We’ve lived so long under the spell of hierarchy—from god-kings to feudal lords to party bosses—that only recently have we awakened to see not only that “regular” citizens have the capacity for self-governance, but that without their engagement our huge global crises cannot be addressed. The changes needed for human society simply to survive, let alone thrive, are so profound that the only way we will move toward them is if we ourselves, regular citizens, feel meaningful ownership of solutions through direct engagement. Our problems are too big, interrelated, and pervasive to yield to directives from on high.
—Frances Moore Lappé, excerpt from Time for Progressives to Grow Up

Sunday, July 28, 2013

NSA - Access It All

Click here to access article by Bernhard from his blog Moon of Alabama. (updated 8am 7/29/2013)

There has been considerable controversy over the alleged tapping of only "metadata" by your Big Brother in the NSA. The involves such questions as: what kind of information can they really obtain from metadata? Can they obtain private communication content as well? This blogger attempts to unravel these question with the evidence available so far from our friendly Big Brother. 
This metadata is useful to find connections between people, to reconstruct where they have been when and to find out about certain habits of the people involved.
But the content of the calls may be much more interesting.
It seems reasonable to assume that the NSA uses algorithms to screen metadata to pick up suspicious content. (Of course, what constitutes suspicious content is any content which our ruling class defines as adversely affecting their interests.) Then future content of communications is directly accessed from that suspect's digital forms of communication.