The rebellion of the bits.
“Use the force, Luke… let go, Luke”
It is very difficult not to get goose bumps every time we hear that phrase,
although I must recognize that there are twats out there that still weep and
hurt for the Empire. Some folks have a hard time trying to discover who the
real tyrant is, since they only look for a threatening uniform and an open draconian
agenda and even though those elements are present, they are well disguised
behind a well-structured language that Mother Teresa would use at a fund raiser
for the Tichilești leper colony. Truth is that evil is constantly evolving and
unless someone is well trained to recognize evil… well, the majority of the
people will let it pass, only to realize its presence when it is already too
late… when they see the marks on their bodies, just like a terminal patient
dying of AIDS or Ebola.
Addictions begin when there is no control over the senses, when there is a
physiological craving for any sort of stimulus. When the person depends on
these stimuli to continue with its life, sooner or later he or she will pay any
price to keep receiving it. Every market has producers, distributors,
intermediaries, wholesalers, retailers, consumers, smugglers, falsifiers and
thieves; what most people fail to see is that dark character hidden in a corner,
waiting, he wants to own it all, even the will of those consumers.
In 2009 there were reports that cybercrime was more profitable than drug trafficking; activities such as spamming, denial-of-service attacks, phishing, cyber stalking, fraud, identity theft, harassment, child pornography and from there to drug trafficking and cyber terrorism… in all these cases, the computers were a tool, a target or both.
False-Flag Attack: Noun:
- (nautical) A ruse, in the days of sail, in which an attacking ship would fly the colors of its enemy until close enough to open fire.
- (espionage, military) A diversionary or propaganda tactic of deceiving an adversary into thinking that an operation was carried out by another party.
1933 - The Reichstag Fire (Der Reichstagsbrand) was started against the Reichstag building in Berlin. “Who really did it?” that is still a mystery; Marinus van der Lubbe (Dutch communist) was the one blamed by Hitler's government. Van der Lubbe had recently arrived to Germany and was captured on site; after being tortured, he admitted to setting the building on fire and was obviously executed. The fire was used as “proof” by the Nazis to blame the Communists of conspiracy against the government and it is considered as a fundamental event in the establishment of the Third Reich.
1939 - Winter War, the Soviet army shelled the town of Mainila, a Russian town near the border with Finland, the attack was used as an excuse to invade Finland.
"...the State 'has the supreme right against the individual, whose supreme duty is to be a member of the State... for the right of the world spirit is above all special privileges.” Author/historian William Shirer, quoting Georg Hegel in his The Rise and Fall of the Third Reich (1959, page 144)
The governments of the world are "promoting" laws to regulate
the Internet with the slogan of making the internet “a safe place for everyone, a place in which human rights and the law (draconian) are respected”, but what
is the thin line that separates supervision from oppression?
Censorship and creativity in China.
China is considered by many as a key figure in cyber-espionage (financial and technological/industrial secrets- 141 companies in 20 different industries) around the world; especially because of those accusations made by the USA against the People's Liberation Army (PLA). Take a look at the Mandiant report.
Chinese
Filters “…
are powerful and repressive; they use key words or phrases to block users,
ending up in blocking their internet access. Any new website that contains
“dangerous” material is blocked immediately, in fact 'subversive commentaries'
in blogs, forums and other sites can be erased in minutes and replaced by
pro-government messages, this is possible because of the Chinese cyber-police
and its 30.000 elements, although the netizens of the Human Flesh Search Engine
claim that in order to keep that structure working, monitoring, deleting and
replacing that fast, they need at least 2.000.000 people. CPJ says that until 2014, China had the largest
number of imprisoned journalists in the world: whereas the average jail
sentence for cyber-dissidents goes from 3.5 to 4 years.
Australia and its “Great Aussie
Firewall”- A filter that promises
to block 1,300 websites that the Government does not approve; from pornography,
violence, terrorism to tutorials on how to smoke ganja.
The Information
Technology Act of India- The
Government of India founded the Computer Emergency Response Team (CERT-IN),
which it allows the monitoring of all incoming and outgoing internet traffic in
India, the government can intercept messages from mobile phones, computers and
other devices; also it can block websites that promote subversive content and
that contribute to "the perversion
and corruption of the mind." It is fun to mention, but India is the
home of the Kama Sutra and under this law, pornography has been prohibited.
Real Name System-
One of the privileges that we enjoy is to use any alias that comes to our mind.
Internet was born anonymous, even though many zombies keep publishing all their
photos. In South Korea, this proposal (Real Name) was on the verge of becoming
law, until the Court considered that something like that was illegal. Although this also applies to China!
Weibo is the Chinese Twitter and is infected with censorship. The code of conduct stipulates that Weibo users cannot publish content that goes against the principles of the constitution that can damage national unity, divulges State secrets or misinformation, among many other rules. Sina is the greatest Weibo operator and presented a system of points for its users. Every user starts with 80 points and each time there is a violation, the user loses points. Zero points means losing the account. But the users who reveal and confirm their identity gain more points… yay!
Weibo is the Chinese Twitter and is infected with censorship. The code of conduct stipulates that Weibo users cannot publish content that goes against the principles of the constitution that can damage national unity, divulges State secrets or misinformation, among many other rules. Sina is the greatest Weibo operator and presented a system of points for its users. Every user starts with 80 points and each time there is a violation, the user loses points. Zero points means losing the account. But the users who reveal and confirm their identity gain more points… yay!
United States-Patriot Act It was born in
October 2001, weeks after the attacks the 9-11 attacks. Some legislators read
some parts of it and then they voted. A document with hundreds of pages and
amendments to statutes that were very complex; intelligence services claimed
that they needed more “authoritah!”.
The law that served as justification to give all legal power to the well-known
dragnet that will be remembered as one of the most invasive ever (Section 215) and it expires on
June 1st…
Unless the American Congress decides otherwise… and pays attention to
whatever the NSA has to say.
Mexico- Döring's Law, treating to fight digital piracy and to protect contents…
Mexico- Döring's Law, treating to fight digital piracy and to protect contents…
@feexitmx
www.feexit.mx
www.feexit.mx
rp@feexit.mx