that was anything but stable, and now offers the long-term prospect of more responsive and effective governance." He goes on to defend the prospect of advancing technology for the common good as he said, "Technology is empowering civil society in ways that no iron fist can control. New breakthroughs are lifting hundreds of millions of people out of poverty." (For more of President Obama's speech, see here: http://www.whitehouse.gov/the-press-office/2014/05/28/remarks-president-united-states-military-academy-commencement-ceremony)

ENEMY OF THE STATE PART FIVE: REMEMBER WHO THE REAL ENEMY IS (PART TWO)

The eternal question must be asked once again: who is the real enemy? Edward Snowden, Glenn Greenwald, and co. would not hesitate to pin that title to the NSA. Others would point the finger at Snowden and Greenwald, while Snowden is instead an enemy of the people and perhaps even an enemy of God – and not quite the enemy of the United States. Who then, is the real enemy? Or rather, what is the real enemy? The answer is quite simple. Captain Grzegorz Piotrowski, Leszek PÄ™kala, Waldemar Chmielewski and Colonel Adam Pietruszka. Who are these four men, and what on earth makes them the true enemy of the United States? In truth, these men are not the literal enemies of the United States, but rather the epitomic representation thereof. These men are the murderers of Father Jerzy Popieluszko. Take a step back for a moment, and go back in time to the days of communist Poland, to the days in which the government sent militia men armed with lead-filled batons and water cannons and mobilized in tanks, to the days when Father Jerzy Popieluszko was still alive. Fr. Popieluszko was, at the time, one of the few brave enough to step up and try and put an end to the tyrannical rule of the Polish communist regime. In a statement that applies not only to what Fr. Popieluszko saw as his mission but also that speaks for all that he did in the name of the bringing the truth to his fellow sufferers in Poland, Fr. Popieluszko said, “The role of a priest is to proclaim the truth and suffer for the truth, and if necessary, even die for the truth.” And Fr. Popieluszko did just that. After giving sermons attracting thousands of fellow tormented Polish men and women oppressed by the communist regime while also giving hope to a nation of oppressed people, the four aforementioned men – Captain Grzegorz Piotrowski, Leszek PÄ™kala, Waldemar Chmielewski and Colonel Adam Pietruszka – were sent out by the Polish government to murder the humble and truth-telling priest. They did so, brutally murdering him on the 19th of October of 1984. Millions came to his funeral to remember the man who gave his life for the sake of bringing the truth – the condemning, harsh, and essential truth of the oppressive world in which they were living – to his Polish people. The world, approximately thirty years after his passing, has yet to forget the name of this messenger of the truth. The anniversary of the horrific death of this saintly man is coming up this October. There is even a documentary recently released accounting for his life and death entitled “Messenger of the Truth” (For more on the documentary, see here: http://www.messengerofthetruth.com/). And in spite of all that, there are still people trying to bring shame to not only this man but all others like him, who have died for the sake of freedom for a real security state. These men are none other than Edward Snowden and Glenn Greenwald. Snowden and Greenwald constantly cling to the excuse that they did all that they did in order to protect Americans from the government who was violating their rights, from a surveillance state. What they fail to see, or what they perhaps choose not to see, is what a real surveillance and security state is. What they are ignoring is the haunting tale of Fr. Popieluszko, of a man who gave his life in trying to put an end to the oppression of the real surveillance state. What they are blocking from their view is the image of the oppressed Polish men and women being beaten with lead-filled batons, being sprayed with water cannons, being beaten just because they sought the truth alongside Fr. Popieluszko. What they do nto want to understand is the sharp contrast between a real surveillance state and what they call a surveillance state in order to save their own skins, all the while the NSA is trying to protect its own citizens from the terrorist threat. What they do not see is the truth. May God bless Father Jerzy, may He allow him to rest in eternal peace, and may God shield his eyes from the shame that these men try to bring to him – the quintessence of God’s truth on Earth.

Sunday, June 1, 2014

Christian Love in Michael Haneke's Amour

“Love is patient, love is kind. It is not jealous, it is not pompous…” goes the ever-famous passage from 1 Corinthians (1 Cor 13:4). However, what this passage is commonly mistaken for is a description of romantic love – and is therefore used at myriad weddings – while in truth, this passage instead describes the sacrificial love Jesus modeled for all his Christian followers to emulate by virtue of his death on the cross. Both of these forms of love – though predominantly romantic love – have taken root in the world in many of its different aspects, including the entertainment industry. One film that stands out as a paragon of Christian, sacrificial love, and that film is Michael Haneke’s Amour. From beginning to end, through thick and thin, the faithful husband Georges shows steadfast love for his partially paralyzed and slowly dying wife Anne. One instance in which he shows this sacrificial love for Anne is constant throughout the whole film in the way that he is willing to sacrifice his own happiness for the sake of taking care of a deteriorating Anne. He had lived a great many years with Anne in without the plague of her illness, and so it was very difficult for him to continue taking care of her with the memory of the old Anne and the way things used to be in the back of his mind. He also faced difficulty when Anne would be reluctant to drink water or eat. Despite all the challenges he faced in his caretaking of Anne that were all mentally, emotionally, and physically taxing, he sacrificed his own mental, emotional, and physical state in order to care for his wife unto her death. A second instance of Georges love for Anne is when he promises and stays true to the promise he made to Anne to never send her back to the hospital or to a nursing home or hospice after she experienced her first surgery. While he could have made things easier for himself by transferring the burden of a dying Anne into someone else’s hands at a hospice or nursing home, he instead sacrificed his own happiness in order to keep his promise to Anne. Even the ending of the film, in which Georges smothers his Anne to death, can be reconciled with the Christian understanding of love in that he was doing this not out of hatred or selfishness but love. Some may view this as a selfish murder, saying that he smothered Anne to death because he selfishly wished to no longer endure the burden of a sickly wife. However, Georges did this out of profound love for Anne, for he wished no longer to see her suffer. He could have selfishly decided to try and keep her with him as long as possible, disregarding Anne’s suffering and caring only about his own wellbeing. Instead, however, Georges sacrificed prolonged time with the love of his life and therefore his own happiness in order to end Anne’s suffering. As is said in 1 Corinthians, love “does not seek its own interests” (1 Cor 13:5). Georges, all throughout Amour, even in smothering his own life, sacrificed his own interests for the sake of his wife’s. And that is what real Christian love is.

Saturday, May 31, 2014

PRI Podcast Recap: Even as Cyberwar Rages, We Can't Really Decide What Cyberwar Is

Cyber security, which may also be referred to as cyberwarfare, is now at the forefront of American controversy, so much so that in all the conflicting definitions thereof, it may be hard to find one clear definition. According to Rick Forno, director of the University of Maryland Baltimore County's Graduate Cybersecurity Program, "Generally speaking, cyberwarfare is using computers to attack other computers as a way of exercising your national power or supporting your foreign policy or your military strategy." Forno goes on to say that while cyberwarfare can begin with something paralleling the the U.S.'s "shock and awe" tactic, it may also be very stealthy or insidious, and it is hard for people to know sometimes that their computer and personal data are under a cyber attack until it is too late. Forno also discussed where the U.S. lands in the cyberwarfare battlefield. According to him, the U.S. is somewhat vulnerable in that regard, and the U.S. is more susceptible to being the victim of a cyber attack than to be the one initiating an attack. Additionally, Forno claims that the reason why people with the ability to do so have yet to go all out in cyber attacks is that the rule book has yet to be fully ascertained - some are unsure of what is okay and what is not in the realm of cyberwarfare. Fortunately, Forno also does not foresee what may be called a "cyberwarfare Armageddon."

NPR Podcast Recap: Think Internet Data Mining Goes Too Far? Then You Won't Like This

At the University of Washington, researchers are going beyond general fear regarding the mass surveillance programs of data collection - particularly of the collection of personal data. These researchers are taking on the fear of brain spying that has entered the world in light of new brain scanning software developments that have emerged recently. Companies as well as average individuals with a few extra hundred dollars lying around now have access to brain scanners - technically referred to as brain computer interfaces - that are a window into someone's mind. These brain scanners are essentially headgear that senses electrical patterns in the brain, and translates that message to provide an analysis of someone's emotions or state of mind. It can be used, for example, with video games. Thus, Howard Chizeck of the University of Washington and his team of researchers scrambled to congregated and are now trying to prevent this technology from falling into the hands of greedy businessmen who could use it to manipulate people into buying their products. The researchers conducted an experiment to display how this manipulation would work by using the sensor on someone while they played a video game that featured pop up ads. The gamer's reactions to the ads recorded by the sensor allows insight as to what the gamer likes. This is a tactic that business owners could use to target people with advertisements suited to the gamer's taste. Hopefully, Chizeck can prevent the concept of brain spying from full-on attacking the people of the world.

ENEMY OF THE STATE PART FIVE: REMEMBER WHO THE REAL ENEMY IS (PART ONE)

"Remember who the real enemy is." This statement made famous by Suzanne Collins, author of the Hunger Games trilogy, not only applies to the dystopian tyranny in the literary world of the Hunger Games, for it may also be applied to the Edward Snowden ordeal. Is the enemy the NSA, as Snowden and his supporters like Glenn Greenwald claim? Or is the NSA in the right, as they use their mass digital data collection to ward off what they would consider the real enemy: the terrorist threat? It has already been established that Edward Snowden is not exactly an enemy of the state as the Constitution’s definition of treason does not apply to what he has done. On the other hand, the Federalist Papers serve to condemn Snowden as an enemy of the people, despite his frequent claims that these rash decisions he made were in the interest of the American public. Is Snowden also an enemy of God? In answering this question, one must first look to the Bible for the definition of an enemy of God. One passage from the Bible that serves to define what an enemy of God looks like is James 4:1-17. In this passage, it is said that “Do you not know that friendship with the world is enmity with God? Therefore whoever wishes to be a friend of the world becomes an enemy of God… he gives all the more grace; therefore it says, ‘God opposes the proud, but gives grace to the humble.’ Submit yourselves therefore to God” (James 4:3-7). Snowden, by this definition, is most definitely an enemy of God. Snowden, through his actions, has not befriended or subscribed to the ways of God. Rather, he is a friend of the world, as he subscribes instead to the sinful ways of the world and of man. He lives to glorify himself, and as it is said, God opposes the proud. It is later said, “Humble yourselves before the Lord, and he will exalt you. Do not speak evil against one another, brothers and sisters. Whoever speaks evil against another or judges another, speaks evil against the law and judges the law; but if you judge the law, you are not a doer of the law but a judge. There is one lawgiver and judge who is able to save and to destroy. So who, then, are you to judge your neighbor?” (James 4:10-12). Edward Snowden is once again a clear opponent of God by means of this definition. Snowden took the fate of the United States as well as the law by which it lives into his own hands and forced his way in as the judge of the law. However, the only one with the authority to do such a thing is God. Snowden, thus, is an enemy of God, for he tried with all his might to be God. Edward Snowden, through his rash actions, took not only his life but the lives of others into his hands and tried to be God. This, therefore, makes Snowden not just an enemy of the people, but also an enemy of God. The Letter of James serves to condemn Edward Snowden and his actions as an enemy of God. There is also a second Bible passage that explains how Snowden’s actions go against what a Christian and true servant of the Lord God is to do, found in the Letter to the Romans. For it is said in Romans 12, “Bless those who persecute you; bless and do not curse them. Rejoice with those who rejoice, weep with those who weep. Live in harmony with one another; do not be haughty, but associate with the lowly; do not claim to be wiser than you are. Do not repay anyone evil for evil, but take thought for what is noble in the sight of all. If it is possible, so far as it depends on you, live peaceably with all… Do not be overcome by evil, but overcome evil with good” (Romans 12:14-18). Once again, for a host of reasons, Edward Snowden is not living his life as a servant to the Lord but rather as an enemy of God. Snowden certainly does not live by the guideline expressed in Romans 12, to “not claim to be wiser than you are” (Romans 12:16). He rather is often found singing his own praises, as he brags of his capabilities and power. For example, in an interview, he made note of what he considers a tremendous capacity for hacking as he said, "I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email.” Self-important boasters like Snowden are not true servants of God, but rather His enemy. Snowden’s tendency for arrogance as well as his many other qualities that violate the guidelines set in Romans 12 make him not one who overcomes evil with good, but rather one who was overcome with the evils and sinful tendencies of human nature, and, thus, an enemy of God. People like Edward Snowden and Glenn Greenwald who aggressively oppose the mass digital surveillance of the American public conducted by the NSA claim that the NSA clings to the terrorist threat as an invalid excuse for their actions that Greenwald considers to be unconstitutional violations of rights to privacy in particular. However, in light of a recent report by the Wilson Center, terrorism truly has taken to the digital world. For example, the report opens with a reference to one of many scenarios in which murders and injuries of Americans could have been prevented if suspicious online activity tying one to terrorist groups or ideals had been investigated and pursued. In this case, a man named Arid Uka killed two US servicemen and injured two others, and yet, this could have been prevented. In the report, it is said that “After he was arrested, investigators reviewed the history of Arid Uka’s Internet activity. It showed—most obviously in his Facebook profile—a growing interest in jihadist content, subsequent self-radicalization, and ultimately his viewing of the aforementioned video, which led him to take action in an alleged war in defense of Muslims…Arid Uka is a typical case of the new trend of terrorists being engaged through the newest online platforms, commonly known as the ‘new media’ or ‘social media.’” The report goes on to reference cyberterrorism expert Evan Kohlmann’s explanation of the turn of terrorists to social media, as he says, “Today, 90 percent of terrorist activity on the Internet takes place using social networking tools. . . .These forums act as a virtual firewall to help safeguard the identities of those who participate, and they offer subscribers a chance to make direct contact with terrorist representatives, to ask questions, and even to contribute and help out the cyberjihad.” Made evident in not only these passages but also all throughout the Wilson Center report (to read more of the Wilson Center report, see here: http://www.edline.net/files/_0bJTm_/414a430c9af41b733745a49013852ec4/STIP_140501_new_terrorism_F.pdf) terrorism is now largely present online, especially in social media. Thus, Snowden and his supporters like Greenwald are incorrect in their allegations that the NSA is using the terrorist threat as merely an excuse for their mass surveillance, and in Snowden’s release of the NSA documents, he was also handing this information over to the terrorists that now will most likely proceed to reconfigure their tactics and use of the Internet therein. In other words, Snowden and Greenwald have essentially put the American public in the hands of the terrorists that wish to harm them.

ENEMY OF THE STATE PART FIVE: THE REAL ENEMY

People like Edward Snowden and Glenn Greenwald who aggressively oppose the mass digital surveillance of the American public conducted by the NSA claim that the NSA clings to the terrorist threat as an invalid excuse for their actions that Greenwald considers to be unconstitutional violations of rights to privacy in particular. However, in light of a recent report by the Wilson Center, terrorism truly has taken to the digital world. For example, the report opens with a reference to one of many scenarios in which murders and injuries of Americans could have been prevented if suspicious online activity tying one to terrorist groups or ideals had been investigated and pursued. In this case, a man named Arid Uka killed two US servicemen and injured two others, and yet, this could have been prevented. In the report, it is said that “After he was arrested, investigators reviewed the history of Arid Uka’s Internet activity. It showed—most obviously in his Facebook profile—a growing interest in jihadist content, subsequent self-radicalization, and ultimately his viewing of the aforementioned video, which led him to take action in an alleged war in defense of Muslims…Arid Uka is a typical case of the new trend of terrorists being engaged through the newest online platforms, commonly known as the ‘new media’ or ‘social media.’” The report goes on to reference cyberterrorism expert Evan Kohlmann’s explanation of the turn of terrorists to social media, as he says, “Today, 90 percent of terrorist activity on the Internet takes place using social networking tools. . . .These forums act as a virtual firewall to help safeguard the identities of those who participate, and they offer subscribers a chance to make direct contact with terrorist representatives, to ask questions, and even to contribute and help out the cyberjihad.” Made evident in not only these passages but also all throughout the Wilson Center report (to read more of the Wilson Center report, see here: http://www.edline.net/files/_0bJTm_/414a430c9af41b733745a49013852ec4/STIP_140501_new_terrorism_F.pdf) terrorism is now largely present online, especially in social media. Thus, Snowden and his supporters like Greenwald are incorrect in their allegations that the NSA is using the terrorist threat as merely an excuse for their mass surveillance, and in Snowden’s release of the NSA documents, he was also handing this information over to the terrorists that now will most likely proceed to reconfigure their tactics and use of the Internet therein. In other words, Snowden and Greenwald have essentially put the American public in the hands of the terrorists that wish to harm them.

ENEMY OF THE STATE PART FIVE: THE ENEMY OF GOD (PART TWO)

The Letter of James serves to condemn Edward Snowden and his actions as an enemy of God. There is also a second Bible passage that explains how Snowden’s actions go against what a Christian and true servant of the Lord God is to do, found in the Letter to the Romans. For it is said in Romans 12, “Bless those who persecute you; bless and do not curse them. Rejoice with those who rejoice, weep with those who weep. Live in harmony with one another; do not be haughty, but associate with the lowly; do not claim to be wiser than you are. Do not repay anyone evil for evil, but take thought for what is noble in the sight of all. If it is possible, so far as it depends on you, live peaceably with all… Do not be overcome by evil, but overcome evil with good” (Romans 12:14-18). Once again, for a host of reasons, Edward Snowden is not living his life as a servant to the Lord but rather as an enemy of God. Snowden certainly does not live by the guideline expressed in Romans 12, to “not claim to be wiser than you are” (Romans 12:16). He rather is often found singing his own praises, as he brags of his capabilities and power. For example, in an interview, he made note of what he considers a tremendous capacity for hacking as he said, "I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email.” Self-important boasters like Snowden are not true servants of God, but rather His enemy. Snowden’s tendency for arrogance as well as his many other qualities that violate the guidelines set in Romans 12 make him not one who overcomes evil with good, but rather one who was overcome with the evils and sinful tendencies of human nature, and, thus, an enemy of God.

ENEMY OF THE STATE PART FIVE: THE ENEMY OF GOD (PART ONE)

It has already been established that Edward Snowden is not exactly an enemy of the state as the Constitution’s definition of treason does not apply to what he has done. On the other hand, the Federalist Papers serve to condemn Snowden as an enemy of the people, despite his frequent claims that these rash decisions he made were in the interest of the American public. Is Snowden also an enemy of God? In answering this question, one must first look to the Bible for the definition of an enemy of God. One passage from the Bible that serves to define what an enemy of God looks like is James 4:1-17. In this passage, it is said that “Do you not know that friendship with the world is enmity with God? Therefore whoever wishes to be a friend of the world becomes an enemy of God… he gives all the more grace; therefore it says, ‘God opposes the proud, but gives grace to the humble.’ Submit yourselves therefore to God” (James 4:3-7). Snowden, by this definition, is most definitely an enemy of God. Snowden, through his actions, has not befriended or subscribed to the ways of God. Rather, he is a friend of the world, as he subscribes instead to the sinful ways of the world and of man. He lives to glorify himself, and as it is said, God opposes the proud. It is later said, “Humble yourselves before the Lord, and he will exalt you. Do not speak evil against one another, brothers and sisters. Whoever speaks evil against another or judges another, speaks evil against the law and judges the law; but if you judge the law, you are not a doer of the law but a judge. There is one lawgiver and judge who is able to save and to destroy. So who, then, are you to judge your neighbor?” (James 4:10-12). Edward Snowden is once again a clear opponent of God by means of this definition. Snowden took the fate of the United States as well as the law by which it lives into his own hands and forced his way in as the judge of the law. However, the only one with the authority to do such a thing is God. Snowden, thus, is an enemy of God, for he tried with all his might to be God. Edward Snowden, through his rash actions, took not only his life but the lives of others into his hands and tried to be God. This, therefore, makes Snowden not just an enemy of the people, but also an enemy of God.

Monday, May 26, 2014

Fire and Ice: The World up in Flames

As Nobel Prize winner George Bernard Shaw once said in his novel Man and Superman, “There are two tragedies in life. One is not to get your heart's desire. The other is to get it.” As Shaw illustrates, desire is an injurious characteristic of man and an unfortunate aspect of life – it brings about tragedy no matter what, whether desires are unfulfilled or fulfilled. Robert Frost similarly commented on the adverse effects of desire, but on a much larger scale than merely life: Frost says in his poem Fire and Ice that the entire world shall end in “fire” – fire being a metaphorical representation of desire, while he also refers to “ice” or hatred as another possible cause of the end of the world. In a way, both Shaw and Frost are right. The end of the world will more likely be brought about by means of fire or desire than by ice or hatred, for desire has been the driving force behind all destruction to date. The destructive qualities of fire or desire may be seen in all the ways in which it wreaks havoc on the world today. Firstly, one of the many ways in which desire manifests its powers of destruction is through adultery – a sin that is brought about by desire and desire only. The destructive quality of this act always initiated by desire is noted in what many Christians consider one of the sets of guidelines for salvation: the Ten Commandments. God calls for man to avoid the desires fulfilled in adultery as he commands, “You shall not commit adultery” (Ex 20:14). In giving in to the desires of adultery, man is undermining God’s commands that are meant to guide man away from death and destruction and to heaven. Further evidence of the devastation of adultery is found when Jesus condemns not only those who commit adultery but also those who look lustfully at another woman. Jesus says, “‘You have heard that it was said, “You shall not commit adultery.” But I say to you, everyone who looks at a woman with lust has already committed adultery with her in his heart’” (Mt 5:27-28). Additionally, adultery also serves to destroy the basic social institution of man and tear at the fabric of mankind – the family. For it is said, “Those who trouble their household inherit the wind, and fools become slaves to the wise of heart” (Prv 29:11). Thus, when man allows the desire to partake in adultery overtake him, man is considered a fool for bringing about destruction to the family, the basic foundation of life. The damage that the desire that leads to adultery brings about to not only the adulterers’ hopes of salvation as well as their families parallels the destruction that desire may eventually bring to the world in its entirety. Moreover, a second way in which desire exhibits its destructive qualities is through the desire of man to fall to idolatry that exists in the world today – particularly in corporate America. First, the Ten Commandments, which act as a handbook for avoiding the destruction of the Earth and instead gaining favor with the Lord, calls out idolaters for desiring to follow another god as opposed to the one true God. God commands, “I am the LORD your God…You shall not have other gods beside me. You shall not make for yourself an idol…you shall not bow down before them or serve them” (Ex 20:2-5). Thus, when man desires to stray from God and take the easier path of worshipping a tangible and inanimate idol, that man is also straying from salvation and eternal life and heading rather in the direction of man’s destruction. The book of Hebrews delves deeper into the issue of man’s desire to worship other gods – specifically, the worship of money over God. It is said, “Let your life be free from love of money but be content with what you have, for he has said, ‘I will never forsake you or abandon you’” (Heb 13:5). Man is to not allow money to overpower him, for God is the true source of love and salvation. The consequences of the desire to idolize money rather than serve God is found in the First Letter to Timothy, when it is said that “Those who want to be rich are falling into temptation and into a trap and into many foolish and harmful desires, which plunge them into ruin and destruction” (1 Tm 6:9). This applies especially to modern-day corporate America in that many men part of the business world of the United States become enamored with money and constantly desire more and more. However, as stated in the First Letter to Timothy, this overpowering desire to idolize money will lead to the destruction of man. Furthermore, a third way in which desire displays its ill effects on the fate of mankind is through the desire of power, particularly in a governmental, tyrannical setting. First, the Letter to the Romans contains the limits of the power of man. For it is said, “Let every person be subordinate to the higher authorities, for there is no authority except from God, and those that exist have been established by God” (Rom 13:1). Therefore, man should not allow the desire for all-encompassing power to overcome him as only God is meant to have that kind of authority. The foolishness of those who desire power and exercise tyrannical rule over others is further expressed in Proverbs 28, when it is said that “The less prudent the rulers, the more oppressive their deeds. Those who hate ill-gotten gain prolong their days” (Prv 28:16). The ultimate punishment God administers to cruel leaders who desire power over anything appears in the story of the just shepherd. God says, “Woe to the shepherds who destroy and scatter the flock of my pasture – oracle of the LORD. Therefore, thus says the LORD…against the shepherds who shepherd my people…You have not cared for them, but I will take care to punish your evil deeds” (Jer 23:1-2). God indicates that there shall be destruction for all shepherds who mislead his sheep – or, in other words, all leaders who oppress his people. As Robert Frost said in his poem Fire and Ice, many people may claim that ice, the metaphorical representation of hate, is predominantly responsible for destruction in the past and destruction yet to come at the end of the world while fire or desire falls second thereto. They may justify this claim saying that hate is ever present in the worst moments in history – perhaps using the Holocaust as an example where hatred was the domineering force that led to the horrors and crimes against humanity that occurred within that expanse of time. However, though hatred did play its part in the horrors in all the history of the world, desire was what fueled that hatred as well as, in many instances, what lead to that hatred. Would hatred even exist without desire? It seems as though the answer is no. For example, Hitler’s desire for power and for his ideal Aryan race to rule the world was what led to his cruel and evil acts of pure hatred against the Jewish people. If not for this desire for power, he may have never advanced to hatred and the massacre of the Jews. As illustrated by showcases of destruction in the not only in the past and but also in the present, George Bernard Shaw and Robert Frost were correct in pinning the tragedies of life as well as the eventual destruction of all mankind on fire or desire. Desire – the driving force behind all instances of destruction in the world – is much more likely to bring about the destruction of the world than hatred. In more metaphorical terms, fire – not ice – will be the one to engulf the world in its flames and bring about its destruction.

Sunday, May 25, 2014

ENEMY OF THE STATE PART FOUR: THE HACKING SIDE OF THINGS

What role does hacking play in the national security and Snowden ordeal? What does hacking look like from an international and domestic standpoint? What justifies - or does not justify - hacking? First, take a look at how the United States is attempting to condemn other hackers, while the only hackers currently in sight are in the United States. The espionage spotlight has recently shifted from Edward Snowden to the Chinese hackers recently charged for "cyber espionage" as the FBI documentation states – and that is also how the journalists frame it. Is the acts of espionage committed by these Chinese men, however, what this is really about? In the FBI documentation of the Chinese hackers' crimes, it alleges that Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui – the five members of the Chinese military accused of these crimes – not only engaged in computer hacking, but also in a sort of economic espionage by stealing U.S. trade secrets in order to benefit Chinese corporations. Also within these documents is a chart indicating the charges against the five Chinese hackers and the sections of the U.S. Code that correspond to the charges. The prominent statute that acted as grounds for several of the charges was found in section 1030 of the U.S. Code, called "Fraud and related activity in connection with computers". However, also within this section of the U.S. Code is a series of accusations that not only apply to the Chinese hackers but also the recent actions of the United States. For example, “Whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) [1] of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.)… [or] information from any protected computer…” Is that not similar to, if not exactly what the NSA does to American citizens? Furthermore, it seems as though that this is all an attempt to veer the world’s focuses from the United States and their unconstitutional actions of what may essentially be referred to as computer hacking to another country all the way across the globe, despite the fact that the counts against the five Chinese “computer hackers” are not likely to ever be debated in a courtroom and are not even legitimate. One thing that reduces the credibility of these charges is the many suspicious coincidences – that may not actually be coincidences at all – that may be found within the FBI documentation. One thing to note is that the documentation was released by the Pittsburgh division of the FBI. Also, the victims of the Chinese hackers such as Westinghouse were companies that deal with steel as well as energy – particularly, in Westinghouse’s cases, nuclear energy. Though these may seem like small, irrelevant details, they are most definitely not, due to the one thing they have in common: Representative Tim Murphy. What exactly does this member of the House of Representatives have to do with the indictment of these Chinese men? Representative Tim Murphy seems to be in pretty deep with both Westinghouse and several American steel corporations, as he is, for one, the Congressional Steel Caucus Chairman. In fact, he commented on the Chinese hackers’ indictment recently, saying, “This indictment proves we’re losing manufacturing jobs not because the US stopped making great products, but because the Chinese government is stealing ideas, inventions, and intellectual property straight out of Western Pennsylvania,” said Rep. Murphy. “The Chinese government hacked into our computers, stolen business blueprints, erected trade barriers, and manipulated currency markets all to give state-owned enterprises an unfair and illegal advantage against American competitors.” He expresses clear allegiance with the American steel companies while denouncing the Chinese hackers. Also, Representative Murphy has strong ties to Westinghouse, as he recently backed the global company’s loans. In addition, Representative Murphy represents the 18th district of Pennsylvania in the House, the very state from which the FBI indicted the five Chinese men. There is too great a number of connections between Representative Murphy and this indictment to be considered mere coincidences. In conclusion, something just does not add up in regard to these charges against the five Chinese men. There is much more to this story than there seems to be, and it may very well be a cover up to shine the spotlight of unauthorized surveillance and hacking on anyone aside from the NSA. What do the u.S.'s most prized publications have to say about hacking, and the justification thereof? John Stuart Mill’s publication On Liberty which is held by many Americans in the highest of regards contains an entire chapter that may be applied to the NSA’s methods of surveillance that have recently emerged at the forefront of American controversy – chapter four, entitled “Of the Limits to the Authority of Society over the Individual”. Within this chapter one may find text that supports the claims of the opponents of the NSA, such as Glenn Greenwald. One such excerpt that Greenwald and those with similar views to him could use to support their arguments is when Mill says, “What I contend for is, that the inconveniences which are strictly inseparable from the unfavorable judgment of others, are the only ones to which a person should ever be subjected for that portion of his conduct and character which concerns his own good, but which does not affect the interests of others in their relations with him.” Essentially, what Mill means in that passage from On Liberty is that only the person in question engaging in activities that are harmful to society should be held accountable, and that anyone connected to the person in question should not be dragged into the person in question’s accountability. This can be applied to the situation with NSA surveillance in that this statement would serve to condemn the NSA’s mass surveillance and method of monitoring suspicious persons in that the NSA – after detecting suspicious activity coming from a single person – not only begins to investigate the person of interest but also proceeds to connect the dots between the person of interest and all people in relation therewith. This, according to the aforementioned claim of Mill, is where the NSA is crossing the line, for it is only justifiable to monitor the actions of the person of interest and rather unjust to drag others into it. This excerpt from On Liberty serves to give one possible answer to the ever important question: What are, or what should be, the limits of the NSA? John Stuart Mill’s publication On Liberty not only contains what may be described as Greenwald’s sentence, but also former head of the NSA General Michael Hayden’s sentence. Mill follows Greenwald’s sentence directly with Hayden’s, as he says, “Acts injurious to others require a totally different treatment.” Mill elaborates upon that statement by defining the injurious acts in saying, “Encroachment on their rights; infliction on them of any loss or damage not justified by his own rights; falsehood or duplicity in dealing with them; unfair or ungenerous use of advantages over them; even selfish abstinence from defending them against injury — these are fit objects of moral reprobation, and, in grave cases, of moral retribution and punishment. And not only these acts, but the dispositions which lead to them, are properly immoral, and fit subjects of disapprobation which may rise to abhorrence.” What Mill means this time is that though, as Greenwald believes, only the persons of interest require special attention and that no one in relation to them should be similarly monitored, when the actions of the person of interest include harming other people, that opens the door to more desperate measures. He also provides a definition of what exactly these “acts injurious to others” entails. Thus, it seems as though Mill’s On Liberty serves neither to favor people like General Hayden who support the NSA or people like Glenn Greenwald who rather oppose the NSA. This is the case because when Mill states support for Greenwald in condemning the methods of connecting the dots that the NSA carry out when investigating persons of interest, he immediately follows it with what the exception to this is, and the exception is when people are engaging in acts that are detrimental to society. Thus, Mill does not support either extreme – no method of surveillance for the sake of national security nor the indiscriminant metadata method of surveillance – but rather a happy medium. Mill calls for neither an indiscriminant nor nonexistent NSA, but instead for an ideal NSA that does not collect all but only makes exceptions and connects dots between people when a real threat to the American public is present. In conclusion, John Stuart Mill’s On Liberty only goes to show that neither extreme is justifiable, and that a compromise must be reached in order to uphold both the rights of citizens and national security.

ENEMY OF THE STATE PART FOUR: ON LIBERTY…AND RIGHTFUL HACKING

John Stuart Mill’s publication On Liberty not only contains what may be described as Greenwald’s sentence, but also former head of the NSA General Michael Hayden’s sentence. Mill follows Greenwald’s sentence directly with Hayden’s, as he says, “Acts injurious to others require a totally different treatment.” Mill elaborates upon that statement by defining the injurious acts in saying, “Encroachment on their rights; infliction on them of any loss or damage not justified by his own rights; falsehood or duplicity in dealing with them; unfair or ungenerous use of advantages over them; even selfish abstinence from defending them against injury — these are fit objects of moral reprobation, and, in grave cases, of moral retribution and punishment. And not only these acts, but the dispositions which lead to them, are properly immoral, and fit subjects of disapprobation which may rise to abhorrence.” What Mill means this time is that though, as Greenwald believes, only the persons of interest require special attention and that no one in relation to them should be similarly monitored, when the actions of the person of interest include harming other people, that opens the door to more desperate measures. He also provides a definition of what exactly these “acts injurious to others” entails. Thus, it seems as though Mill’s On Liberty serves neither to favor people like General Hayden who support the NSA or people like Glenn Greenwald who rather oppose the NSA. This is the case because when Mill states support for Greenwald in condemning the methods of connecting the dots that the NSA carry out when investigating persons of interest, he immediately follows it with what the exception to this is, and the exception is when people are engaging in acts that are detrimental to society. Thus, Mill does not support either extreme – no method of surveillance for the sake of national security nor the indiscriminant metadata method of surveillance – but rather a happy medium. Mill calls for neither an indiscriminant nor nonexistent NSA, but instead for an ideal NSA that does not collect all but only makes exceptions and connects dots between people when a real threat to the American public is present. In conclusion, John Stuart Mill’s On Liberty only goes to show that neither extreme is justifiable, and that a compromise must be reached in order to uphold both the rights of citizens and national security.

ENEMY OF THE STATE PART FOUR: ON LIBERTY…AND UNJUST HACKING

John Stuart Mill’s publication On Liberty which is held by many Americans in the highest of regards contains an entire chapter that may be applied to the NSA’s methods of surveillance that have recently emerged at the forefront of American controversy – chapter four, entitled “Of the Limits to the Authority of Society over the Individual”. Within this chapter one may find text that supports the claims of the opponents of the NSA, such as Glenn Greenwald. One such excerpt that Greenwald and those with similar views to him could use to support their arguments is when Mill says, “What I contend for is, that the inconveniences which are strictly inseparable from the unfavorable judgment of others, are the only ones to which a person should ever be subjected for that portion of his conduct and character which concerns his own good, but which does not affect the interests of others in their relations with him.” Essentially, what Mill means in that passage from On Liberty is that only the person in question engaging in activities that are harmful to society should be held accountable, and that anyone connected to the person in question should not be dragged into the person in question’s accountability. This can be applied to the situation with NSA surveillance in that this statement would serve to condemn the NSA’s mass surveillance and method of monitoring suspicious persons in that the NSA – after detecting suspicious activity coming from a single person – not only begins to investigate the person of interest but also proceeds to connect the dots between the person of interest and all people in relation therewith. This, according to the aforementioned claim of Mill, is where the NSA is crossing the line, for it is only justifiable to monitor the actions of the person of interest and rather unjust to drag others into it. This excerpt from On Liberty serves to give one possible answer to the ever important question: What are, or what should be, the limits of the NSA?

ENEMY OF THE STATE PART FOUR: AMERICAN HACKING

Hacking also has a fruitful existence is the United States alone as it has a multifaceted hacking scene, with not only domestic hacking but also international hacking, predominantly facilitated by none other than the NSA. There has been recent activity in the realm of domestic hacking in America, according to recent reports from the Department of Homeland Security. In light of a recent report given by DHS of yet another attack by, according to Reuters, “A sophisticated hacking group” that “recently attacked a U.S. public utility and compromised its control system network”, DHS came to the conclusion devices that interface with the Internet have been a source of concern for them lately. In fact, according to Reuters, “Last year ICS-CERT [DHS’s Industrial Control Systems Cyber Emergency Response Team] responded to 256 cyber incident reports, more than half of them in the energy sector…that is nearly double the agency's 2012 case load…” Evidently, hacking does not only happen country to country – it happens domestically in America quite frequently. The much deeper story with the much deeper corresponding questions is located rather within the concept of international hacking. For example, in David E. Sanger of The New York Times’ article “Fine Line Seen in U.S. Spying on Companies”, the global controversy raised by the NSA’s international hacking and spying. Though U.S. officials argue in favor of the NSA’s international hacking and spying, claiming that “it routinely spies to advance American economic advantage, which is part of its broad definition of how it protects American national security.” However, this also helps fuel the China’s argument that the U.S. had no right to indict the five Chinese hackers, for the U.S. is acting quite hypocritical in that sense. “Now, every one of the examples of N.S.A. spying on corporations around the world is becoming Exhibit A in China’s argument that by indicting five members of the People’s Liberation Army, the Obama administration is giving new meaning to capitalistic hypocrisy. In the Chinese view, the United States has designed its own system of rules about what constitutes ‘legal’ spying and what is illegal.” A recent RAND report entitled “Markets for Cybercrime Tools and Stolen Data”, the question of the legitimacy of businesses is a consistent topic. One method of determining legitimacy is suggested when they say, “As with most things, intent is what can make something criminal or legitimate, and there are cases where goods or services can be used for altruistic or malicious purposes…” This, however, may also be applied to hacking. Thus, the U.S. government must ask itself these questions and analyze their national relations with this concept from the RAND report in mind. The integrity of the land of the free and the home of the brave is at stake.

ENEMY OF THE STATE PART FOUR: THE SPOTLIGHT SHIFTS

The espionage spotlight has recently shifted from Edward Snowden to the Chinese hackers recently charged for "cyber espionage" as the FBI documentation states – and that is also how the journalists frame it. Is the acts of espionage committed by these Chinese men, however, what this is really about? In the FBI documentation of the Chinese hackers' crimes, it alleges that Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui – the five members of the Chinese military accused of these crimes – not only engaged in computer hacking, but also in a sort of economic espionage by stealing U.S. trade secrets in order to benefit Chinese corporations. Also within these documents is a chart indicating the charges against the five Chinese hackers and the sections of the U.S. Code that correspond to the charges. The prominent statute that acted as grounds for several of the charges was found in section 1030 of the U.S. Code, called "Fraud and related activity in connection with computers". However, also within this section of the U.S. Code is a series of accusations that not only apply to the Chinese hackers but also the recent actions of the United States. For example, “Whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) [1] of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.)… [or] information from any protected computer…” Is that not similar to, if not exactly what the NSA does to American citizens? Furthermore, it seems as though that this is all an attempt to veer the world’s focuses from the United States and their unconstitutional actions of what may essentially be referred to as computer hacking to another country all the way across the globe, despite the fact that the counts against the five Chinese “computer hackers” are not likely to ever be debated in a courtroom and are not even legitimate. One thing that reduces the credibility of these charges is the many suspicious coincidences – that may not actually be coincidences at all – that may be found within the FBI documentation. One thing to note is that the documentation was released by the Pittsburgh division of the FBI. Also, the victims of the Chinese hackers such as Westinghouse were companies that deal with steel as well as energy – particularly, in Westinghouse’s cases, nuclear energy. Though these may seem like small, irrelevant details, they are most definitely not, due to the one thing they have in common: Representative Tim Murphy. What exactly does this member of the House of Representatives have to do with the indictment of these Chinese men? Representative Tim Murphy seems to be in pretty deep with both Westinghouse and several American steel corporations, as he is, for one, the Congressional Steel Caucus Chairman. In fact, he commented on the Chinese hackers’ indictment recently, saying, “This indictment proves we’re losing manufacturing jobs not because the US stopped making great products, but because the Chinese government is stealing ideas, inventions, and intellectual property straight out of Western Pennsylvania,” said Rep. Murphy. “The Chinese government hacked into our computers, stolen business blueprints, erected trade barriers, and manipulated currency markets all to give state-owned enterprises an unfair and illegal advantage against American competitors.” He expresses clear allegiance with the American steel companies while denouncing the Chinese hackers. Also, Representative Murphy has strong ties to Westinghouse, as he recently backed the global company’s loans. In addition, Representative Murphy represents the 18th district of Pennsylvania in the House, the very state from which the FBI indicted the five Chinese men. There is too great a number of connections between Representative Murphy and this indictment to be considered mere coincidences. In conclusion, something just does not add up in regard to these charges against the five Chinese men. There is much more to this story than there seems to be, and it may very well be a cover up to shine the spotlight of unauthorized surveillance and hacking on anyone aside from the NSA.

Cato Institute Podcast Recap: No Place to Hide

General Keith Alexander once said, in argument that supports the current state of the NSA, that no Internet based conversation could ever go uncollected. Though the United States government tried to shoo Americans from this comment claiming that it was an offhand remark perhaps even stated in jest, according to Glenn Greenwald,this is in reality what the NSA sees as its mission. Though they claim that it is limited to persons of interests, Greenwald is convinced that it is aggressive and indiscriminant - and this is one of the focuses of Greenwald's new book, No Place to Hide. Furthermore, on the matter of the government's justification of what information and data is regarded relevant enough for collection, Greenwald says that those in power will constantly cross the line of privacy more and more until encroachment becomes the norm as it has no punishment or limiting factor. Greenwald has little good to say about the NSA while he instead holds the NSA accountable for crossing many lines in regards to citizens' rights to privacy. (For more of Greenwald's interview with the Cato Institute, use this link: https://www.youtube.com/watch?v=ApY7MVeoldo)

Cato Institute Podcast Recap: The Burglary (Part 1)

In his time, J. Edgar Hoover was very popular amongst the American people - very well-liked, and, according to a poll, even more so than some presidents. In 1924, he was appointed as the Director of the FBI at the age of 29, and he served in that position for half a century. At the time when Hoover held his position as Director of the FBI, there were, unlike today, there was absolutely no supervision of the institution's activity. Thus, there were very few government officials who suspected anything of the secret FBI Hoover was leading. This freedom brought about by the lack of oversight of Hoover's actions was what allowed him to abuse his power in his governing of COINTELPRO. However, the night of March 8th, 1971, everything changed. A group referred to as the Citizens' Commission to Investigate the FBI broke into the an FBI office as a result of suspicion of Hoover's suppression of dissent and in pursuit of evidence against Hoover. Citizens took a stand against the suppression of one of the most powerful figures of governmental authority in the United States at the time, and embarked upon what may be referred to as "old school hacking".

Saturday, May 24, 2014

ENEMY OF THE STATE PART THREE: THE SNOWDEN FAULT LINE

Edward Snowden, with his uncovering of several of the NSA's secret documents, left a fault line is his wake - with some people on one side, some on the other, and some right in the middle. See how Snowden's actions have affected citizens, journalists, even entire countries in causing sharp divisions among people once united. In regard to two extremes – forgetting everything and remembering everything – it is safe to say that the NSA is on the side of the spectrum that recalls all. In a sense, the NSA never forgets: details of and connections between the past and present are constantly scrutinized and analyzed by NSA officials as a means for detecting suspicious activities that threaten the safety of U.S. citizens. So what, then, falls on the opposite side of this spectrum? As of a recent court hearing, it seems as though Google would be on the opposite end in that it is an entity that now has the capability to forget all – in Europe, at least. In a press release by the Court of Justice of the European Union, it discusses the court’s decision that allows people to request that search engine’s disallow certain links to show up when their name is searched. For example, it says in the document, “An internet search engine operator is responsible for the processing that it carries out of personal data which appear on web pages published by third parties…Thus, if, following a search made on the basis of a person’s name, the list of results displays a link to a web page which contains information on the person in question, that data subject may approach the operator directly and, where the operator does not grant his request, bring the matter before the competent authorities in order to obtain, under certain conditions, the removal of that link from the list of results.” This essentially grants people with the right to be forgotten, or to have whatever information they should like removed at will. Though this may have a few positive attributes, it also has several negative. For example, it could eliminate the important aspect of consequence from a world so in need of its governing powers. Consequences are what ultimately prevent people from choosing to do the wrong thing – and when people do choose the wrong thing, consequences prevent people from making those choices again. However, in a world where all the wrongdoers and criminals can have the negative aftermath of their actions in their hands and are able to erase information regarding their wrongdoings from the Internet that allows them to break free of the consequences of their actions. To put this into the context of everyday life, imagine what would happen if one of these wrongdoers was running for office. The average American does not have the time to sift through the archives when researching each candidate for office, and most people think a quick Google check of the person will suffice. What if one campaigner had had a criminal record, but asked for it to be removed from Google search results? Disaster and further governmental turmoil could result. These two extremes – the all-remembering NSA and the all-forgetting Google – bring up several important questions. How do both of these methods affect the exercising of the right of free speech? According to the Stanford Law Review, many have belittled the effects of the recent allowance of the right to be forgotten’s effect on free speech while in reality, it has an enormous and negative effect on free speech. For example, in the review, they say, ““…the European Commissioner for Justice, Fundamental Rights, and Citizenship, Viviane Reding, announced the European Commission’s proposal to create a sweeping new privacy right—the ‘right to be forgotten’… Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade.” They go on to further express the harmful effects of this new concept on free speech, saying, “Unless the right is defined more precisely when it is promulgated over the next year or so, it could precipitate a dramatic clash between European and American conceptions of the proper balance between privacy and free speech, leading to a far less open Internet.” Also, does either of these methods work, or is there a happy medium that must be reached for the sake of the United States and national security? Who should make that decision? That is something that only time shall serve to tell. The Court of Justice of the European Union has made their opinion clear on the question of freedom of speech as well as the right to be forgotten – two things with a significant impact on national security. The opinion of the American journalism community regarding national security was also made evident recently in their awarding of the Pulitzer Prize to The Washington Post and The Guardian for their coverage of Edward Snowden’s NSA leaks. What has the American public got to say on the topic of national security? According to a recent study conducted by the Pew Research Center, “…the [American] public remains divided over whether those classified leaks [by Edward Snowden] served the public interest.” This sharp division is especially seen in the age 18-29 demographic in regard to whether Snowden should be tried by the U.S. government, as 42% within that age group said that Snowden should be tried while 42% said that he should not. Another pattern that emerged in the data from both a poll regarding whether or not Snowden’s leaks had served the public interest as well as a poll on whether or not the U.S. government should pursue a criminal case against Snowden that also serves to demonstrate the divide amongst the Americans on the Snowden controversy is the factor of age. On average, as the age demographics polled got increasingly older, the more likely they were to have a negative attitude towards Snowden – saying that his actions harmed the public interest and hoping that the government pursues a criminal case against Snowden. Thus, the younger age demographics were more torn in regards to their opinions of Snowden. This clear difference in opinion between the younger and older generations on Edward Snowden’s actions – with the older generations firmer in their negative opinions of Snowden and the younger generations either more conflicted or positive in their opinions of Snowden – can lead to even more issues in the United States. As Abraham Lincoln once famously said in a time long ago of controversy in the United States, “A house divided against itself cannot stand.” This may very well reflect the current day and age in which the American public is, once again, divided against itself regarding another controversy – this time, however, the controversy is on national security and the Edward Snowden ordeal. There is division between countries on the matter of free speech and its ties to national security. There is division between American citizens regarding Edward Snowden and his ties to national security. This division on matters of national security also extend to the fourth estate, or the world of journalism. This division has come to light recently with the release of Glenn Greenwald’s book No Place to Hide in which he details the Snowden ordeal as well as condemns the unjust methods of the NSA, as journalists take opposing sides – some acclaiming Greenwald and his book, others tearing not only the book but Greenwald apart, still others in the middle. One journalist who acclaimed Greenwald’s book while she also holds many views similar to those of Greenwald is Emily Bazelon of the Slate Book Review. In her article “Why Are You So Fearful, O Ye of Little Faith?”, she gave a summary of the highlights of the book followed by her concurrence with Greenwald’s view as well as concluding remarks in praise and in defense of Greenwald against his many critics. This is evident when Bazelon says, “Surely skeptics will argue that Greenwald is too close to his source to be trusted, but I don’t think so. I think he is vouching for Snowden because he vetted him and he knows him. Last summer the journalist and the whistleblower took a huge and risky plunge together, along with Poitras and Gellman. Now Greenwald is coming up for air and, with this incisive, slashing book, reaping the benefits of being adventuresome, dogged—and, as far as the evidence shows, right.” On the other hand, a journalist who certainly does not side with either Greenwald nor Bazelon based on his review of No Place to Hide is David Cole of the Washington Post. In his article “‘No Place to Hide’ by Glenn Greenwald, on the NSA’s sweeping efforts to ‘Know it All’”, Cole summarizes Greenwald’s negative claims about the NSA’s activities and proceeds to critique what he considered to be the many flaws of Greenwald’s book. For instance, Cole claims many of Greenwald’s analyses of the NSA to be either misleading or overly exaggerated. Cole expresses his criticism of Greenwald’s mistake of making too many hyperbolic statements, saying, “Such overstatement weakens Greenwald’s credibility, which is unfortunate, because much of what he has to say is extremely valuable.” He elaborates upon this major error of Greenwald’s book as he says, “Part of the problem is that Greenwald sees the world in black and white. As he puts it, ‘There are, broadly speaking, two choices: obedience to institutional authority or radical dissent from it.’ For him there is apparently nothing in between. Anyone who does not share his radical dissent is, therefore, a tool for the political elite.” Though Cole does appreciate Greenwald’s creation of a book on such an important topic, he disapproves of his tendency to overstate. An additional journalist that seems to be in the middle – as he appreciates some aspects of the book and criticizes other parts – is Michiko Kakutani of The New York Times. In his article entitled “Snowden’s Story, Behind the Scenes”, after summarizing Greenwald’s account of the Snowden ordeal, he makes claims both praising Greenwald’s book and disapproving of it. For example, he commends Greenwald for his strong arguments in favor of the right of privacy as he says, “When Mr. Greenwald turns his fervor to the issue of surveillance and its implications for ordinary citizens’ civil liberties, he is far more credible. Sometimes eloquent…And he delivers a fierce argument in defense of the right of privacy.” However, Kakutani also manages to slip in some objection to Greenwald’s downfall in his extreme overgeneralizations and exaggerations (the same critique David Cole made) when he claims, “many of Mr. Greenwald’s gross generalizations about the establishment media do a terrible disservice to the many tenacious investigative reporters who have broken important stories on some of the very subjects like the war on terror and executive power that Mr. Greenwald feels so strongly about.” Made evident by merely three of a multitude of reviews of No Place to Hide, there is a large variance of opinions on Edward Snowden and national security amongst journalists, causing further division within the United States.

ENEMY OF THE STATE PART THREE: ANOTHER DIVISION

There is division between countries on the matter of free speech and its ties to national security. There is division between American citizens regarding Edward Snowden and his ties to national security. This division on matters of national security also extend to the fourth estate, or the world of journalism. This division has come to light recently with the release of Glenn Greenwald’s book No Place to Hide in which he details the Snowden ordeal as well as condemns the unjust methods of the NSA, as journalists take opposing sides – some acclaiming Greenwald and his book, others tearing not only the book but Greenwald apart, still others in the middle. One journalist who acclaimed Greenwald’s book while she also holds many views similar to those of Greenwald is Emily Bazelon of the Slate Book Review. In her article “Why Are You So Fearful, O Ye of Little Faith?”, she gave a summary of the highlights of the book followed by her concurrence with Greenwald’s view as well as concluding remarks in praise and in defense of Greenwald against his many critics. This is evident when Bazelon says, “Surely skeptics will argue that Greenwald is too close to his source to be trusted, but I don’t think so. I think he is vouching for Snowden because he vetted him and he knows him. Last summer the journalist and the whistleblower took a huge and risky plunge together, along with Poitras and Gellman. Now Greenwald is coming up for air and, with this incisive, slashing book, reaping the benefits of being adventuresome, dogged—and, as far as the evidence shows, right.” On the other hand, a journalist who certainly does not side with either Greenwald nor Bazelon based on his review of No Place to Hide is David Cole of the Washington Post. In his article “‘No Place to Hide’ by Glenn Greenwald, on the NSA’s sweeping efforts to ‘Know it All’”, Cole summarizes Greenwald’s negative claims about the NSA’s activities and proceeds to critique what he considered to be the many flaws of Greenwald’s book. For instance, Cole claims many of Greenwald’s analyses of the NSA to be either misleading or overly exaggerated. Cole expresses his criticism of Greenwald’s mistake of making too many hyperbolic statements, saying, “Such overstatement weakens Greenwald’s credibility, which is unfortunate, because much of what he has to say is extremely valuable.” He elaborates upon this major error of Greenwald’s book as he says, “Part of the problem is that Greenwald sees the world in black and white. As he puts it, ‘There are, broadly speaking, two choices: obedience to institutional authority or radical dissent from it.’ For him there is apparently nothing in between. Anyone who does not share his radical dissent is, therefore, a tool for the political elite.” Though Cole does appreciate Greenwald’s creation of a book on such an important topic, he disapproves of his tendency to overstate. An additional journalist that seems to be in the middle – as he appreciates some aspects of the book and criticizes other parts – is Michiko Kakutani of The New York Times. In his article entitled “Snowden’s Story, Behind the Scenes”, after summarizing Greenwald’s account of the Snowden ordeal, he makes claims both praising Greenwald’s book and disapproving of it. For example, he commends Greenwald for his strong arguments in favor of the right of privacy as he says, “When Mr. Greenwald turns his fervor to the issue of surveillance and its implications for ordinary citizens’ civil liberties, he is far more credible. Sometimes eloquent…And he delivers a fierce argument in defense of the right of privacy.” However, Kakutani also manages to slip in some objection to Greenwald’s downfall in his extreme overgeneralizations and exaggerations (the same critique David Cole made) when he claims, “many of Mr. Greenwald’s gross generalizations about the establishment media do a terrible disservice to the many tenacious investigative reporters who have broken important stories on some of the very subjects like the war on terror and executive power that Mr. Greenwald feels so strongly about.” Made evident by merely three of a multitude of reviews of No Place to Hide, there is a large variance of opinions on Edward Snowden and national security amongst journalists, causing further division within the United States.

ENEMY OF THE STATE PART THREE: A HOUSE DIVIDED

The Court of Justice of the European Union has made their opinion clear on the question of freedom of speech as well as the right to be forgotten – two things with a significant impact on national security. The opinion of the American journalism community regarding national security was also made evident recently in their awarding of the Pulitzer Prize to The Washington Post and The Guardian for their coverage of Edward Snowden’s NSA leaks. What has the American public got to say on the topic of national security? According to a recent study conducted by the Pew Research Center, “…the [American] public remains divided over whether those classified leaks [by Edward Snowden] served the public interest.” This sharp division is especially seen in the age 18-29 demographic in regard to whether Snowden should be tried by the U.S. government, as 42% within that age group said that Snowden should be tried while 42% said that he should not. Another pattern that emerged in the data from both a poll regarding whether or not Snowden’s leaks had served the public interest as well as a poll on whether or not the U.S. government should pursue a criminal case against Snowden that also serves to demonstrate the divide amongst the Americans on the Snowden controversy is the factor of age. On average, as the age demographics polled got increasingly older, the more likely they were to have a negative attitude towards Snowden – saying that his actions harmed the public interest and hoping that the government pursues a criminal case against Snowden. Thus, the younger age demographics were more torn in regards to their opinions of Snowden. This clear difference in opinion between the younger and older generations on Edward Snowden’s actions – with the older generations firmer in their negative opinions of Snowden and the younger generations either more conflicted or positive in their opinions of Snowden – can lead to even more issues in the United States. As Abraham Lincoln once famously said in a time long ago of controversy in the United States, “A house divided against itself cannot stand.” This may very well reflect the current day and age in which the American public is, once again, divided against itself regarding another controversy – this time, however, the controversy is on national security and the Edward Snowden ordeal. (For more on Pew Research’s analysis of the American public’s opinion regarding Edward Snowden’s leaks, see here: http://www.pewresearch.org/fact-tank/2014/04/15/nsa-coverage-wins-pulitzer-but-americans-remain-divided-on-snowden-leaks/)

ENEMY OF THE STATE PART THREE: WHAT’S GOOGLE GOT TO DO WITH IT?

In regard to two extremes – forgetting everything and remembering everything – it is safe to say that the NSA is on the side of the spectrum that recalls all. In a sense, the NSA never forgets: details of and connections between the past and present are constantly scrutinized and analyzed by NSA officials as a means for detecting suspicious activities that threaten the safety of U.S. citizens. So what, then, falls on the opposite side of this spectrum? As of a recent court hearing, it seems as though Google would be on the opposite end in that it is an entity that now has the capability to forget all – in Europe, at least. In a press release by the Court of Justice of the European Union, it discusses the court’s decision that allows people to request that search engine’s disallow certain links to show up when their name is searched. For example, it says in the document, “An internet search engine operator is responsible for the processing that it carries out of personal data which appear on web pages published by third parties…Thus, if, following a search made on the basis of a person’s name, the list of results displays a link to a web page which contains information on the person in question, that data subject may approach the operator directly and, where the operator does not grant his request, bring the matter before the competent authorities in order to obtain, under certain conditions, the removal of that link from the list of results.” This essentially grants people with the right to be forgotten, or to have whatever information they should like removed at will. Though this may have a few positive attributes, it also has several negative. For example, it could eliminate the important aspect of consequence from a world so in need of its governing powers. Consequences are what ultimately prevent people from choosing to do the wrong thing – and when people do choose the wrong thing, consequences prevent people from making those choices again. However, in a world where all the wrongdoers and criminals can have the negative aftermath of their actions in their hands and are able to erase information regarding their wrongdoings from the Internet that allows them to break free of the consequences of their actions. To put this into the context of everyday life, imagine what would happen if one of these wrongdoers was running for office. The average American does not have the time to sift through the archives when researching each candidate for office, and most people think a quick Google check of the person will suffice. What if one campaigner had had a criminal record, but asked for it to be removed from Google search results? Disaster and further governmental turmoil could result. These two extremes – the all-remembering NSA and the all-forgetting Google – bring up several important questions. How do both of these methods affect the exercising of the right of free speech? According to the Stanford Law Review, many have belittled the effects of the recent allowance of the right to be forgotten’s effect on free speech while in reality, it has an enormous and negative effect on free speech. For example, in the review, they say, ““…the European Commissioner for Justice, Fundamental Rights, and Citizenship, Viviane Reding, announced the European Commission’s proposal to create a sweeping new privacy right—the ‘right to be forgotten’… Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade.” They go on to further express the harmful effects of this new concept on free speech, saying, “Unless the right is defined more precisely when it is promulgated over the next year or so, it could precipitate a dramatic clash between European and American conceptions of the proper balance between privacy and free speech, leading to a far less open Internet.” Also, does either of these methods work, or is there a happy medium that must be reached for the sake of the United States and national security? Who should make that decision? That is something that only time shall serve to tell.

Sunday, May 18, 2014

ENEMY OF THE STATE PART TWO: ITS ALL CONNECTED - THE PAST, THE PRESENT, THE FUTURE

Edward Snowden and national security - two subjects that are often found in the same sentence in the present day - certainly affect people of the present day as well as future generations yet to come. Snowden, in fact, may also be connected to the past as well, through ancient writings that apply to and may also be used to criticize what he has done. Take a look at the ripple effect of Snowden's actions - how they affect all kinds of people, and how they even can transcend time. Snowden’s actions undeniably affected the American people. In this digital day and age, how could they not? But how does Snowden – as a person as well as through his actions – measure up to Daniel Ellsberg, a fellow whistle-blower? Daniel Ellsberg was in over his head in regards to the Vietnam War, all the way back in the late 60’s and early 70’s. He had previous military experience, serving in the Marine Corps, and he got even more involved over time, serving in the Pentagon under Secretary of Defense Robert McNamara. In fact, Ellsberg was the one reported the Gulf of Tonkin incident to McNamara – the main event that lead the United States to get involved in the Vietnam War. So what changed in Ellsberg, that lead him to expose the government’s dirty secrets regarding the government’s involvement in Indochina – who was once, according to Encyclopedia Britannica “an ardent early supporter of the U.S. role in Indochina? The question is not what but who changed Ellsberg, and the answer is Randy Kehler, a jail-bound draft resister who gave Ellsberg a more imminent idea of what the Vietnam War’s impact on Americans. Ellsberg said in a reflection upon this pivotal event in his life, …his words in general showed that he was a stellar American, and that he was going to jail as a very deliberate choice—because he thought it was the right thing to do. There was no question in my mind that my government was involved in an unjust war that was going to continue and get larger. Thousands of young men were dying each year. I left the auditorium and found a deserted men's room. I sat on the floor and cried for over an hour, just sobbing. The only time in my life I've reacted to something like that. Ellsberg proceeded to release to The New York Times the Pentagon Papers in attempt to expose to the American public the wrongdoing and excessive involvement in Indochina that the government had tried to keep a secret. How does this man and his brave actions compare to Edward Snowden? In many ways, they don’t. As a person, one may conclude that Ellsberg is the braver, stronger, and perhaps even the wiser and more intelligent of the two. For one, Snowden attempted to join the Special Forces until a broken leg drove him back home, never to return. On the other hand, Ellsberg served as a platoon leader in the Marines. Also, in regards to bravery and authenticity, Snowden seems to lack these qualities, as what he claims are his motives never seem to add up, and the mere fact that he is hiding in Russia this very moment says something profound about his lack of bravery. Contrastingly, Ellsberg did no such thing; he stood his ground and he did not flee, but rather he fought and took it to the courtrooms. Additionally, Ellsberg’s revelations seem to be more impactful than those of Snowden. For example, Ellsberg was dealing with matters of life and death – American troops were dying in thousands in Vietnam. Who, exactly, is the NSA killing, by going through someone’s Gmail account? Also, Ellsberg was revealing secrets on war, which is safe to say somewhat direr a matter than unwarranted spying conducted by the NSA that is trying to ward off terrorist threats. Which whistle-blower revealed the heftier secret? Edward Snowden, who told the public about the NSA’s unjust attacks on freedom in its attempts to protect the people, or Daniel Ellsberg, who told Americans the truth about the Vietnam War that was taking not only peoples’ freedoms but peoples’ lives? Daniel Ellsberg can be connected to Snowden in more ways than one. They do not just share the title of “whistle-blower”, but Ellsberg recently drew another connection between the two of them in an article he wrote for The Guardian in which he discusses the importance of Snowden’s leaks. Ellsberg incriminates the government’s recent actions and deems them as unconstitutional as he says, “Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended.” Ellsberg continues to describe the terrible state that the government of the United States is in, and how the NSA has taken privacy away from American citizens in a way that rivals what the East German Stasi had done long ago, as he says, “The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi – the secret police in the former ‘democratic republic’ of East Germany – could scarcely have dreamed of.” He then claims, “Snowden reveals that the so-called intelligence community has become the United Stasi of America.” In this statement, he alleges that Snowden, with his actions, acted as the savior trying to allow the American public to know what their government has become. Is the United States, however, so extreme in its actions that it is comparable to the Stasi? In many ways, yes, it is. But in one major important way, they are so dissimilar that this comparison is illegitimate, and that is in the purpose of the Stasi and the purpose of the NSA. The NSA lives to protect Americans from danger, despite the fact that they cross lines that they perhaps should not cross in the process. On that note, the NSA is also focused on fighting off the terrorist threat at all costs. On the other hand, John Koehler of The New York Times’ book Stasi: The Untold Story of the East German Secret Police serves to explain the purpose of the Stasi which differs vastly with the NSA. In his book, the Stasi, as described by Simon Wiesenthal, a man who spent half of his life hunting down Nazi criminals, “had four decades in which to perfect its machinery of oppression, espionage, and international terrorism and subversion.” Unlike the NSA – actually, in a way completely opposite of the NSA – the Stasi inflicted acts of terrorism on its citizens as well as foreigners that were in no way attempts to protect them but rather to oppress them. Though as Ellsberg noted, there are some commonalities between the NSA and the Stasi, there are key differences between them that make these claims illegitimate. Snowden has others who “believe” – perhaps more legitimately – similar to Snowden. Of course, as with any controversy at the forefront of modern day America, there is also opposition. One of these such men who has something to say against not only Snowden’s alleged ideologies but also all accusers of the NSA is General Michael Hayden, a former Air Force General and the former head of both the National Security Agency and the Central Intelligence Agency. In a recent debate that took place between NSA supporters and NSA opponents, Hayden made a few key points justifying the actions of the NSA that Snowden and his chosen journalists had revealed. For one, Hayden said that the United States is not the only country who spies on its own citizens as well as the citizens of foreign countries and that the only reason that this – which he thinks should be thought of as the norm – has been deemed controversial and questionable by the American public is because of the media. He pins the great stink in America recently that reeks of privacy violations on journalists who try to frame it as a large issue while it is not in the least. He continues to assign blame to the journalists as being the root of the problem, accusing them – the Washington Post in particular – of exaggerating the NSA’s activities and framing them as something they are not. According to Hayden, contrary to what journalists allege, the NSA does not regularly sift through everyone’s private emails, but rather that they only do so when someone gives them reason to do so. On that note, Hayden also said that this method of collecting all emails is much easier than collecting individual emails – these emails, he claims, are read primarily so as to avoid the terrorist threat. He closes his argument, saying that that fateful day back in September of 2001, 9/11 proved that the enemy exists and is could be here, in the United States, at any moment. Thus, the NSA has a responsibility to protect American citizens. These claims seem to focus on calling out journalists as the cause of the problem in the United States as of late while the NSA was acting justly in an attempt to protect their citizens from the evil – namely, the terrorist threat – that is constantly afoot. On the other hand, what does the opposite end of this spectrum of opinions have to say regarding the NSA’s actions? Glenn Greenwald – one of the journalists who Edward Snowden had drawn out to Hong Kong and to whom he leaked the NSA’s documents – lands among the men ultimately on Snowden’s side of things, as he is not happy with the NSA’s actions which he considers to be unconstitutional. Greenwald, in the same debate in which General Hayden had partaken, begins his argument challenging the NSA to prove that they are tracking the enemy – and that as soon as that is proven, journalists will back off. However, until that is proven, he claims that journalists, including himself, will not back down. He later said that the classic excuse that all of this is being done as a result of the constant terrorist threat from which they are trying to protect innocent American citizens is just that – an excuse, and in his opinion, an excuse that has been overused and whittled down into almost meaninglessness. Greenwald also emphasizes time and time again in his argument that unlike the NSA claims over and over again, their online surveillance is not limited or focused while it rather extends past merely persons of interest but to all Americans who reside in the digital world. He deems it to be aggressive and indiscriminant, contrary to the NSA’s claims, an opinion he expressed when he said, “Over and over in the documents of the NSA…is aggressive boasting about the system of indiscriminant, suspicionless [sic] surveillance that they have constructed in the dark where entire populations…who are guilty of nothing have their communications routinely monitored and surveilled [sic] and stored.” There were also a few statistics on the matter that he referenced. For example, Greenwald said that approximately 100 million people are affected by this unwarranted surveillance, asserting that this surpasses the true number of people of interest by far. Likewise, he presents another piece of numerical data, saying that 1.7 billion telephone calls and emails taking place among Americans are documented by the NSA on a daily basis. He also references a recent court decision that ruled this unwarranted surveillance as unconstitutional. Unlike General Hayden, Glenn Greenwald focuses on questioning the NSA’s true intentions as to why they choose to spy on hundreds of millions of Americans – as he claims that they intended not to use state surveillance as a way to zero in on suspicious and possibly threatening persons of interest but rather to encroach upon all Americans’ privacy. Snowden and his actions can be tied to the past as well, as ancient stories serve to condemn Snowden's actions. As the practically proverbial phrase goes, “There are some things better left unsaid.” Are there also things that are better left unknown? This may be the case after taking a closer look at the Edward Snowden ordeal, for it seems as though as a result of this man trying to play God, havoc was wrought upon the United States as well as the rest of the world. In order to see the detrimental effects of omniscience, one must look to the past – all the way back to the ancient stories of Greek mythology. The myth that truly conveys the ill effects of the all-knowing powers often desired by humans is the story of the origin of the Cyclopes and their single eye. In brief, the Cyclopes asked Zeus for the power to see the future in exchange for one of each of their eyes. Zeus carried out the deal as promised, giving the Cyclopes the power to see the future – the only catch was that he only allowed them to see the day in the future on which they die. In turn, the moral of this story was that when a mortal wishes for the knowledge only the immortal should see, when their wish is granted, the future does not make them any more powerful or happy. Rather, they only end up seeing the bad in the future. Another ancient story that manifests the injurious nature of omniscience in the hands of mortals is found in the Holy Bible – the story of Adam and Eve and the Tree of Knowledge of Good and Evil. Adam and Eve, despite God’s warnings against it, ate from the Tree of Knowledge of Good and Evil which exposed them and all generations of man to come to evil and sin – something they would never have known if not for their choice to choose knowledge over obedience to God. The moral of this story, similar to the moral of the story of the Cyclopes, is that humans do not benefit from omniscience and that the only one who truly needs all-knowing powers is God. How then are Snowden’s actions any different from those of the Cyclopes and Adam and Eve? He says that he wants all data and information to be free to the public rather than having only government officials exposed to it, similar to how the Cyclopes and Adam and Eve wanted the knowledge only the deities had access to in each story. He let this desire for all people to have knowledge of the NSA’s doings control his actions as he proceeded to leak the information to the world, just as the Cyclopes made a deal with Zeus to have the power to see into the future in exchange for one of their eyes and as Adam and Eve chose to eat the fruit of the Tree of Knowledge of Good and Evil so that they could know as much as God. The fallouts in all three stories also run parallel to one another. With Edward Snowden, the information that went from merely the hands of the NSA to all people put the United States citizens at risk for danger that the NSA was once able to prevent while the United States’ relationships with other countries were also damaged. With the Cyclopes, their exposure to knowledge only meant for the gods was similarly detrimental in that they only saw the day and way in which they were to die. With Adam and Eve, their eating of the tree exposed them to the evil of sin. In other words, in all three situations, those who desired omniscience became no freer or happier from it, and their accounts served to reveal that omniscience is not something meant for everyone to possess. Instead, those in positions of power – the government or Zeus or God – are the only ones meant to be exposed to such knowledge. As French poet Alphonse de Lamartine says in his poem “L’Homme”, “Our crime is to be a man and want to know…” Snowden and his actions, thus, are an example of the harmful effects of desiring and striving for omniscience – and that was what was truly wrong with what he did.