Liberty Guard
  • Projects
  • About
  • Leadership
  • Podcast
  • Blog
    • From The Desk of Bob Barr
    • Liberty Updates
    • Media Appearances
    • All Articles
  • Videos
  • Contact
  • Join
DONATE
Sunday, June 1, 2025
Liberty Guard
  • Projects
  • About
  • Leadership
  • Podcast
  • Blog
    • From The Desk of Bob Barr
    • Liberty Updates
    • Media Appearances
    • All Articles
  • Videos
  • Contact
  • Join
DONATE
Liberty Guard
Liberty Guard
  • Projects
  • About
  • Leadership
  • Podcast
  • Blog
    • From The Desk of Bob Barr
    • Liberty Updates
    • Media Appearances
    • All Articles
  • Videos
  • Contact
  • Join
Tag:

privacy

Blog

Liberty Guard Opposes Funding for the REAL ID ACT

by lgadmin May 18, 2016
written by lgadmin

Liberty Guard Opposes Funding for the REAL ID ACT

 

5/17/2016

(Atlanta, GA) – Liberty Guard today announced its opposition to funding for the Real ID Act. .

The REAL ID Act gives broad latitude to the Department of Homeland Security (DHS), including the power to add to the list of “official purposes” for which a compliant ID is required, “all authority to issue regulations, set standards, and issue grants” toward compliance, and the power to determine whether a state is in compliance with the Act.

Liberty Guard has joined more than one dozen organizations opposing California’s funding of this ill-conceived federal mandate.

Bob Barr, Chairman of Liberty Guard, commented, “The Read ID Act represents a massive federal overreach, that raises serious problems for individual privacy and principles of federalism.” The program, Barr also noted, “should, not be forced onto states, and I am proud to join with other organizations that support privacy and liberty, and oppose funding for Real ID implementation.”

About Liberty Guard:

Formed in 2009 by Bob Barr, and supported by over 150,000 Americans across the country, Liberty Guard is dedicated to restoring and strengthening liberty against intrusions by government at all levels; including taking action against TSA privacy intrusions and ObamaCare. Liberty Guard remains committed to identifying and supporting policy, candidates, and causes which champion liberty and return our country to constitutional principles.

###

Contact:

Steve Thomas

703-819-0127

Support Liberty Guard by visiting libertyguard.org.

 

May 18, 2016 0 comment
0 FacebookTwitterPinterestEmail
BlogFrom the Desk of Bob Barr

Government Case Against Apple is “Pure Applesauce”

by lgadmin March 2, 2016
written by lgadmin

“The Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all.” These were not the words of a radical social justice warrior from “Black Lives Matter,” or even a liberal Democrat in Congress. They were the deliberate and percipient observations from one of the most substantive and constitutionally faithful of Supreme Court Justices  — the late Antonin Scalia.

The tragedy of Scalia’s untimely passing is amplified by the need for voices such as his in the current fight between iPhone manufacturer Apple and the federal government, over forced access to an encrypted phone belonging to one of the dead San Bernardino terrorists. The government claims its demand that Apple break into the phone by overriding the built-in privacy protections is “reasonable” and necessary in order to protect national security. Apple maintains what Uncle Sam demands is not reasonable; and would establish a precedent that would result in harm to the company, its millions of customers, other U.S. manufacturers of “smart phones,” and ultimately the U.S. government. One can almost hear Scalia’s voice calling the government’s case against Apple, “pure applesauce.”

Before digging deeper into the government’s current dust-up with Apple, it is important to note that this fight is nothing new; it is simply the latest chapter in a decades-long push by Uncle Sam to gain access to Americans’ digital technology and place this booming sector of our economy under its thumb.

In 1994, for example, Congress passed the Communications Assistance for Law Enforcement Act (CALEA); which for the first time forced telecommunication carriers and manufacturers to deliberately modify their communications platforms and hardware for the sole purpose of facilitating the government’s ability to surreptitiously monitor communications made over those networks. The government (in particular the FBI), not satisfied by merely having a “back door” built into digital communication platforms for its convenience, also pushed Congress for legislation that would force private companies to provide encryption “keys” so that, if necessary, it always has a way to access the data on those networks. In those pre-911 days, Congress resisted such unnecessary and improper power grabs.

What makes the current debate with Apple different and more alarming, is that the government is for the first time demanding that a company actually invent a way to defeat the very encryption safeguards it builds into the devices it sells. Attorney General Lynch has taken to citing an obscure law, the All Writs Act of 1789, to justify this unprecedented exercise of power to compel companies to do the government’s work for it.

The debate over Apple’s reluctance to cooperate with government demands has to some degree been intentionally obfuscated in a swirl of techno-jargon about “encryption keys,” “brute force access,” and “backdoors.” Although these may be accurate details about the technical aspects of the debate, they have little relevance to the more important policy and constitutional impact of what is at stake. The question is not whether Apple can break its encryption; it could. Rather, the singularly important question is whether it should. And, the eventual answer to this inquiry will be a watershed moment for personal privacy in the digital age.

Since the government views providing access to data – even more than the data itself — as a duty no private citizen or company should have the power to resist, the feds characterize the current debate as a “minor” technicality. This is why it portrays Apple’s opposition to what it describes as a one-time-only solution to breaking the encryption on a single iPhone, as unpatriotic and shortsighted. Apple, and many Americans for that matter, view the government’s demands as something far broader and more important than a single, technical-assistance request in a single criminal investigation.

The true value of Apple’s encryption is that, as a manufacturer, it does not compromise its integrity for any reason. That’s the shield. As soon as they do it once, the shield is pierced and is made worthless, and there is nothing to stop others, including governments, from demanding access based on lessening degrees of “extraordinary circumstances.” One need only look to the USA PATRIOT Act, which frequently is employed but only rarely for terrorism investigations, to see this maxim in action.

Subsequent demands to access encrypted data will come not just from the U.S. government, either. Russia, China, and any foreign country willing to act as a proxy will not hesitate to use this precedent to search the phones of American business executives they suspect of “spying,” or some other fabricated offense – for the sole purpose of using the data it gathers to its economic, military or internal security benefit. Furthermore, the technology used to defeat security will not remain a secret for long; it will be only a short time before private, non-state actors coopt the anti-security measures for hacking private data.

This is precisely why the Apple debate is not just about one dead terrorist’s phone; the precedent set here will impact anyone who shares information digitally.

The good news is that, initially, a lower court has looked with suspicion at not just how the government is rationalizing its authority, but to what it inevitably would lead. “In a world in which so many devices, not just smartphones, will be connected to the Internet of Things,” writes U.S. Magistrate Judge James Orenstein, “the government’s theory that a licensing agreement allows it to compel the manufacturers of such products to help it surveil the products’ users will result in a virtually limitless expansion of the government’s legal authority to surreptitiously intrude on personal privacy.”

Unfortunately, Judge Orenstein’s correct analysis is being shouted down by government lawyers, political candidates, and most mainstream media outlets, more concerned with playing on fear of terrorism than with protecting individuals against Big Brother’s insatiable thirst for power and information.

Originally published here via townhall.com

March 2, 2016 0 comment
0 FacebookTwitterPinterestEmail
BlogFrom the Desk of Bob Barr

The Trap That Ensnared Denny Hastert Could Be Set For Any of Us

by lgadmin June 10, 2015
written by lgadmin

Lavrenti Beria, who ran Josef Stalin’s KGB, once commented on the ease with which the feared organization he headed could convict any individual at will: “Show me the man and I’ll find you the crime.” But that was early 20th Century Soviet Union, and this is 21st Century America, you might say; we have all manner of procedural safeguards in place to guard against individuals being charged and convicted of things not truly evil or harmful to others. Ahh, were it so.

Just how easy is it in 21st Century America to run afoul of one or more of the many thousands of federal criminal offenses on the books? Just ask Former Speaker Denny Hastert, now under federal indictment for nothing more egregious or harmful to our nation’s well-being than trying to conceal from prying eyes payments of his own money to another individual, and then not telling the FBI what it wanted him to reveal in order to incriminate himself.

Many of these criminal offenses have been on the books for decades — some conceived at the same time as our Internal Revenue Code a full century ago; others the offspring of the “War on Drugs” in the late 1960s. However, the zeal with which Uncle Sam’s agents target individuals who seek nothing more than to keep certain personal activities private, has become pronounced in recent years.

We live in a world in which the federal government not only makes it nearly impossible to engage in any private financial transaction, but actually resents the person – to the point of making them a felon — who dares try to evade revealing to federal regulators and investigators what they are doing with every red cent of their own money.
From the massive, NSA-directed meta-data collection programs revealed two years ago by Edward Snowden, to the FBI’s continuing efforts to outlaw any encryption of electronic data by individuals or companies to which the federal government is not given the keys, America’s landscape is peppered with legal landmines set for people and businesses trying to keep a small part of their world private.

Guilt is now presumed from simply taking steps to avoid government’s prying electronic eyes.

The Hastert indictment is clear evidence of this alarming trend. The former Speaker faces a decade or more in federal prison, but not for allegedly committing any substantive criminal offense. Even if he eventually is acquitted, Hastert’s reputation already is ruined simply because he wanted private transactions to remain private; and because he elected not to incriminate himself when answering questions put to him by FBI agents.

As The Atlantic’s Connor Friedersdorf writes, Hastert is but the latest in a growing list of Americans “being prosecuted for the crime of evading federal government surveillance.”

One does not have to possess the standing of a former Speaker of the House of Representatives to earn such attention from Uncle Sam. Last July, Lyndon McLellan, a convenience store owner in North Carolina, had his life-savings of $107,702.66 confiscated by the IRS for violating one of the same financial reporting laws that ensnared Hastert. For simply trying to reduce the paperwork burden on his bank with regard to certain transactions relating to his savings, McLellan was forced to mount a long and costly legal fight in order to see his money again.

The use of tightly crafted and clearly defined financial laws can in fact provide legitimate tools with which federal prosecutors are able to strike at “real” criminals engaged in activities that seriously harm other people. However, contemporary financial regulatory powers go far beyond what could be considered reasonable weapons with which to prosecute, convict and imprison such individuals.

For example, most individuals do not know that if you engage in a financial transaction considered “suspicious” by an employee at a federally-insured financial institution, the employee is required to report that transaction to federal investigators. These Suspicious Activity Reports or “SARs” are mandated in addition to other federal paperwork, such as “CTRs” or Currency Transaction Reports, which must be filed by anyone depositing or withdrawing more than $10,000 cash at a bank.

Many of these financial reporting laws have been broadened considerably since 9-11; and almost all have criminal penalties attached to them. But they are only the tip of the “gotcha iceberg” with which the federal government can control individuals and businesses. As noted criminal defense lawyer Harvey Silverglate concluded in his 2009 book, Three Felonies a Day – How the Feds Target the Innocent, it has become virtually impossible for even the most intelligent and learned individuals to, “predict with any reasonable assurance whether a wide range of seemingly ordinary activities might be regarded by federal prosecutors as felonies.”

So, before jumping to any conclusions about Denny Hastert, consider for a moment just how easy it would be for any of us to suddenly find ourselves similarly charged, for wanting nothing more than to keep certain personal financial actions private from Big Brother.

Originally published here on townhall.com

June 10, 2015 0 comment
0 FacebookTwitterPinterestEmail
Blog

Press Release: Liberty Guard Applauds Rand Paul on His Stand for the 4th Amendment

by Liberty Guard Author June 4, 2015
written by Liberty Guard Author

(Atlanta, GA) – Liberty Guard stands with Rand Paul and his colleagues by thwarting the unwarranted interjection of government surveillance in our day-to-day lives. Through his liberty-minded efforts, the Senate of the United States let key provisions to expire May 31, 2015.
Per its expiration, the National Security Agency (NSA) ceased any bulk metadata collection at 7:44pm on Sunday. “Section 215” allowed the NSA to collect (and store) such data on Americans for 5 years. The second provision gave law enforcement entities the ability (and freedom) to wiretap suspected individuals in an all-encompassing effect. Without such a provision, a warrant is needed for each instance.
Bob Barr, Chairman of Liberty Guard, said, “the government cannot make fallacious connections between a “lone-wolf” suspect with terror groups such as ISIS, Al-Qaeda, or the Taliban to substantiate investigations. We are excited that due to Senator Paul’s efforts, the Patriot Act has been terminated.”
Steven Thomas, President of Liberty Guard, added, “Even though the court system has told the President that the program in question is illegal, Barack Obama seems ambivalent.
As Ayn Rand has said: ‘The smallest minority on earth is the individual. Those who deny individual rights cannot claim to be defenders of minorities.’ Rampant systematic breaches of the Fourth Amendment are justified by instilling fear amongst Americans and veiling its intentions under national security.”
Liberty Guard strongly stands with Senator Paul and what he is doing to lead the fight in the Congress to defend the Bill of Rights against many of those even in his own Party and great cost to himself. The status quo must be disrupted. As we’ve learned with the current Presidential administration, promises are moot if you later renege once elected.
Sign an e-card to thank Senator Paul for standing for liberty HERE!

 

 

June 4, 2015 0 comment
0 FacebookTwitterPinterestEmail
BlogFrom the Desk of Bob Barr

The Tory Party vs. Rand Paul

by Liberty Guard Author June 3, 2015
written by Liberty Guard Author

If John McCain, John Cornyn, Mitch McConnell, and the other Republican senators lashing into Rand Paul because of his efforts to force expiration of Sec. 215 of the USA PATRIOT Act had been alive and part of the debate back in 1775-76, they would have been blasting Patrick Henry for supporting Liberty. Colonialists McCain, Cornyn and McConnell would have been firmly in the Tory camp; defending the powers of the Crown to “protect” the colonialists through such tools as Writs of Assistance.

Today, in this 21st Century, the tools may have changed, but the foundational principle on which our independence was fought – a federal government of limited and defined powers — remains the same; yet it is in far greater danger today than 240 years ago.

To McCain and other defenders of the all-powerful and all-seeing national security labyrinth that has mushroomed in the last 14 years, Rand Paul’s stand against permitting the National Security Agency to continue exercising a power to electronically surveil American citizens’ private communications without reasonable cause – an abuse a federal Court of Appeals already has ruled to be unlawful — is “reckless” and a threat to America.

These modern-day Tories might as well champion the words of ol’ King George III, who characterized his benevolent tyranny thus: “I wish nothing but good; therefore, everyone who does not agree with me is a traitor and a scoundrel.”

And what has this “scoundrel’ Rand Paul done? Dismantle the NSA? Destroy the power of the Intelligence Community to monitor real threats? Take away the ability of the CIA to conduct legitimate covert operations? Hardly.

All Paul has done to earn the enmity of the “Anything-It-Takes-to-Make-Us-Safe” caucus in the Senate is to try and reform Sec. 215 of the USA PATRIOT Act to bring it in line with the law and the Fourth Amendment.

Moreover, it is not as if the federal government does not have, and would continue to have, a full arsenal of tools at its disposal to identify, monitor and thwart real terrorist threats. And already moves are afoot openly – and quietly – to ensure that during this interim period when Sec. 215 is at least formally in limbo, those communications that pose a threat and are worthy of monitoring, are in fact monitored.

It would be naïve indeed to think the massive surveillance apparatus at the NSA is at a true standstill after years of abuse justified by the government’s broad interpretation the USA PATRIOT Act’s provisions. Already, there are attempts to weaken the USA Freedom Act – which passed the House last month and places at least some limits on Sec. 215 abuses. For example, Senate surveillance hawks want to keep secret the rulings of the Foreign Intelligence Surveillance Court (FISC) that has, unshackled by public knowledge or input, shaped how and what information the government collects on American citizens. Other proposals include extending the time the government is allowed to collect bulk phone metadata before handing over control of databases to telecom companies; and requiring the companies to give government advance notice of any changes to their retention policies. This latter provision would give Congress time to enact legislation prohibiting such changes if believed to hamper the government’s snooping efforts.

Of course, even such moves by McConnell and other Rand Paul-bashers do not soften their disdain for the junior Senator from Kentucky. McConnell continues to fume at Paul’s refusal to “play nice”; and he stopped just short of naming Paul directly when accusing the opposition of leading “a campaign of demagoguery and disinformation launched in the wake of unlawful actions of Edward Snowden.”

McCain – never one known for congeniality or subtlety — has taken an even lower road, in accusing Paul of putting “a higher priority on his fundraising and his ambitions than on the security of the nation.” Not that McCain would ever use “national security” as a fund-raising theme.

Threats to American freedom are nothing new. And our Founding Fathers understood that if Liberty was to have enduring life, limitations on government power must be made permanent and not allowed to fade depending on the nature of a particular threat. Thus, our Founders chiseled the Fourth Amendment into the bedrock of our young nation even as we faced a very real and present threat from our former master, Great Britain – an enemy far more powerful than modern-day terrorist organizations.

It is depressing in the extreme that these lessons – this history – have now been forgotten and blithely discarded by so many of our political “leaders” more concerned about restoring the powers of the Crown than protecting the Liberty of the individual.

Originally published here on townhall.com

June 3, 2015 0 comment
0 FacebookTwitterPinterestEmail
From the Desk of Bob Barr

Court Declares NSA Spy Program Illegal, Senate GOP Leaders Respond, “So What?

by Liberty Guard Author May 13, 2015
written by Liberty Guard Author

In March 2013, Director of National Intelligence James Clapper sat before the Senate Intelligence Committee when Sen. Ron Wyden asked him if the NSA collected “any type of data at all on millions or hundreds of millions of Americans?” Clapper’s unequivocal response: “No, sir.” It was a lie; but it was not until months later that Clapper finally offered a tepid apology for what he claimed was a “mistake.” His excuse — delivered with all the sincerity he could muster and still keep a straight face — was that he “simply didn’t think about Section 215 of the Patriot Act” when he delivered his earlier, unqualified denial.

Clapper moved on to other endeavors, as did the Senate; and his bald-faced lie largely faded away. Thankfully, just last week, a federal Appeals Court panel in New York showed it was not so willing to “let bygones be bygones.” In an opinion that was unusually blistering in its tone and wording, the Court stated that the manner in which the National Security Agency (NSA) has been using Section 215 to scoop up so-called “metadata” on virtually all cell phone and other electronic communications, is simply illegal.

The Second Circuit opinion comports clearly with both the language and the intent of this section of the Patriot Act. I should know; I was a member of the House Judiciary Committee that debated the legislation in committee and on the floor of the House back in the immediate aftermath of the 911 attacks. More broadly, of course, the Court recognized that the government’s absurdly expansive reading of the section would, if allowed to continue, make a mockery of any reasonable expectation of privacy enshrined in and protected by the Fourth Amendment.

Sadly, but true to form, many Republican Senators, including Majority Leader Mitch McConnell and presidential hopeful Marco Rubio, remain steadfast in support of the surveillance program now clearly found to be unlawful. They vow to bring legislation to the floor that would continue the program without any limitation. This doubling-down strategy is accompanied by the usual cries that “the sky is falling,” and that “Lone Wolf” terrorists will run rampant in the streets of American cities, if NSA is reined in to the slightest degree in its zeal to gather metadata.

The manner in which some of these surveillance supporters convey their support has been misleading, to say the least. Sen. Rubio, for example, recently encouraged his Twitter followers to let him know if they agree that “now’s not the time to end NSA.” No one, of course, is moving to close down NSA; critics are simply asking that the Congress limit the Agency’s surveillance powers over law-abiding Americans to lawful means. But, in senatorial or presidential politics, accuracy often is the victim of hyperbole.

Last week’s ruling is a refreshing reminder that there still are judges in America who understand the Constitution, who can read and abide by the common sense meaning of legislation, and who are sufficiently courageous to stand up and say so. It is true that there are individuals in the Congress who hold similar views; but unfortunately at least on the Republican side, they appear to be in the minority.

One Republican who clearly “gets it,” is Sen. Rand Paul, who is threatening to filibuster the effort by his Party’s leadership to kick the NSA can down the road and thereby permit it to continue at least for the time being to operate outside the law. All Americans – inside the Congress or elsewhere – who believe in constitutionally-based governance, should energetically support Rand Paul’s effort.

Originally posted here via townhall.com

May 13, 2015 0 comment
0 FacebookTwitterPinterestEmail
Liberty Updates

Liberty Update – License Plate Readers

by Liberty Guard Author January 30, 2015
written by Liberty Guard Author
January 30, 2015 0 comment
0 FacebookTwitterPinterestEmail
From the Desk of Bob Barr

The Real “DarkNet”: Law Enforcement Information Sharing And Fusion Centers

by Liberty Guard Author January 21, 2015
written by Liberty Guard Author

Earlier this month, I wrote about a case out of Maryland involving a Florida resident who was pulled-over by Maryland Transportation Authority (MDTA) police, and subjected to harassment and intimidation, all because the driver was the holder of a Florida concealed carry permit. The incident raised serious questions about the clear bias against firearm owners in a state with a reputation for being notoriously anti-Second Amendment. More troubling, is the still–unanswered question about how MDTA police even knew of an individual concealed carry permit issued outside of their state.

As egregious as are the circumstances surrounding the Maryland incident, it is just one of a growing number of examples of how information about individuals exercising their constitutional rights, is being data-based and shared by law enforcement databases as “suspicious activity.”

Following its investigation of the September 11, 2001 terror attacks, the 9/11 Commission cited a lack of cooperation and information-sharing among law enforcement agencies, as a major vulnerability in America’s national security. One of byproducts of the Commission’s recommendations was the creation of more than 40 state and urban area fusion centers. These were designed to serve as localized clearinghouses for the “receipt, analysis, gathering, and sharing of threat-related information” from partners within law enforcement, public safety, and even the private sector.

The selling point for the states (in addition to money) was that access to such a national network of “suspicious activity” data, would improve the safety of local law enforcement, and make them more effective at stopping crime. For the Feds, the collection and analysis of localized threat assessments, and a far larger flow of information from local law enforcement to the Department of Homeland Security, was the driving force. Thus the DHS (in effect, the entire federal government) gained unprecedented access to a vast data trove on private citizens that goes far beyond anything relating to criminal activity, much less terrorism.

Furthermore, by tapping into a “national” exchange of information that is, in part, contributed to by partners in the private sector, the DHS also found a way to circumvent privacy restrictions in the Privacy Act of 1974. Now, DHS can use the efficiency and flexibility of the private sector to mine and analyze data that, by law, it is prohibited from collecting and maintaining on its own. Moreover, national crime database systems such as the Regional Information Sharing Systems (RISSnet) are federally funded, but controlled by state and local level law enforcement entities; adding even more insulation from oversight despite its “critical” role in the overall Information Sharing Environment — the federal nexus of information sharing through which all of this data eventually flows.

The original goal may have been to improve communication between levels of law enforcement, but instead law enforcement has created one enormous Cloud of data on private citizens, that is breathtaking in its scope. This vast database is subject to virtually no oversight or accountability as to what information is collected, who is able to access the data, or how the data is used in “fighting crime.” In essence, this “fusion” has created the same type of shadowy “DarkNet” for law enforcement information sharing for which the federal government has demonized (and prosecuted) the private sector. The end result leaves local law enforcement with resources once only available to federal agencies, and federal agencies with access to surveillance capabilities previously available only to local law enforcement.

The only privacy protections afforded to citizens within the ISE are the same hollow promises of respecting “civil liberties” made by those who reject any hint of greater civil liberties oversight, or state and local law enforcement refusing to participate in this information sharing – something not likely to happen given the clear trends of over-criminalization and over-militarization. Ultimately, it is the lack of privacy protections or civil liberties oversight that allows law enforcement to turn completely legal activities, like owning a gun or supporting third-party candidates, into actionable intelligence based on some vague notion of “suspicious activity.”

Given the vastness of these networks, and collusion between private sector and law enforcement officials at the local, state and federal levels, only Congress has the necessary leverage to penetrate the shield that for so long has protected this law enforcement “DarkNet” from scrutiny. Its task however, will not be easy. Despite serious deficiencies in the fusion centers system documented in a two-year, bipartisan investigation by the Senate Permanent Subcommittee on Investigations the system remains, in the view of the respected Electronic Frontier Foundation, completely immune from oversight.

Now that Republicans, led by pro-privacy leaders such as Sen. Rand Paul and Rep. Justin Amash, have regained control over the House and the Senate, GOP officials should, at a minimum, immediately call for hearings. The value of such hearings lies in uncovering what exactly is being shared among law enforcement agencies about private citizens on these networks; and then to legislate safeguards to ensure the constitutional rights respected in one state are not used against law-abiding citizens in another. Otherwise, the type of abuse against a lawful Florida concealed-carry permit holder by Maryland traffic police, will become even more commonplace in states where freedom is trumped by “security.”

January 21, 2015 0 comment
0 FacebookTwitterPinterestEmail
From the Desk of Bob Barr

Sony’s Cyber-Carelessness a Wake-Up Call for Government and Taxpayers

by Liberty Guard Author December 24, 2014
written by Liberty Guard Author

“There is no overall Strategy in the departments of IT,” reads one 2012 internal evaluation from within the Information Technology department at Sony Pictures. “Unfortunately my department which is supposed to be in the front line of progress is actually close to obsolete,” reads another. These evaluations, leaked as part of a devastating data breach, paint an ominous picture for the ongoing cyber-attack against Sony that has rocked the entertainment industry; and even has implications for American foreign policy as North Korea appears to be the likely (or at least a likely) perpetrator of the attack.

It might seem odd that a company as large and as cash-rich as Sony would find itself in the middle of a massive data-security breach. However, as leaked internal documents now make clear, the possibility for such an assault was not a matter of “if,” but “when.” These documents paint an unflattering picture of Sony’s corporate IT culture; suggesting that not only were the company’s data security practices woefully deficient for a company of its size and complexity, but its ability to evolve to meet new cyber-security threats was hamstrung by corporate bureaucracy and outright apathy.

Far more important than what price Sony will pay for its cyber- somnambulance are the lessons for the federal government, whose vast data assets are to potential hackers infinitely more enticing and valuable than those of any corporation.

Many of the unflattering descriptions of dysfunction and incompetence within the IT department at Sony could readily be applied to nearly any program of the federal government; but most especially to those related to technology. A prime case in point is the launch of Obamacare. According to Bloomberg news, as of last February the federal government had spent more than $800 million on computer systems to run the online healthcare portal that serves as a gateway to the Obamacare system. In spite of this staggering amount of taxpayer dollars, the system — which did not even make it out of the starting gate without catastrophic system failures — remains to this day, nearly a year later, plagued with fundamental functionality issues and critical data security flaws that have yet to be resolved.

The news in early September that the Healthcare.gov portal had been hacked elicited little surprise, except for the fact that the attack occurred more than one full month before anyone noticed. While no data appears to have been stolen, and the attack appeared to be the beginning stages of a larger attack, it was definitive proof of the nightmare scenario predicted by privacy watchdogs: An arrogant and inept government agency now was in charge of massive quantities of highly sensitive personal information, and it could not even detect an attack on that information in spite of hundreds of millions of dollars spent to do just that.

Sound familiar?

Unlike Sony, in which the fallout from its data breach is limited primarily to its employees and contractors, the federal government holds within its databases personal information on hundreds of millions of individuals touching on virtually every aspect of their lives: criminal, financial, health, travel, and even private communications harvested through the National Security Agency’s data collection programs. Reflecting Uncle Sam’s insatiable appetite for data, these databases are only growing larger and more comprehensive. This makes government targets not only attractive to agenda-driven attackers from countries like North Korea, Russia, China, and others, but also to entities looking to use such information for financial gain.

As we see with Obamacare, the idea that the government can be trusted with protecting information on us that it compiles is not only foolish in theory, but a responsibility it has proven itself incapable of meeting time and again in the real world. Moreover, the refusal to accept this grim reality out of a desire to save face, as Democrats have done regarding Obamacare, only compounds the problems.

Even when the government does get around to discussing cyber-security, its goals usually are more about expanding its own power in domestic surveillance, than it is about data protection for citizens. For example, legislation supposed to protect Internet privacy, such as the Stop Online Piracy Act (SOPA) and the Cyber Intelligence Sharing and Protection Act (CISPA), wound up trampling the very privacy concerns they were supposed to protect.

If we are to take any lesson from the Sony hacking, it is that a culture of incompetence and apathy to data security, such as we so often see in some of the largest federal agencies, creates a target-rich environment for hackers and energizes their endeavors. As government’s demands for data continue to grow both in the scope of data it collects on citizens and in the highly sensitive nature of such information, we should be strongly questioning not only if government is qualified to protect this data from theft, but if it should even be harvesting it in the first place. After all, hackers cannot attack a database that does not exist.

December 24, 2014 0 comment
0 FacebookTwitterPinterestEmail
From the Desk of Bob Barr

Congress Gives Uncle Same “ESP” – Enhanced Surveillance Powers

by Liberty Guard Author December 17, 2014
written by Liberty Guard Author

In 1964, wrote that American society was quickly heading toward what she called “the stage of ultimate inversion,” in which “the government is free to do anything it pleases, while the citizens may act only by permission.” Rand, who came to America to escape the tyranny of the Soviet Union, saw in mid-20th Century America a country following a similar course as the one she escaped; in which government ruled by “brute force” and increased its power as it eroded individual rights.

In 1964, Ayn Rand wrote that American society was quickly heading toward what she called “the stage of ultimate inversion,” in which “the government is free to do anything it pleases, while the citizens may act only by permission.” Rand, who came to America to escape the tyranny of the Soviet Union, saw in mid-20th Century America a country following a similar course as the one she escaped; in which government ruled by “brute force” and increased its power as it eroded individual rights.

Now, more than three decades after her death, and with the age of the Internet in full swing, Rand’s fears of government “inversion” have become truer than ever. Last week’s bipartisan congressional passage of the FY 2015 Intelligence Authorization Act is clear proof of how far we have travelled down the road Rand predicted.

Since the mid-1990s, when anti-terror initiatives championed initially by the Clinton Administration and GOP leaders in the Congress provided the foundation for the massive federal surveillance apparatus in which we now live, privacy watchdogs have warned about the mission creep of federal authority deemed necessary to “protect us.” However, it was not until the 2013 leaks by National Security Agency contractor Edward Snowden and journalist Glenn Greenwald, exposing the breadth and technological sophistication of the government’s surveillance programs, that the public finally recognized what the blank check of “trust us” was really costing us.

As it does with every scandal it faces, the Obama Administration defended against the allegations with the usual gobbledygook, masked as promises of reform. Compounding the problem, the refusal by Republicans in Congress to so much as even debate limiting domestic spying, ensured that in spite of the overwhelming public outcry to the contrary, nothing would be done to limit the abuses. In fact, as last week’s vote on the FY 2015 Intelligence Authorization Act demonstrates, the only actions Congress and the Administration favor are those that expand government surveillance powers.

Buried in Section 309 of the Intelligence Authorization Act for Fiscal Year 2015 are — for the first time in “public” statute — procedures for how federal agencies can retain “incidentally acquired communications” obtained through domestic surveillance programs, including communications known to be between U.S. citizens with absolutely no ties to “terrorism’ (which had served as the justification for the initial authority). As Rep. Justin Amash (R-Mich.) explained in a Facebook message detailing the truly odious nature of the bill’s expedited passage, it was only after he quickly organized his legislative staff for a review that anyone noticed “one of the most egregious sections of law [Amash] encountered during [his] time as a representative.”

For years, the government’s ability to surreptitiously collect, analyze, store, and disseminate the private communications of U.S. citizens not suspected of violating any laws was based on dubious legal memos, classified decisions of the secret FISA courts, assumed powers in Executive Actions, and “plausible denials” concocted by federal officials responsible for conducting the very actions they were defending.

Congress’ most recent and feeble attempt at “reforming” that process in fact has enshrined in law those powers that, until now, existed in legal limbo. Any attempt at actual reform through court challenges now has been rendered even more difficult.

On the surface, Section 309 may appear an attempt to place a finite limit on how long government can retain the records of digital communications of U.S. citizens obtained without warrants or court orders. However, as the saying goes, the devil is in the details. Exceptions to the five-year limit carved out in the procedures, such as for communications “reasonably believed to have a secret meaning” or — a government favorite — communications “necessary to protect the national security of the United States,” renders moot any meaningful limitations.

But perhaps the most problematic language in Section 309 is the exception made for communications “reasonably believed to constitute evidence of a crime and is retained by a law enforcement agency,” which provides the legal authority to continue creating a digital rap sheet on virtually any U.S. citizen spanning federal, state and local governments, without any real consideration as to whether a crime has been committed.

Last week in this column, I explained how the government’s over-criminalization serves as a mechanism to control the citizenry. The government leverages minor, impossible-to-avoid criminal offenses to ensure cooperation when it so desires for either regulatory control or financial gain. The erosion of personal privacy through powers such as those found in the Intelligence Authorization Act serves only as a “multiplier” — moving us as at an accelerating rate toward that inversion state against which Ayn Rand warned us many decades ago.

December 17, 2014 0 comment
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Keep in touch

Facebook Twitter Instagram Youtube Telegram

Search Archives

Recent Posts

  • A European, Socialized Pharmaceutical Marketplace Should Have No Place in America

    May 9, 2025
  • Bob joins NTD News

    March 27, 2025
  • Government Over-Regulation Is Handing China The Energy Future

    March 19, 2025
  • The Climate Control Movement In Europe Is Alive and Still Kicking

    March 6, 2025
  • The Regulatory State Continues to Target Fantasy Sports

    February 27, 2025

About Us

  • Liberty Guard
    3330 Cumberland Blvd.
    Suite 500
    Atlanta, Georgia 30339
  • Email: [email protected]

From The Desk of Bob Barr

A European, Socialized Pharmaceutical Marketplace Should Have No Place in America
Government Over-Regulation Is Handing China The Energy Future
The Climate Control Movement In Europe Is Alive and Still Kicking

Latest Videos

Not My Fingerprints
Idiots In Full View
Biden Administration Champions Stupid Idea

Get Liberty Guard Email Updates




©2024 Liberty Guard, Inc. All rights reserved.

Designed and Developed by Media Bridge LLC

Facebook Twitter Instagram Youtube Telegram
  • Refund and Data Policies
  • State Disclosures
  • Join
Liberty Guard
  • Projects
  • About
  • Leadership
  • Podcast
  • Blog
    • From The Desk of Bob Barr
    • Liberty Updates
    • Media Appearances
    • All Articles
  • Videos
  • Contact
  • Join