5/27/2015

The rebellion of the bits.



The rebellion of the bits.

Use the force, Luke… let go, Luke
It is very difficult not to get goose bumps every time we hear that phrase, although I must recognize that there are twats out there that still weep and hurt for the Empire. Some folks have a hard time trying to discover who the real tyrant is, since they only look for a threatening uniform and an open draconian agenda and even though those elements are present, they are well disguised behind a well-structured language that Mother Teresa would use at a fund raiser for the Tichilești leper colony. Truth is that evil is constantly evolving and unless someone is well trained to recognize evil… well, the majority of the people will let it pass, only to realize its presence when it is already too late… when they see the marks on their bodies, just like a terminal patient dying of AIDS or Ebola.

Tyranny begins “piano, piano”…

 
Addictions begin when there is no control over the senses, when there is a physiological craving for any sort of stimulus. When the person depends on these stimuli to continue with its life, sooner or later he or she will pay any price to keep receiving it. Every market has producers, distributors, intermediaries, wholesalers, retailers, consumers, smugglers, falsifiers and thieves; what most people fail to see is that dark character hidden in a corner, waiting, he wants to own it all, even the will of those consumers. 


















In 2009 there were reports that cybercrime was more profitable than drug trafficking; activities such as spamming, denial-of-service attacks, phishing, cyber stalking, fraud, identity theft, harassment, child pornography and from there to drug trafficking and cyber terrorism… in all these cases, the computers were a tool, a target or both.

False-Flag Attack: Noun: 
  1. (nautical) A ruse, in the days of sail, in which an attacking ship would fly the colors of its enemy until close enough to open fire.
  2. (espionage, military) A diversionary or propaganda tactic of deceiving an adversary into thinking that an operation was carried out by another party.

 

1933 - The Reichstag Fire (Der Reichstagsbrand) was started against the Reichstag building in Berlin. “Who really did it?” that is still a mystery; Marinus van der Lubbe (Dutch communist) was the one blamed by Hitler's government. Van der Lubbe had recently arrived to Germany and was captured on site; after being tortured, he admitted to setting the building on fire and was obviously executed. The fire was used as “proof” by the Nazis to blame the Communists of conspiracy against the government and it is considered as a fundamental event in the establishment of the Third Reich.



1939 - Winter War, the Soviet army shelled the town of Mainila, a Russian town near the border with Finland, the attack was used as an excuse to invade Finland.



 
"...the State 'has the supreme right against the individual, whose supreme duty is to be a member of the State... for the right of the world spirit is above all special privileges.” Author/historian William Shirer, quoting Georg Hegel in his The Rise and Fall of the Third Reich (1959, page 144)

The governments of the world are "promoting" laws to regulate the Internet with the slogan of making the internet “a safe place for everyone, a place in which human rights and the law (draconian) are respected”, but what is the thin line that separates supervision from oppression?


Censorship and creativity in China.

 
 China is considered by many as a key figure in cyber-espionage (financial and technological/industrial secrets- 141 companies in 20 different industries) around the world; especially because of those accusations made by the USA against the People's Liberation Army (PLA). Take a look at the Mandiant report.

 

Chinese Filters “… are powerful and repressive; they use key words or phrases to block users, ending up in blocking their internet access. Any new website that contains “dangerous” material is blocked immediately, in fact 'subversive commentaries' in blogs, forums and other sites can be erased in minutes and replaced by pro-government messages, this is possible because of the Chinese cyber-police and its 30.000 elements, although the netizens of the Human Flesh Search Engine claim that in order to keep that structure working, monitoring, deleting and replacing that fast, they need at least 2.000.000 people. CPJ says that until 2014, China had the largest number of imprisoned journalists in the world: whereas the average jail sentence for cyber-dissidents goes from 3.5 to 4 years.


Australia and its “Great Aussie Firewall”- A filter that promises to block 1,300 websites that the Government does not approve; from pornography, violence, terrorism to tutorials on how to smoke ganja.

The Information Technology Act of India- The Government of India founded the Computer Emergency Response Team (CERT-IN), which it allows the monitoring of all incoming and outgoing internet traffic in India, the government can intercept messages from mobile phones, computers and other devices; also it can block websites that promote subversive content and that contribute to "the perversion and corruption of the mind." It is fun to mention, but India is the home of the Kama Sutra and under this law, pornography has been prohibited.

 

Real Name System- One of the privileges that we enjoy is to use any alias that comes to our mind. Internet was born anonymous, even though many zombies keep publishing all their photos. In South Korea, this proposal (Real Name) was on the verge of becoming law, until the Court considered that something like that was illegal.  Although this also applies to China!


Weibo is the Chinese Twitter and is infected with censorship. The code of conduct stipulates that Weibo users cannot publish content that goes against the principles of the constitution that can damage national unity, divulges State secrets or misinformation, among many other rules. Sina is the greatest Weibo operator and presented a system of points for its users. Every user starts with 80 points and each time there is a violation, the user loses points. Zero points means losing the account. But the users who reveal and confirm their identity gain more points… yay!

United States-Patriot Act It was born in October 2001, weeks after the attacks the 9-11 attacks. Some legislators read some parts of it and then they voted. A document with hundreds of pages and amendments to statutes that were very complex; intelligence services claimed that they needed more “authoritah!”.

 
The law that served as justification to give all legal power to the well-known dragnet that will be remembered as one of the most invasive ever (Section 215) and it expires on June 1st…
 

Unless the American Congress decides otherwise… and pays attention to whatever the NSA has to say.

Mexico- Döring's Law, treating to fight digital piracy and to protect contents
 

National Security Law and the Mexican telephone espionage…


 

@feexitmx
www.feexit.mx
rp@feexit.mx

No comments:

Post a Comment