Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged NSA-goals

Rss Feed Group items tagged

Paul Merrell

Facebook and Corporate "Friends" Threat Exchange? | nsnbc international - 0 views

  • Facebook teamed up with several corporate “friends” to adapt Facebook’s in-house software to identify cyber threats and their source with other corporations. Countering cyber threats sounds positive while there are serious questions about transparency when smaller, independent media fall victim to major corporation’s unwillingness to reveal the source of attacks resulted in websites being closed for hours or days. Transparency, yes, but for whom? Among the companies Facebook is teaming up with are Printerest, Tumblr, Twitter, Yahoo, Drpbox and Bit.ly, reports Susanne Posel at Occupy Corporatism. The stated goal of “Threat Exchange” is to locate malware, the source domains, the IP addresses which are involved as well as the nature of the malware itself.
  • While the platform may be useful for major corporations, who can afford buying the privilege to join the club, the initiative does little to nothing to protect smaller, independent media from being targeted with impunity. The development prompts the question “Cyber security for whom?” The question is especially pertinent because identifying a site as containing malware, whether it is correct or not, will result in the site being added to Google’s so-called “Safe Browsing List”.
  • An article written by nsnbc editor-in-chief Christof Lehmann entitled “Censorship Alert: The Alternative Media are getting harassed by the NSA” provides several examples which raise serious questions about the lack of transparency when independent media demand information about either real or alleged malware content on their media’s websites. An alleged malware content in a java script that had been inserted via the third-party advertising company MadAdsMedia resulted in the nsnbc website being closed down and added to Google’s Safe Browsing list. The response to nsnbc’s request to send detailed information about the alleged malware and most importantly, about the source, was rejected. MadAdsMedia’s response to a renewed request was to stop serving advertisements to nsnbc from one day to the other, stating that nsnbc could contact another company, YieldSelect, which is run by the same company. Shell Games? SiteLock, who partners with most western-based web hosting providers, including BlueHost, Hostgator and many others contacted nsnbc warning about an alleged malware threat. SiteLock refused to provide detailed information.
  • ...1 more annotation...
  • BlueHost refused to help the International Middle East Media Center (IMEMC)  during a Denial of Service DoS attack. Asked for help, BlueHost reportedly said that they should deal with the issue themselves, which was impossible without BlueHost’s cooperation. The news agency’s website was down for days because BlueHost reportedly just shut down IMEMC’s server and told the editor-in-chief, Saed Bannoura to “go somewhere else”. The question is whether “transparency” can be the privilege of major corporations or whether there is need for legislation that forces all corporations to provide detailed information that enables media and other internet users to pursue real or alleged malware threats, cyber attacks and so forth, criminally and legally. That is, also when the alleged or real threat involves major corporations.
Paul Merrell

Ending Syria's Nightmare will Take Pressure From Below  - 0 views

  • On Wednesday, the US airlifted hundreds of mainly-Kurdish fighters to an area behind ISIS lines where they were dropped near the town of al-Tabqa. The troops– who are part of the US-backed Syrian Democratic Forces or SDF– were accompanied by an undisclosed number of US Marines serving as advisors. Ostensibly, the deployment was intended to encircle ISIS positions and retake the area around the strategic Tabqa Dam. But the operation had the added effect of blocking the Syrian Arab Army (SAA) from advancing  along the main road towards Raqqa, the so called Capital of ISIS.  While the blocking move might have been coincidental, there’s a strong possibility that Washington is in the opening phase of a broader strategy to splinter the war-torn country and prevent the reemergence of a united secular Syria. According to Almasdar News: “The Coalition supported the offensive with air movement and logistical support, precision airstrikes, Apache helicopters in close air support, Marine artillery, and special operations advice and assistance to SDF leadership,” the US-led coalition said in a statement.” (AMN News) In a matter of weeks, Washington’s approach to the war in Syria has changed dramatically. While the US has reportedly ended its support for the Sunni militias that have torn the country apart and killed over 400,000 people, the US has increased its aid to the SDF that is making impressive territorial gains across the eastern corridor. The ultimate goal for the SDF fighters is an autonomous Kurdish homeland carved out of West Iraq and East Syria, while US objectives focus primarily on the breakup of the Syrian state, the removal of the elected government, the control over critical pipelines routes, and the redrawing of national borders to better serve the interests of the US and Israel.
  • The most recent adaptation of Yinon’s plan was articulated by Brookings Institute analyst Michael O’ Hanlon in a piece that appeared in the Wall Street Journal titled “A Trump Strategy to End Syria’s Nightmare”.  In the article, O’ Hanlon states bluntly: “To achieve peace, Syria will need self-governance within a number of autonomous zones. One option is a confederal system by which the whole country is divided into such zones. A less desirable but minimally acceptable alternative could be several autonomous zones within an otherwise still-centralized state—similar to how Iraqi Kurdistan has functioned for a quarter-century…. Security in the Sunni Arab and Kurdish autonomous zones would be provided by local police and perhaps paramilitary forces raised, trained and equipped with the direct support of the international community. …(“A Trump Strategy to End Syria’s Nightmare”, Wall Street Journal) In an earlier piece, O’ Hanlon referred to his scheme as “Deconstructing Syria” a plan that “would produce autonomous zones that would never again have to face the prospect of rule by either Assad or ISIL.” Many of the details in O’ Hanlon’s piece are identical to those in Trump’s plan which was announced by Secretary of State Tillerson just last week. The Brookings strategy appears to be the script from which the administration is operating.
  • In his presentation, Tillerson announced that US troops would not leave Iraq after the siege of Mosul was concluded which has led many to speculate that the same policy will be used in Syria. Here’s an excerpt from an article at the WSWS that explains this point: “US Secretary of State Rex Tillerson declared Washington’s intention to keep troops deployed more or less indefinitely in the territories now occupied by Islamic State in Iraq and Syria in remarks delivered at the beginning of a two-day meeting of the US-organized anti-ISIS coalition in Washington. “The military power of the coalition will remain where this fraudulent caliphate has existed in order to set the conditions for a full recovery from the tyranny of ISIS,” he told an audience that included Iraqi Prime Minister Haider al-Abadi. He gave no indication of when, if ever, US troops could be withdrawn from a war zone extending across Iraq and Syria, where there has been fighting of greater or lesser intensity throughout the 14 years since the US first invaded Iraq.” (Tillerson pledges long-term US military role in Iraq and Syria, World Socialist web Site) US Defense Secretary James “Mad Dog” Mattis reinforced Tillerson’s comments adding that the US plans a indefinite occupation of Iraq (and, possibly, Syria) stating that it was in America’s “national interest.”
  • ...3 more annotations...
  • “We will pursue a new foreign policy that finally learns from the mistakes of the past…We will stop looking to topple regimes and overthrow governments…. Our goal is stability not chaos, because we want to rebuild our country [the United States] …In our dealings with other countries, we will seek shared interests wherever possible and pursue a new era of peace, understanding, and good will.” There won’t be any peace under Mattis or McMaster, that’s for sure. Both men are anti-Moscow hardliners who think Russia is an emerging rival that must be confronted and defeated. Even more worrisome is the fact that uber-hawk John McCain recently stated that he talks with both men “almost daily” (even though he has avoided talking to Trump since he was elected in November.) According to German Marshall Fund’s Derek Chollet, a former Obama Pentagon official. “(McCain) is trying to run U.S. defense policy through Mattis and effectively ignore Trump.” (Kimberly Dozier, Daily Beast contributing editor)  Chollet’s comments square with our belief that Trump has relinquished his control over foreign policy to placate his critics.
  • In response to Mattis’s comments, Syrian President Bashar al Assad said: “Any military operation in Syria without the approval of the Syrian government is illegal, and  any troops on the Syrian soil,  is an invasion, whether to liberate Raqqa or any other place. …The (US-led) coalition has never been serious about fighting ISIS or the terrorists.” Clearly, Washington is using the fight against ISIS as a pretext for capturing and holding territory in a critical, energy-rich area of the world. The plan to seize parts of East Syria for military bases and pipeline corridors fits neatly within this same basic strategy.   But it also throws a wrench in Moscow’s plan to restore the country’s borders and put an end to the six year-long conflict. And what does Tillerson mean when he talks about “interim zones of stability” a moniker that the Trump administration carefully crafted to avoid the more portentous-sounding “safe zones”. (Readers will recall that Hillary Clinton was the biggest proponent of safe zones in Syria, even though they would require a huge commitment of US troops as well as the costly imposition of a no-fly zone.) Tillerson’s comments suggest that the Trump administration is deepening its involvement in Syria despite the risks of a catastrophic clash with Moscow. Ever since General Michael Flynn was forced to step down from his position as National Security Advisor, (Flynn wanted to “normalize” relations with Russia), Trump has filled his foreign policy team with Russophobic hawks who see Moscow as “hostile revisionist power” that “annex(es) territory, intimidates our allies, develops nuclear weapons, and uses proxies under the cover of modernized conventional militaries.” Those are the words of  the man who replaced Flynn as NSA,  Lt. General HR McMaster. While the media applauded the McMaster appointment as an “outstanding choice”, his critics think it signals a departure from Trump’s campaign promise:
  • Washington’s Syria policy is now in the hands of a small group of right-wing extremists who think Russia is the biggest threat the nation has faced since WW2. That’s why there’s been a sharp uptick in the number of troops deployed to the region. 
Paul Merrell

FBI to have 52 million photos in its NGI face recognition database by next year | Ars T... - 0 views

  • New documents released by the FBI show that the Bureau is well on its way toward its goal of a fully operational face recognition database by this summer. The EFF received these records in response to our Freedom of Information Act lawsuit for information on Next Generation Identification (NGI)—the FBI’s massive biometric database that may hold records on as much as one-third of the US population. The facial recognition component of this database poses real threats to privacy for all Americans.
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Senate Intel Committee Blocks Former Staffer From Talking To Press About Oversight Proc... - 0 views

  • The Senate Select Committee on Intelligence has taken the unusual step of actively blocking a former committee aide from talking to TPM about congressional oversight of the intelligence community. At issue isn’t classified sources and methods of intelligence gathering but general information about how the committee functions — and how it should function. The committee’s refusal to allow former general counsel Vicki Divoll to disclose unclassified information to a reporter was the first and only time it has sought to block her from making public comments, based on her experience as one of its most senior aides, since she left Capitol Hill in 2003.
  • The committee’s decision comes amid fallout from leaks of classified National Security Agency documents by ex-NSA contractor Edward Snowden. In light of the Snowden revelations about the country’s secret surveillance programs, TPM was reporting a story based on interviews with members of Congress and current and former aides about the successes and pitfalls of intelligence oversight on Capitol Hill. The goal was to answer some basic questions for readers: How does a classified process differ from public oversight? What challenges do the combination of government secrecy, classified briefings, and strict committee protocols present to legislators trying to control the nation’s sprawling intelligence apparatus?
  • While Divoll remains legally barred from disclosing classified information, she is also still subject to a non-disclosure agreement with the Senate Intelligence Committee that bars her from discussing committee-sensitive business. Out of an abundance of caution, Divoll also conferred with the committee on Friday about her interview with TPM. She anticipated that the committee would approve the interview, noting that in her post-government career, both the committee and the CIA had never done more than request minor tweaks when she brought them pieces of her writing for pre-publication review. This, she believed, would be a similar process. But for the first time in her career, the committee took the extraordinary step, on a bipartisan basis, of declaring the interview’s entire contents a violation of her non-disclosure agreement and effectively forbade her from putting any of it on the record. “The committee has reviewed your submission … and objected to any publication of the information contained therein,” she was told. Specifically the committee claimed the information she provided TPM was both “out of date” and “committee sensitive.” Angered by the committee’s decision, Divoll sought Friday to have it reversed. The committee declined. TPM agreed to honor her request that we leave her comments off the record.
  •  
    Whoo-weee! Even non-classified information is secret on the Senate Intelligence Committee. Too bad that Congress never saw fit to make itself subject to the Freedom of Information Act.  :-)
Paul Merrell

Obama to propose legislation to protect firms that share cyberthreat data - The Washing... - 0 views

  • President Obama plans to announce legislation Tuesday that would shield companies from lawsuits for sharing computer threat data with the government in an effort to prevent cyber­attacks. On the heels of a destructive attack at Sony Pictures Entertainment and major breaches at JPMorgan Chase and retail chains, Obama is intent on capitalizing on the heightened sense of urgency to improve the security of the nation’s networks, officials said. “He’s been doing everything he can within his executive authority to move the ball on this,” said a senior administration official who spoke on the condition of anonymity to discuss legislation that has not yet been released. “We’ve got to get something in place that allows both industry and government to work more closely together.”
  • The legislation is part of a broader package, to be sent to Capitol Hill on Tuesday, that includes measures to help protect consumers and students against ­cyberattacks and to give law enforcement greater authority to combat cybercrime. The provision’s goal is to “enshrine in law liability protection for the private sector for them to share specific information — cyberthreat indicators — with the government,” the official said. Some analysts questioned the need for such legislation, saying there are adequate measures in place to enable sharing between companies and the government and among companies.
  • “We think the current information-sharing regime is adequate,” said Mark Jaycox, legislative analyst at the Electronic Frontier Foundation, a privacy group. “More companies need to use it, but the idea of broad legal immunity isn’t needed right now.” The administration official disagreed. The lack of such immunity is what prevents many companies from greater sharing of data with the government, the official said. “We have heard that time and time again,” the official said. The proposal, which builds on a 2011 administration bill, grants liability protection to companies that provide indicators of cyberattacks and threats to the Department of Homeland Security.
  • ...5 more annotations...
  • But in a provision likely to raise concerns from privacy advocates, the administration wants to require DHS to share that information “in as near real time as possible” with other government agencies that have a cybersecurity mission, the official said. Those include the National Security Agency, the Pentagon’s ­Cyber Command, the FBI and the Secret Service. “DHS needs to take an active lead role in ensuring that unnecessary personal information is not shared with intelligence authorities,” Jaycox said. The debates over government surveillance prompted by disclosures from former NSA contractor Edward Snowden have shown that “the agencies already have a tremendous amount of unnecessary information,” he said.
  • The administration official stressed that the legislation will require companies to remove unnecessary personal information before furnishing it to the government in order to qualify for liability protection. It also will impose limits on the use of the data for cybersecurity crimes and instances in which there is a threat of death or bodily harm, such as kidnapping, the official said. And it will require DHS and the attorney general to develop guidelines for the federal government’s use and retention of the data. It will not authorize a company to take offensive cyber-measures to defend itself, such as “hacking back” into a server or computer outside its own network to track a breach. The bill also will provide liability protection to companies that share data with private-sector-developed organizations set up specifically for that purpose. Called information sharing and analysis organizations, these groups often are set up by particular industries, such as banking, to facilitate the exchange of data and best practices.
  • Efforts to pass information-sharing legislation have stalled in the past five years, blocked primarily by privacy concerns. The package also contains provisions that would allow prosecution for the sale of botnets or access to armies of compromised computers that can be used to spread malware, would criminalize the overseas sale of stolen U.S. credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk people or commit identity theft, and would give courts the authority to shut down botnets being used for criminal activity, such as denial-of-service attacks.
  • It would reaffirm that federal racketeering law applies to cybercrimes and amends the Computer Fraud and Abuse Act by ensuring that “insignificant conduct” does not fall within the scope of the statute. A third element of the package is legislation Obama proposed Monday to help protect consumers and students against cyberattacks. The theft of personal financial information “is a direct threat to the economic security of American families, and we’ve got to stop it,” Obama said. The plan, unveiled in a speech at the Federal Trade Commission, would require companies to notify customers within 30 days after the theft of personal information is discovered. Right now, data breaches are handled under a patchwork of state laws that the president said are confusing and costly to enforce. Obama’s plan would streamline those into one clear federal standard and bolster requirements for companies to notify customers. Obama is proposing closing loopholes to make it easier to track down cybercriminals overseas who steal and sell identities. “The more we do to protect consumer information and privacy, the harder it is for hackers to damage our businesses and hurt our economy,” he said.
  • In October, Obama signed an order to protect consumers from identity theft by strengthening security features in credit cards and the terminals that process them. Marc Rotenberg, executive director of the Electronic Privacy Information Center, said there is concern that a federal standard would “preempt stronger state laws” about how and when companies have to notify consumers. The Student Digital Privacy Act would ensure that data entered would be used only for educational purposes. It would prohibit companies from selling student data to third-party companies for purposes other than education. Obama also plans to introduce a Consumer Privacy Bill of Rights. And the White House will host a summit on cybersecurity and consumer protection on Feb. 13 at Stanford University.
Paul Merrell

Frightening People into Silence by Andrew P. Napolitano -- Antiwar.com - 0 views

  • by Andrew P. Napolitano, July 17, 2014 Print This | Share This “Chilling” is the word lawyers use to describe governmental behavior that does not directly interfere with constitutionally protected freedoms, but rather tends to deter folks from exercising them. Classic examples of “chilling” occurred in the 1970s, when FBI agents and U.S. Army soldiers, in business suits with badges displayed or in full uniform, showed up at anti-war rallies and proceeded to photograph and tape record protesters. When an umbrella group of protesters sued the government, the Supreme Court dismissed the case, ruling that the protesters lacked standing – meaning, because they could not show that they were actually harmed, they could not invoke the federal courts for redress. Yet, they were harmed, and the government knew it. Years after he died, longtime FBI boss J. Edgar Hoover was quoted boasting of the success of this program. The harm existed in the pause or second thoughts that protesters gave to their contemplated behavior because they knew the feds would be in their faces – figuratively and literally. The government’s goal, and its limited success, was to deter dissent without actually interfering with it. Even the government recognized that physical interference with and legal prosecutions of pure speech are prohibited by the First Amendment. Eventually, when this was exposed as part of a huge government plot to stifle dissent, known as COINTELPRO, the government stopped doing it.
  • Until now. Now, the government fears the verbal slings and arrows of dissenters, even as the means for promulgating one’s criticisms of the government in general and of President Obama in particular have been refined and enhanced far beyond those available to the critics of the government in the 1970s. So, what has the Obama administration done to stifle, or chill, the words of its detractors? For starters, it has subpoenaed the emails and home telephone records of journalists who have either challenged it or exposed its dark secrets. Among those journalists are James Risen of The New York Times and my colleague and friend James Rosen of Fox News. This is more personal than the NSA spying on everyone, because a subpoena is an announcement that a specific person’s words or effects have been targeted by the government, and that person continues to remain in the government’s crosshairs until it decides to let go.
  • This necessitates hiring legal counsel and paying legal fees. Yet, the targeting of Risen and Rosen was not because the feds alleged that they broke the law – there were no such allegations. Rather, the feds wanted to see their sources and their means of acquiring information. What journalist could perform his work with the feds watching? The reason we have a First Amendment is to assure that no journalist would need to endure that.
  • ...2 more annotations...
  • And just last week, Attorney General Eric Holder, while in London, opined that much of the criticism of Obama is based on race – meaning that if Obama were fully white, his critics would be silent. This is highly inflammatory, grossly misleading, patently without evidential support and, yet again, chilling. Tagging someone as a racist is the political equivalent of applying paint that won’t come off. Were the Democrats who criticized Attorney General Alberto Gonzales or Secretary of State Condoleezza Rice racists? Is it appropriate for government officials to frighten people into silence by giving them pause before they speak, during which they basically ask themselves whether the criticism they are about to hurl is worth the pain the government will soon inflict in retaliation? The whole purpose of the First Amendment is to permit, encourage and even foment open, wide, robust debate about the policies and personnel of the government. That amendment presumes that individuals – not the government – will decide what language to read and hear. Because of that amendment, the marketplace of ideas – not the government – will determine which criticisms will sink in and sting and which will fall by the wayside and be forgotten.
  • Surely, government officials can use words to defend themselves; in fact, one would hope they would. Yet, when the people fear exercising their expressive liberties because of how the governmental targets they criticize might use the power of the government to stifle them, we are no longer free. Expressing ideas, no matter how bold or brazen, is the personal exercise of a natural right that the government in a free society is powerless to touch, directly or indirectly. Yet, when the government succeeds in diminishing public discourse so that it only contains words and ideas of which the government approves, it will have succeeded in establishing tyranny. This tyranny – if it comes – will not come about overnight. It will begin in baby steps and triumph before we know it. Yet we do know that it already has begun.
« First ‹ Previous 41 - 47 of 47
Showing 20 items per page