Skip to main content

Home/ History Readings/ Group items tagged snowden

Rss Feed Group items tagged

zarinastone

Edward Snowden Says He's Applying For Russian Citizenship | NPR - 0 views

  • Former National Security Agency contractor and whistleblower Edward Snowden announced Monday he plans to seek Russian citizenship, while also maintaining his U.S. nationality.
  • Snowden said they are seeking Russian citizenship to ensure they will be able to live with their future son
  • Snowden fled the U.S. in 2013 after leaking classified information on domestic and international surveillance programs carried out by the NSA where he worked as a contractor. He previously worked for the CIA from 2006 to 2009.
  • ...4 more annotations...
  • Snowden has lived in Russia since 2013, having initially been granted asylum
  • He faces criminal charges in the U.S. including espionage and theft of government property related to the leak.
  • Snowden also faces other legal repercussions.
  • The U.S. District Court for the Eastern District of Virginia sided with U.S. officials who said that by not submitting the book for a pre-publication review, Snowden violated nondisclosure agreements he signed while working for the NSA and CIA.
maddieireland334

Eric Holder now says Edward Snowden performed 'public service' - CNNPolitics.com - 0 views

  • Chicago (CNN)Former U.S. Attorney General Eric Holder says Edward Snowden performed a "public service" by triggering a debate over surveillance techniques, but still must pay a penalty for illegally leaking a trove of classified intelligence documents.
  • Holder said Snowden jeopardized America's security interests by leaking classified information while working as a contractor for the National Security Agency in 2013.
  • Snowden, who has spent the last few years in exile in Russia, should return to the U.S. to deal with the consequences, Holder noted.
  • ...3 more annotations...
  • "But, as I think you're quite familiar, the Espionage Act does not permit a public interest defense. You're not allowed to speak the word 'whistleblower' at trial."
  • During the hour-long conversation with Axelrod, Holder -- the country's first African-American attorney general -- also accused presumptive Republican nominee Donald Trump of playing the race card in his campaign.
  • "The fact that he questioned the legitimacy of President Obama by questioning where he was born, what he's said about Mexicans...I think there's a race-based component to his campaign. I think he appeals too often to the worst side of us as Americans."
rachelramirez

Snowden still waiting for U.S. response to prison offer - CNNPolitics.com - 0 views

  • Edward Snowden's ready to go to prison, waiting on answer from U.S.
  • Later in July, the White House rejected a petition that had gathered more than 167,000 signatures calling for President Obama to pardon Snowden, who has been charged with three felony counts, including violations of the U.S. Espionage Act.
  • Snowden said. "I have paid a price but I feel comfortable with the decisions that I have made. If I'm gone tomorrow, I'm happy with what I had. I feel blessed."
qkirkpatrick

Snowden Seeks to Return Home to U.S., His Lawyer Says - NYTimes.com - 0 views

  • Edward J. Snowden, the fugitive and former American intelligence contractor, would like to return to the United States after nearly two years in exile in Russia, according to his Russian lawyer.
  • Mr. Snowden is seeking a guarantee of a legal and impartial trial, Mr. Kucherena said.
qkirkpatrick

Snowden Says He Can't Get Guarantee of a 'Fair Trial' - WSJ - 0 views

  • Edward Snowden, the former National Security Agency contractor who leaked secrets about American spying, said the U.S. government won’t guarantee him a “fair trial,” frustrating his
katyshannon

Europe-U.S. data transfer deal used by many firms ruled invalid | Reuters - 0 views

  • The EU's highest court struck down a deal that allows thousands of companies to easily transfer personal data from Europe to the United States, in a landmark ruling on Tuesday that follows revelations of mass U.S. government snooping.
  • Many companies, both U.S. and European, use the Safe Harbor system to help them get around cumbersome checks to transfer data between offices on both sides of the Atlantic. That includes payroll and human resources information as well as lucrative data used for online advertising, which is of particular importance to tech companies.
  • But the decision by the Court of Justice of the European Union (ECJ) sounds the death knell for the system, set up by the European Commission 15 years ago. It is used by over 4,000 firms including IBM (IBM.N), Google (GOOGL.O) and Ericsson (ERICb.ST).The court said Safe Harbor did not sufficiently protect EU citizens' personal data since the requirements of American national security, public interest and law enforcement trumped the privacy safeguards contained in the framework.
  • ...3 more annotations...
  • EU citizens have no means of legal recourse against the misuse of their data in the United States, the court said. A bill is currently winding its way through the U.S. Congress to give Europeans the right to legal redress.
  • ECJ in its ruling referred to revelations from former National Security Agency contractor Edward Snowden, which included that the Prism program allowed U.S. authorities to harvest private information directly from big tech companies such as Apple (AAPL.O), Facebook (FB.O) and Google.
  • IBM (IBM.N) said it created commercial uncertainty and jeopardized the flow of data across borders.
  •  
    Europe-U.S. data transfer deal ruled invalid by European courts, cited Edward Snowden in ruling
Javier E

Edward Snowden and Booz: How Privatizing Leads to Crony Corruption - Norm Ornstein - Th... - 0 views

  • We have vastly over-privatized, and in the process lost control over swaths of important policy areas while allowing unaccountable and even outlaw behavior to expand.
  • And we have created areas where crony capitalism can meet crony government to create crony corruption that cheats all taxpayers.
  • we can hark back to the last set of outrageous and scandalous privatized behaviors -- the privatization of war, with the sharp proliferation of private contractors sent to Iraq and Afghanistan who operated outside the restraints of the U.S. military, the common conventions of behavior in war, and the laws of the countries in which they operated
  • ...3 more annotations...
  • There were at times more than 100,000 contractors in Iraq, including nearly 50,000 "soldiers," many making $1,000 a day, far more than active-duty military, with the money coming from American taxpayers. Conveniently for politicians, if these "soldiers" died, they were not counted in the official death toll of Americans killed in the war.
  • If multiple public functions are privatized, or partially privatized, government employees have huge incentives to curry favor with potential private employers by granting them rich contracts or consulting fees, and then subsequently getting jobs paying multiples of their government salaries -- or just giving nice perks to one's former colleagues and friends who left for the private sector
  • Antigovernment ideologues demonize government and government employees, cutting their pay and their programs and finding other ways to undercut them. That makes recruiting top-flight people much more difficult, especially in areas such as computer science or engineering. Government responds not by providing incentives to recruit and keep the best and brightest, but by going through the back door of privatizing and letting private firms pay far more to do essentially the same work.
Javier E

How Edward J. Snowden Orchestrated a Blockbuster Story - NYTimes.com - 0 views

  • the computer “systems administrators” had access to enormous amounts of classified information. “They can be a critical security gap because they see everything,” he said. “They’re like code clerks were in the 20th century. If a smart systems administrator went rogue, you’d be in trouble.”
julia rhodes

Japan to Form Own National Security Council - WSJ.com - 0 views

  • A bill to create a Japanese National Security Council is set to pass in the nation's parliament, as China's rising maritime assertiveness and North Korea's nuclear ambitions give Prime Minister Shinzo Abe greater leeway to tighten his grip on foreign and defense policies.
  • Seen as an important step in Mr. Abe's push for Tokyo to expand its role in regional security, the new council is also viewed as a backdoor for the premier to ramp up Japan's military, which is strictly bound under the nation's postwar constitution to a self-defense role.
  • The idea of creating a U.S.-style NSC has gained traction in recent years as Japan experienced a string of national-security related incidents that prompted it to boost its defense spending and capabilities. These policies have been viewed with caution by Beijing and Seoul amid tensions over historical and territorial issues.
  • ...8 more annotations...
  • confrontation with Beijing over disputed islands in the East China Sea have created a series of testy situations that has underscored the importance of sound decision-making at the top of the government.
  • Pyongyang's pursuance of its nuclear and ballistic missile programs has also forced Tokyo to confront more urgent weapons threats, adding fuel to Mr. Abe's push to reinterpret the nation's pacifist constitution and lift the self-imposed ban on exercising the right to "collective self defense," or the right to aid allies being attacked.
  • By integrating the flow of information and providing speedy analysis, the NSC hopes to accelerate the prime minister's decision-making process on various issues involving national defense, including foreign military attacks and other serious emergencies.
  • Mr. Abe's plan has faced a fair amount of criticism. A state-secrecy bill that goes hand-in-hand with the draft legislation to enact the NSC has generated widespread concern by those who fear it could infringe on journalistic freedom and the public's right to information.
  • The bill, currently under discussion in parliament, toughens penalties against those who leak sensitive information related to defense, foreign policy, terrorism and other harmful activities, and has grabbed attention in the wake of Edward Snowden's leaking of classified U.S. intelligence information.
  • NSC will function properly and achieve its aims, or lose substance and become another ineffective bureaucratic institution.
  • The creation of the council also coincides with Beijing's plans to establish a similar state security committee that could boost President Xi Jinping's grasp over the military, domestic security and foreign policy as China flexes its military and diplomatic muscle in the region.
  • The NSC will be the control tower for Japan's diplomacy and defense," Mr. Yachi said during a speech he gave in Tokyo earlier this month, explaining that staff will be recruited from the foreign ministry, the police agency and the private sector.
Thomas Rhodes

http://www.nytimes.com/2013/12/15/us/officials-say-us-may-never-know-extent-of-snowdens... - 1 views

"American intelligence and law enforcement investigators have concluded that they may never know the entirety of what the former National Security Agency contractor Edward J. Snowden extracted from...

US politics policy privacy

started by Thomas Rhodes on 14 Dec 13 no follow-up yet
Javier E

The Rise of the Drone Master: Pop Culture Recasts Obama - NYTimes.com - 0 views

  • the most common artistic themes revolve around the surveillance and privacy issues.
  • “Where you have a black president but deeply racist policies are continuing like in the prison population, you have a lot of artists who are deeply interested in these contradictions,”
  • . Artists have focused particularly on the N.S.A. spying revelations disclosed by Edward J. Snowden and the president’s “kill list” of terrorists targeted by drones.
  • ...1 more annotation...
  • a virtual arts festival of films, books, plays, comics, television shows and paintings have been using as their underlying narratives the sometimes grim reality of Mr. Obama’s presidency.
Javier E

Ruth Marcus: A Chinese infatuation with 'House of Cards' - The Washington Post - 0 views

  • To Chinese viewers, however, “House of Cards” serves as a streaming-video CliffsNotes to the U.S. political system.
  • “It basically confirms what Chinese think of their own government.”
  • Which explains the series’ usefulness to Chinese leaders: It helps level the political playing field.
  • ...2 more annotations...
  • “House of Cards” also serves as a valuable inoculation against Chinese citizens’ cynicism about their own government. Listen to Chinese officials, and there is a distinct pattern of Ping-Pong rhetoric. You say Tiananmen Square, they toss back Abu Ghraib. You invoke Liu Xiaobo, the jailed Nobel Peace Prize laureate, they counter with Edward Snowden
  • “House of Cards” offers a similar opportunity for claimed equivalence, perhaps more convincing because it is produced by the adversary. If the Chinese view their own leadership as corrupt and their system rigged — well, then, U.S. politicians are no better. Thus, China’s U.S. ambassador, Cui Tiankai, was only too happy to observe that the show “embodies some of the characteristics and corruption that is present in American politics.”
Javier E

The Latest Snowden Leak Is Devastating to NSA Defenders - Conor Friedersdorf - The Atla... - 0 views

  • The NSA collects and stores the full content of extremely sensitive photographs, emails, chat transcripts, and other documents belong to Americans, itself a violation of the Constitution—but even if you disagree that it's illegal, there's no disputing the fact that the NSA has been proven incapable of safeguarding that data. There is not the chance the data could leak at sometime in the future. It has already been taken and given to reporters.
Alex Trudel

Europe Is Spying on You - The New York Times - 0 views

  • STRASBOURG, France — When Edward Snowden disclosed details of America’s huge surveillance program two years ago, many in Europe thought that the response would be increased transparency and stronger oversight of security services. European countries, however, are moving in the opposite direction. Instead of more public scrutiny, we are getting more snooping.
  • France recently adopted a controversial law on surveillance that permits major intrusions, without prior judicial authorization, into the private lives of suspects and those who communicate with them, live or work in the same place or even just happen to be near them.
  • Meanwhile, Austria is set to discuss a draft law that would allow a new security agency to operate with reduced external control and to collect and store communication data for up to six years. The Netherlands is considering legislation allowing dragnet surveillance of all telecommunications, indiscriminate gathering of metadata, decryption and intrusion into the computers of non-suspects. And in Finland, the government is even considering changing the Constitution to weaken privacy protections in order to ease the adoption of a bill granting the military and intelligence services the power to conduct electronic mass surveillance with little oversight.
  • ...5 more annotations...
  • More recently, as new technologies have offered more avenues to increase surveillance and data collection, the court has reiterated its position in a number of leading cases against several countries, including France, Romania, Russia and Britain, condemned for having infringed the right to private and family life that in the interpretation of the cour
  • unnecessary “wide-ranging and particularly serious interference with the fundamental right to respect for private life” and personal data, this court reaffirmed the outstanding place privacy holds in Europe
  • If European governments and parliaments do not respect fundamental principles and judicial obligations, our lives will become much less private. Our ability to participate effectively in public life is threatened, too, because these measures curtail our freedom of speech and our right to receive information — including that of public interest. Not all whistleblowers have the technical knowledge Mr. Snowden possessed. Many would fear discovery if they communicated with journalists, who in turn would lose valuable sources, jeopardizing their ability to reveal unlawful conduct in both the public and private spheres. Watergates can only happen when whistleblowers feel protected.
  • First, legislation should limit surveillance and the use of data in a way that strictly respects the right to privacy as spelled out in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, European data protection standards, the case law of the European Court of Human Rights and that of the European Court of Justice. These norms oblige states to respect human rights when they gather and store information relating to our private lives and to protect individuals from unlawful surveillance, including when carried out by foreign agencies.
  • Third, security agencies must operate under independent scrutiny and judicial review. This will require intrusive oversight powers for parliaments and a judiciary that is involved in the decision-making process to ensure accountability. Countries that have adopted controversial surveillance laws should reconsider or amend them. And those considering new surveillance legislation should do so with great caution.
katyshannon

Apple Fights Order to Unlock San Bernardino Gunman's iPhone - The New York Times - 0 views

  • Last month, some of President Obama’s top intelligence advisers met in Silicon Valley with Apple’s chief, Timothy D. Cook, and other technology leaders in what seemed to be a public rapprochement in their long-running dispute over the encryption safeguards built into their devices.
  • But behind the scenes, relations were tense, as lawyers for the Obama administration and Apple held closely guarded discussions for over two months about one particularly urgent case: The F.B.I. wanted Apple to help “unlock” an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif., in December, but Apple was resisting.
  • When the talks collapsed, a federal magistrate judge, at the Justice Department’s request, ordered Apple to bypass security functions on the phone.
  • ...24 more annotations...
  • The order set off a furious public battle on Wednesday between the Obama administration and one of the world’s most valuable companies in a dispute with far-reaching legal implications.
  • This is not the first time a technology company has been ordered to effectively decrypt its own product. But industry experts say it is the most significant because of Apple’s global profile, the invasive steps it says are being demanded and the brutality of the San Bernardino attacks.
  • Law enforcement officials who support the F.B.I.’s position said that the impasse with Apple provided an ideal test case to move from an abstract debate over the balance between national security and privacy to a concrete one
  • The F.B.I. has been unable to get into the phone used by Syed Rizwan Farook, who was killed by the police along with his wife after they attacked Mr. Farook’s co-workers at a holiday gathering.
  • Magistrate Judge Sheri Pym of the Federal District Court for the District of Central California issued her order Tuesday afternoon, after the F.B.I. said it had been unable to get access to the data on its own and needed Apple’s technical assistance.
  • Mr. Cook, the chief executive at Apple, responded Wednesday morning with a blistering, 1,100-word letter to Apple customers, warning of the “chilling” breach of privacy posed by the government’s demands. He maintained that the order would effectively require it to create a “backdoor” to get around its own safeguards, and Apple vowed to appeal the ruling by next week.
  • Apple argues that the software the F.B.I. wants it to create does not exist. But technologists say the company can do it.
  • pple executives had hoped to resolve the impasse without having to rewrite their own encryption software. They were frustrated that the Justice Department had aired its demand in public, according to an industry executive with knowledge of the case, who spoke on the condition of anonymity about internal discussions.
  • The dispute could initiate legislation in Congress, with Republicans and Democrats alike criticizing Apple’s stance on Wednesday and calling for tougher decryption requirements.
  • His vote of confidence was significant because James Comey, the F.B.I. director, has at times been at odds with the White House over his aggressive advocacy of tougher decryption requirements on technology companies. While Mr. Obama’s national security team was sympathetic to Mr. Comey’s position, others at the White House viewed legislation as potentially perilous. Late last year, Mr. Obama refused to back any legislation requiring decryption, leaving a court fight likely.
  • The Justice Department and the F.B.I. have the White House’s “full support,” the spokesman, Josh Earnest, said on Wednesday.
  • Donald J. Trump, the Republican presidential contender, also attacked Apple on Fox News, asking, “Who do they think they are?”
  • But Apple had many defenders of its own among privacy and consumer advocates, who praised Mr. Cook for standing up to what they saw as government overreach.
  • Many of the company’s defenders argued that the types of government surveillance operations exposed in 2013 by Edward J. Snowden, the former National Security Agency contractor, have prompted technology companies to build tougher encryption safeguards in their products because of the privacy demands of their customers.
  • Privacy advocates and others said they worried that if the F.B.I. succeeded in getting access to the software overriding Apple’s encryption, it would create easy access for the government in many future investigations.
  • The Apple order is a flash point in a dispute that has been building for more than a decade. Advertisement Continue reading the main story Advertisement Continue reading the main story
  • The F.B.I. began sounding alarms years ago about technology that allowed people to exchange private messages protected by encryption so strong that government agents could not break it. In fall 2010, at the behest of Robert S. Mueller III, the F.B.I. director, the Obama administration began work on a law that required technology companies to provide unencrypted data to the government.
  • Lawyers at the F.B.I., Justice Department and Commerce Department drafted bills around the idea that technology companies in the Internet age should be bound by the same rules as phone companies, which were forced during the Clinton administration to build digital networks that government agents could tap.
  • The draft legislation would have covered app developers like WhatsApp and large companies like Google and Apple, according to current and former officials involved in the process.
  • There is no debate that, when armed with a court order, the government can get text messages and other data stored in plain text. Far less certain was whether the government could use a court order to force a company to write software or redesign its system to decode encrypted data. A federal law would make that authority clear, they said.
  • But the disclosures of government surveillance by Mr. Snowden changed the privacy debate, and the Obama administration decided not to move on the proposed legislation. It has not been revived.
  • The legal issues raised by the judge’s order are complicated. They involve statutory interpretation, rather than constitutional rights, and they could end up before the Supreme Court.
  • As Apple noted, the F.B.I., instead of asking Congress to pass legislation resolving the encryption fight, has proposed what appears to be a novel reading of the All Writs Act of 1789.
  • The law lets judges “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
katyshannon

N.S.A. Contractor Arrested in Possible New Theft of Secrets - The New York Times - 0 views

  • The F.B.I. secretly arrested a former National Security Agency contractor in August and, according to law enforcement officials, is investigating whether he stole and disclosed highly classified computer code developed by the agency to hack into the networks of foreign governments.
  • The arrest raises the embarrassing prospect that for the second time in three years, a contractor for the consulting company Booz Allen Hamilton managed to steal highly damaging secret information while working for the N.S.A.
  • In 2013, Edward J. Snowden, who was also a Booz Allen contractor, took a vast trove of documents from the agency that were later passed to journalists
  • ...6 more annotations...
  • The contractor was identified as Harold T. Martin III of Glen Burnie, Md., according to a criminal complaint filed in late August and unsealed Wednesday
  • Mr. Martin, who at the time of his arrest was working as a contractor for the Defense Department after leaving the N.S.A., was charged with theft of government property and the unauthorized removal or retention of classified documents.
  • two dozen F.B.I. agents wearing military-style uniforms and armed with long guns stormed the house, and later escorted Mr. Martin out in handcuffs.
  • F.B.I. discovered thousands of pages of documents and dozens of computers or other electronic devices at his home and in his car, a large amount of it classified. The digital media contained “many terabytes of information,” according to the documents
  • also discovered classified documents that had been posted online, including computer code, officials said. Some of the documents were produced in 2014.
  • authorities cannot say with certainty whether Mr. Martin leaked the information, passed them on to a third party or whether he simply downloaded them.
Megan Flanagan

Reviled by G.O.P., WikiLeaks Embraced by Trump for Clinton Email Leaks - The New York T... - 0 views

  • Donald J. Trump is suddenly embracing an unlikely ally: The document-spilling group WikiLeaks,
  • increasingly seizing on a trove of embarrassing emails from Hillary Clinton’s campaign
  • an extraordinary turnabout after years of bipartisan criticism of the organization
  • ...27 more annotations...
  • or past disclosures of American national security intelligence and other confidential information.
  • President Vladimir V. Putin of Russia insisted on Wednesday that his nation was being falsely accused.
  • Clinton, the Republican candidate said: “Maybe there is no hacking. But they always blame Russia,” he said, as part of an effort to “tarnish me.”
  • Based on a few emails plucked from the account, Mr. Trump and his team have accused Clinton aides of improperly receiving inside information from the Obama administration
  • the campaign received an update from the Department of Justice about the timing of the release of Mrs. Clinton’s State Department emails
  • Republican allies say he has come to believe that WikiLeaks could yield a critical mass of negative and destructive information — if not a smoking gun — that drives up Mrs. Clinton’s already high unfavorable ratings with voters and perhaps even derails her candidacy.
  • emails began to appear on Friday afternoon, just hours after the director of National Intelligence and the Department of Homeland Security issued a statement attributing previous hacks to the Russian government
  • The Clinton campaign is trying its own political jujitsu with the hacks,
  • there was “the possibility that Trump’s allies had advance knowledge of the release of these illegally obtained emails.”
  • Republicans have previously condemned WikiLeaks and similarly blasted the leaks by Edward J. Snowden, a National Security Agency contractor, and said they were evidence of carelessness by the Obama administration
  • if he keeps on pressuring on it, it really will help,”
  • touched off a feverish debate over government invading people’s privacy,
  • “I thought what Snowden did was disgraceful, treasonous. But the reality is the information is out there, and if Hillary doesn’t deny it then to me it certainly has to be used.”
  • Democrats showed no compunction about using unauthorized material when it came to Mr. Trump’s 1995 tax returns, or a leaked NBC audio recording of Mr. Trump boasting about groping
  • information that WikiLeaks and other outlets had made public from hacking collectives is “relevant.”
  • “But for this information, a number of revelations would remain secret — how Hillary Clinton really feels, how paranoid she really was about an Elizabeth Warren challenge, her ability to articulate a message that’s cohesive and credible,”
  • insisted showed “bias” toward Catholics.
  • the Clinton campaign seemed uncertain about how to navigate the disclosures,
  • Democrats expressed deep concern about how much more widespread the breaches could be.
  • WikiLeaks email will do little to help Mr. Trump attract more undecided voters, especially women, or reassure wavering Trump supporters.
  • “They ought to spend less time figuring out how to reinforce those people and more time trying to add to his vote column.”
  • He said the emails “make more clear than ever, just how much is at stake in November and how unattractive and dishonest our country has become.”
  • aggressively pushed the Clinton camp emails in news media briefings and cable news appearances
  • “reaffirmed” comments that he has made as a candidate about the two-faced nature of politicians and alleged malfeasance in government.
  • “It’s really backing up what the people have been feeling all of this time about the corruption of government, embedded, just the trickle-down corruption.”
  • the emails are highly unlikely to influence undecided voters
  • But 55 to 60 percent of the country is open to a Clinton presidency and wants to see the next president get to work with Congress to help the country.”
Javier E

In Edward Snowden's New Memoir, the Disclosures This Time Are Personal - The New York T... - 0 views

  • Without belaboring his points, Snowden pushes the reader to reflect more seriously on what every American should be asking already.
  • What does it mean to have the data of our lives collected and stored on file, ready to be accessed — not just now, by whatever administration happens to be in office at the moment, but potentially forever?
  • Should such sensitive work be outsourced to private contractors?
  • ...3 more annotations...
  • When can concerns about “national security” slip into bids for unchecked power?
  • What entails effective “oversight” if the public is kept in the dark?
  • The comments
Javier E

The Solitary Leaker - NYTimes.com - 0 views

  • If you live a life unshaped by the mediating institutions of civil society, perhaps it makes sense to see the world a certain way: Life is not embedded in a series of gently gradated authoritative structures: family, neighborhood, religious group, state, nation and world. Instead, it’s just the solitary naked individual and the gigantic and menacing state.
  • This lens makes you more likely to share the distinct strands of libertarianism that are blossoming in this fragmenting age: the deep suspicion of authority, the strong belief that hierarchies and organizations are suspect, the fervent devotion to transparency, the assumption that individual preference should be supreme.
  • Big Brother is not the only danger facing the country. Another is the rising tide of distrust, the corrosive spread of cynicism, the fraying of the social fabric and the rise of people who are so individualistic in their outlook that they have no real understanding of how to knit others together and look after the common good.
  • ...1 more annotation...
  • For society to function well, there have to be basic levels of trust and cooperation, a respect for institutions and deference to common procedures. By deciding to unilaterally leak secret N.S.A. documents, Snowden has betrayed all of these things.
redavistinnell

Iceland election could propel radical Pirate party into power | World news | The Guardian - 0 views

  • Iceland election could propel radical Pirate party into power
  • A party that favours direct democracy, complete government transparency, decriminalising drugs and offering asylum to Edward Snowden could form the next government in Iceland after the country goes to the polls on Saturday.
  • The radical party, founded by activists and hackers four years ago as part of an international anti-copyright movement, captured 5% of the vote in 2013 elections, winning three seats in Iceland’s 63-member parliament, the Althingi.
  • ...9 more annotations...
  • A poll last week put the Pirates, who hang a black pirate flag in their parliamentary office, on nearly 21% of the vote, far short of the 40%-plus it was polling at the height of mass anti-government protests this spring,
  • The party has ruled out any possibility of forming a coalition with either of the current two ruling parties
  • “the parties forming a government … hiding behind compromises in coalition – enabling them to cheat voters again and again”.
  • nce the 2008 crash when Iceland’s three biggest banks collapsed owing 11 times the country’s GDP, Reykjavík’s stock market fell 97% and the value of the krona halved, Iceland has recovered economically.
  • Support for the Independence party, the Pirates’ rival for the position of largest party, seems to be holding.
  • Birgitta Jónsdóttir, the Pirates’ parliamentary leader, has said her party is willing to form a government with any party that subscribes to its agenda of “fundamental system change”, including the introduction of a new, crowdsourced national constitution.
  • the party advocates an “unlimited right” for citizens to be involved in political decision-making, with voters able to propose new legislation and decide on it in national referendums.
  • This election follows the resignation of Iceland’s prime minister, Sigmundur Davið Gunnlaugsson, who became the first major casualty of the Panama Papers
  • “Across Europe, increasingly many people think that the system that is supposed to look after them is not doing it any more,” Jónsdóttir said. “But we know we are new to this, and it is important that we are extra careful and extra critical on ourselves to not take too much on.”
1 - 20 of 35 Next ›
Showing 20 items per page