Tag: NSA

CB Radio: The Wild West We Forgot About

Ellie McFarland | @El_FarAwayLand

Every year, I go to my parents’ old alma mater in central West Virginia. Outside McCuskey Hall, there’s a grove of enormous oak trees, casting shade on the grassy field. In the fall it is absolutely picturesque. Every year my dad tells me and my sister the same story. When he was in college in the late 80s, he would climb one of the oaks and string up a hammock in the branches. He spent most of his time in these trees with his friends, chatting and practicing dove-calls. But sometimes, he would haul his ham radio (amateur radio) into the branches and talk to kids across the campus or call my mother in the other dorm hall. All the while, he feared to break a major law by ordering a pizza.

Continue reading “CB Radio: The Wild West We Forgot About”

Advertisements

Repeal the Patriot Act

Ellie McFarland | @El_FarAwayLand

On October 26th, 2001, George W. Bush signed into law The Patriot Act, which was written in the wake of the 9/11 World Trade Center attacks and has been obscuring the rights of American and foreign citizens ever since. The Patriot Act is a “security law” which tremendously broadened the search and surveillance powers of the United States government, allowing law enforcement to access the emails, phone calls, browsing history, and spending habits of private citizens all in the name of counter-terrorism. According to the United States government, the future possibility of danger outweighs the ongoing and present subjugation of the rights to privacy and personal autonomy.

To restrict any citizen’s freedoms requires a very good reason, and for some, the “threat of terrorism” is enough. But with this agreed idea in mind, a few things need to be at the forefront of the conversation. Is there a clear and present danger relating to terrorism which is persistent enough to warrant the restriction of rights? Is the possibility of an attack enough to warrant the restriction of rights? Does The Patriot Act work in practice? And is The Patriot Act moral in theory?

Continue reading “Repeal the Patriot Act”

Government Surveillance Is Terribly Threatening

By Teagan Fair | United States

“Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” This is a notorious quote by Benjamin Franklin, useful in many arguments advocating for liberty. Commonly, gun advocates use it to oppose gun control However, there are many other situations where this quote is appropriate. For example, it is also pertinent while advocating against government surveillance. Supposedly, surveillance is “purchasing” a little bit of temporary safety: a very small amount, in trade for our liberty.

An Insignificant Statistic

A common argument in favor of government surveillance is that it supposedly protects us from terrorists. But according to Business Insider, since 9/11, only six Americans have died per year from Islamic terrorists, both foreign and domestic. The article also provides a handy chart comparing the probability of this to other causes of death.

BI Graphics_Odds of Dying

As you can see, there are many obscure causes of death that are far more probable. So no, this should not be a concern of the general public in the first place. In any other situation, such an insignificant number would be laughable.

UN: U.S. Government Surveillance Is Symbolic

While talking about the practicality of surveillance, even the UN has stated that it is essentially a show of gesture-politics, rather than result-oriented. Or in other words, the UN states that government surveillance is based more on symbolism and symbolic gestures rather than a good outcome. And as for the ‘results’ surveillance does come with:

“[The FBI general counsel] defined as useful those [leads] that made a substantive contribution to identifying a terrorist, or identifying a potential confidential informant. Just 1.2 percent of them fit that category.”

Thus, surveillance does not protect us from terrorists nearly as much as supporters would like you to believe. Yet, there are still some clear detriments that surveillance allows for.

Authoritarian Regimes

For example, many oppressive regimes use mass surveillance on their citizens, much like in the U.S. In many cases, they claim to care for security and the good of the people. But some countries that practice this include North Korea, Saudi Arabia, and Cuba. Clearly, the good of the people can be a lie.

In the modern day, in fact, mass surveillance systems are quite popular among authoritarian regimes. Regardless of whether you would classify the U.S. as authoritarian, its government has certainly increased intervention in the lives of citizens. Surely, this in itself is a concerning realization.

Going beyond simple ineffectiveness and harmful effects, it is also worth examining the morals of government surveillance. Although we hear surveillance is for our own good, many Americans would disagree. In fact, 57% say it is wrong for the government to monitor its own citizens.

A common argument for surveillance is ‘if you have nothing to hide, then you have nothing to worry about.’

Funny. This quote sounds awfully familiar. It’s almost like it was propaganda for another authoritarian regime. Yes, that’s right: Nazi Minister Joseph Goebbels used the line to pacify Germans in 1933.

Similar Situations

Edward Snowden, a man notorious for exposing NSA records, also has an intriguing quote against government surveillance. He states the following: “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.”

He is spot on with this quote; the ‘nothing to hide’ argument is deeply flawed.

Protecting your information from the government has a number of parallels. Would you want your private texts, emails and phone calls to be available to co-workers you don’t know? No, of course not. The majority of people would agree that this is an invasion of privacy.

Government action is hardly different. One of the only things dissimilar, in fact, is that the government can act upon what you do and say, potentially harming you for nonviolent action. This is far more dangerous. Obviously, many of us get weirded out when somebody leans over our shoulder to view our texts. This is what is happening in our government, but at mass levels.

The Right to Privacy

You also do not need a reason to exercise a right in order for it to exist. For example, the 1st Amendment protects the right to assemble, even if you do not feel you need it. Perhaps you will never feel the need to assemble publicly. However, this does not give the state the right to take that ability away from you. The same goes for privacy. Whether or not you ‘need’ privacy is irrelevant: it is always wrong to take it away.

Our government is stripping our liberties, especially privacy. For what? Essentially nothing. If anything, government surveillance allows the state to take further control over our lives. Perhaps it’s time to get more serious about our right to privacy and take a stand.


71 Republic prides itself on distinctively independent journalism and editorials. Every dollar you give helps us grow our mission of providing reliable coverage. Please consider donating to our Patreon, which you can find here. Thank you very much for your support!

Featured Image Source

The Republican and Democrat Agendas are Hypocritical

By Ian Brzeski | United States

Disclaimer: When I refer to Republicans and Democrats, I’m not talking about every single person who aligns with the Republican or Democratic party. Rather, I am talking about their platforms as a whole as well as their “leaders” and hypocritical followers.

Both the Republican and Democratic platform are hypocritical in every sense of the term. Whether it is their agenda or on specific topics at hand, they allow themselves to fall onto multiple contradictions and fallacies in their arguments. For example, Republicans and Democrats both display hypocrisy when it comes to the issues of guns and immigration. Republicans are quick to push their agenda against illegal immigration when an illegal kills somebody because, according to them, illegal immigration allows those who like to murder and rape people to enter the US. They argue that if we had stronger deportation measures and a border wall, then many individual citizens such as Mollie Tibbetts would still be alive. Democrats are quick to push their agenda for gun control when a shooting happens because, according to them, guns and gun owners are dangerous and often kill many people. They say how if we had more gun control, then many of the victims in the mass shootings would still be alive such as the students who passed in Parkland.

Republicans defend guns by saying that Democrats are just trying to push their agenda when a horrible tragedy such as a mass shooting happens. Republicans say it is vile and disgusting how Democrats would try to push their agenda on gun control instead of showing respect to the victims. They claim that it is a societal problem and not a gun problem. People kill people; guns do not kill people, and besides, people are just going to get guns regardless.

Democrats defend illegal immigration by saying that Republicans are just trying to push their agenda when a horrible tragedy such as the murder of a girl from Iowa happens. Democrats say it is vile and disgusting how Republicans would try to push their agenda on stronger borders instead of showing respect to the victims. They claim that it is a societal problem and not an illegal immigration problem. People kill people; illegals are not the only people who kill people in this country.

Republicans and Democrats make the same argument when substituting the word(s) “guns” with “illegal immigration.” Who knew that the majority of Republicans and Democrats are not that much different? They use the same argument on various issues. They even both bash each other on how they portray their stances. To an extent, the parties also fall subject to the slippery slope fallacy when describing how guns/illegal immigration are the causes of the death of various people.

The slippery slope fallacy is a logical fallacy that implies that a small action will lead to a much more significant action with enormous consequences. Saying that having less secure borders will lead to more murders is a solid example of this fallacy and the same goes for saying that the sale of firearms will lead to more murders.

Who is the Bigger Hypocrite?

Most Republicans are bigger hypocrites than the Democrats. They claim to support small government except for when it comes to:

  • The wall across the Mexican border
  • The Space Force
  • A stronger governmental police force
  • A massive military
  • Tariffs
  • Military parades
  • The War on Drugs
  • The War on Terror
  • Trump regulating social media
  • TSA
  • NSA
  • DEA
  • ICE
  • And many more

The only difference with the Republicans and the Democrats here is that they disagree with what should be funded by the government. For every government program defunded by Republicans, another government program is funded that fits the Republicans’ agenda. At least the Democrats openly admit that they are for a bigger and stronger government.

Democrats could just as quickly say the phrase “Taxation is theft,” and it would still have the same meaning when Republicans say it. Establishment Democrats and establishment Republicans are the same; they are all pro-war and pro-big government hawks. Obama openly says he is against the wars in Iraq and Afghanistan and then proceeds to bomb more countries than any of his predecessors. The Republicans claim to be for smaller government and pro-life, yet when Senator Rand Paul introduces a bill to defund Planned Parenthood, the bill does not pass despite Republicans having the majority in the House and the Senate. Does this sound like a small government platform?

The fact of the matter is that the majority of the Republicans preach a pro-liberty position, but their actions and ideas say otherwise. However, not every single Republican is one of these establishment politicians. There are still few Republicans out there who stay true to their pro-liberty and small government agenda, such as Senator Rand Paul, Rep. Thomas Massie, Rep. Justin Amash, and Austin Petersen to name a few.

Stuck in the Same Cycle

Regardless of who is in charge, the government still become stronger, taxes and spending increase, and our national debt continues to grow. We have a “pro-liberty” president who keeps fighting the war on terror, keeps funding the war on drugs, has the notion that tariffs are good for the economy, and now wants to start printing money to get us out of our national debt. Nothing of recent has changed regarding the United States. Voting Republican or voting Democrat will be practically voting for the same person the majority of the time. Not voting for a third party because you are afraid that it is giving away a vote to the “rival” candidate may be one of the worst excuses to use because either way you are most likely voting for big government establishment hawks.

As a result of this two-party system and hypocritical nature of the parties, the government continually grows into a stronger, more coercive force that inhibits on our personal freedoms to make decisions for us. Thinking that voting third party is a waste is a dangerous ideology. We will never see a real change by always voting in these establishment candidates. We will have the same problems that we continuously complain about, nothing will get changed, we will continue to stay in the same cycle that we have been going through, and people are too blind to realize this.

Republicans and Democrats have the false sense that they are pitted against each other. There are other options out there, and people need to realize that. People need to stop voting based on parties and need to start voting based on principle.  Watch a debate between Republicans and Democrats, and it is easy to see that the discussion just turns into a name calling blame game. It is one of the most pathetic things a person could ever see. Their arguments have no real substance or conviction, and they always seem to attack the person as an individual and not their ideas.

“When the debate is lost, slander becomes the tool of the losers” – Socrates

Republican or Democrat, it doesn’t matter. We are always going to be stuck in a never ending cycle if people do not stop blindly following party positions. It does not matter whether you identify as a Conservative, Progressive, Libertarian, or Socialist. Do your research and vote for who you think is going to bring about the most significant possible change to our crooked establishment system. Don’t vote for somebody based on their party or if they are a lesser evil, vote for somebody you believe in.


Get awesome merchandise. Help 71 Republic end the media oligarchy. Donate today to our Patreon, which you can find here. Thank you very much for your support!

Featured Image Source

US-Russian Cybersecurity: Espionage at Home and Afar

By Joshua D. Glawson | United States

Ever since the creation of the internet, people have constantly been concerned with hacking, privacy, security on and offline, protection from malware and viruses, etc. This is what gave way to many industries being started, revolving and evolving alongside the internet and its continual development. According to the Merriam-Webster Dictionary, cybersecurity is the measure taken to protect a computer, or computer system, on the internet against unauthorized access or attack. In the US, and among many countries in the world, cybersecurity drastically changed post 9/11 due to supposed worry for further terrorist attacks on the US and respective countries. These changes threw out Liberty in the name of protectionism, and have changed national and international relations, especially when dealing with cybersecurity.

After the attacks on September 11th, 2001, in the US, the USA PATRIOT Act, also known simply as the “Patriot Act,” was passed on October 26th, 2001.The acronym stands for “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.” As pertaining to cybersecurity, Title VIII of the Patriot Act granted the US government the ability to essentially spy on civilians within the US who were showing signs of possible terrorism, cyberterrorism, racketeering, etc., via communication through the internet on computers and phones.

However, the National Security Agency (NSA) who headed the Patriot Act program, also collected metadata from everyone within the US. According to the NSA, their “role in U.S. cybersecurity includes its primary information assurance mission: serving as the National Manager for National Security Systems. National Security Systems include U.S. systems that contain classified information or are otherwise critical to U.S. military or intelligence missions.” The NSA also uses a system known as PRISM, also known as SIGAD, which collects internet communications from various U.S. internet companies rather than directly from the targeted individuals. Laws allowing such software are easily passed since many in the US feel it is okay to monitor, regulate, and collect information and data from companies.

Nevertheless, the Patriot Act failed miserably to thwart terrorist acts and hacking in cyberspace, but it successfully helped to usher in a constant police state of government surveillance and the collection of digital information over the web. Without NSA whistleblowers such as Perry Fellwock, Russ Tice, Mark Klein, William Binney, Thomas Tamm, Thomas Drake, Edward Snowden, and others, much of this overreach of government would have continued unknown by the masses, and many of the Patriot Act’s policies would have continued without interruptions. But despite their heroism, the police state via cybersecurity and spying continues within the US and the world.

We know it is an overreach of US government as Title II of the Patriot Act allowed mass surveillance and collection of information without a warrant or specified reasons for individuals, thus an infringement on the US Constitution’s 4th Amendment which stipulates that it is, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Additionally, former US President, George W. Bush, also passed the Protect America Act which was an amendment on FISA to also allow warrant-less searches and surveillance on digital platforms. These warrant-less and unrelenting search additions have been extended to at least December 31st, 2023, under FISA Article VII, section 702. Yet, under the ruse of ‘protection,’ government has trampled the Constitution in order to increase cybersecurity within the US and the world.

Once the Patriot Act expired in 2015, the USA FREEDOM Act was implemented. It is also an acronym meaning Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act. Also known simply as “the Freedom Act,” it was really an extension of the Patriot Act, but the public image was perceived as a little less Big Brother since supposedly metadata collected was only stored for six months as opposed to indefinitely. Still yet, the Foreign Intelligence Surveillance Act of 1978 underlies both the Patriot Act and Freedom Act, granting permission to the US government to physically and electronically spy on foreign powers within the US and out, as well as any agents of foreign powers; after the development of the internet, these measures now include the careful watch through cybersecurity.

Of course, prior to the Patriot Act and Freedom Act, there have been US and world organizations such as ECHELON, also known as the Five Eyes abbreviated as ‘FVEY,’ which most likely started around 1941. This is an intelligence alliance between the US, Australia, Canada, United Kingdom, and New Zealand. This agency collects information of people all over the world as a response to a post-WWII world, when these countries had an unofficial and secret agreement known as the BRUSA Agreement in 1943, and officially signed under the UKUSA Agreement in 1946.

According to many documents released by Edward Snowden, “The Five Eyes is a supra-national intelligence organization that does not answer to the known laws of its own countries,” and since it is outside countries spying on citizens of other countries, they are able to step around regulations and restrictions, as the organization acts outside of the law. Included in their acquisition of information, via the internet through smartphones and computers, cybersecurity is a key component, especially in the world we live in today which almost requires communication through the internet. Suffice it to say, whether the US or other governments publicly announce that they are taking measures of spying and various acts of cybersecurity, they have been and will continue to do so off the record.

The ongoing record keeping through spying via cybersecurity is performed not only by the NSA and the Five Eyes, but also through the Defense Intelligence Agency (DIA), Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), and the Department of Homeland Security (DHS) to name a few. While the DIA focuses on federal level defense and military topics, the CIA focuses on more general intelligence needs of the President. This grants the DIA more special privileges to assist the Secretary of Defense, the Joint Chiefs of Staff, and Combatant Commanders, to act outside of normal protocol. The DIA works directly with the Five Eyes through their own network known as “Stone Ghost,” with the same aforementioned countries, furthering the perpetual international collection of information in the name of security.

In May of 2011, the White House released the “International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World.” This was an Obama White House cybersecurity policy stating the following:

 “Natural disasters, accidents, or sabotage can disrupt cables, servers, and wireless networks on U.S. soil and beyond. Technical challenges can be equally disruptive, as one country’s method for blocking a website can cascade into a much larger, international network disruption. Extortion, fraud, identity theft, and child exploitation can threaten users’ confidence in online commerce, social networks and even their personal safety. The theft of intellectual property threatens national competitiveness and the innovation that drives it. . . . Cybersecurity threats can even endanger international peace and security more broadly, as traditional forms of conflict are extended into cyberspace.”

In February of 2013, “The Foreign Policy Concept of the Russian Federation,” approved by the President of the Russian Federation, Vladimir Putin, released his version of cybersecurity policy stating the following:

Russia will act according to its national interests in providing national and international information security, preventing political, economic and social security threats emerging in cyberspace, to fight terrorist and other criminal kinds of criminal activity. Russia opposes military-political use of information technologies that contradict international law, including actions aimed at interference in domestic affairs, as well as that kind of using IT that pose threat to international peace, security and stability.”

However, by April of 2013, The Center for International and Security Studies at Maryland addressed ongoing US-Russian cybersecurity relations that seemed to be building conflict between the two countries. For a few years prior, Russia had been accused of cyberattacks around the world, especially on the US. Of course, the US’ cybersecurity is primarily concerned with the US and its closest allies, especially those of the Five Eyes and North Atlantic Treaty Organization (NATO).

NATO’s cybersecurity programs were born out of the concerns of NATO members who accused Russia of being complicit in cyberattacks on their critical infrastructures years prior. In response to these eventually dismissed allegations, Russia led efforts to adopt international collective cybersecurity measures in Shanghai’s Cooperation Organization and with the Collective Security Treaty Organization. Furthermore, Russia also initiated a discussion about a “Convention on International Information Security,” which would help detect the basic threats to international information security and confirm threats.

This School of Public Policy at the University of Maryland report summarized the issues and US-Russia cybersecurity relations as follows:

“Threats to cyberspace and to information security are emerging as central elements of Russian-U.S. security relations. As much as U.S. officials have expressed concerns about Russian-sponsored cyber-activities, Russia is equally concerned about U.S. military intentions in the cyber domain. Differing definitions of what activities pose a threat complicates relations on this issue. While the United States is concerned primarily with threats to technology and economic well-being, Russia is also concerned about activities that threaten interference in Russian sovereign affairs. Russian concerns have been heightened by repeated U.S. rebuffs on draft U.N. resolutions to address some threats. U.S. and NATO pronouncements about the need for collective defense against cyberattacks have raised similar concerns. Ongoing Russian-U.S. cooperation at the highest level demonstrates that the states recognize the common interests at stake, but officials will have to work on a mutually beneficial basis to make any level of cooperation work.”

In June of 2013, under the Obama administration in contractual agreement with Russian President Putin, the two countries signed a cybersecurity agreement. The Obama White House released the following statements:

Recognizing the extraordinary growth in the use of information and communications technologies (ICTs), the United States and the Russian Federation have engaged in dialogue over the past two years on international security in this new and crucial area.  Our two nations now are leading the way in extending traditional transparency and confidence-building measures to reduce the mutual danger we face from cyber threats.” “The United States and the Russian Federation are creating a new working group, under the auspices of the Bilateral Presidential Commission, dedicated to assessing emerging ICT threats and proposing concrete joint measures to address them.” “The United States and the Russian Federation have also concluded a range of steps designed to increase transparency and reduce the possibility that a misunderstood cyber incident could create instability or a crisis in our bilateral relationship.  Taken together, they represent important progress by our two nations to build confidence and strengthen our relations in cyberspace; expand our shared understanding of threats appearing to emanate from each other’s territory; and prevent unnecessary escalation of ICT security incidents.”

In 2014, US Secretary of the State, John Kerry, released a statement that included specified goals of the US’ cybersecurity platform entitled “Pillars of The International Strategy for Cyberspace.” The policy added promoting norms and building international security, fighting cybercrime, strengthening internet public policy and internet governance, supporting internet freedom, performing internet due diligence, and developing the Internet and Information and Communication Technologies (ICTs) for economic growth. The official US policy contained the following statement:

“The Secretary’s Office of the Coordinator for Cyber Issues works to implement the International Strategy for Cyberspace, which outlines the U.S. vision for the future of cyberspace, and sets the agenda for partnering with other nations and peoples to realize it. As described in the International Strategy, the United States seeks a cyberspace environment that rewards innovation, empowers individuals, strengthens communities, builds better governments, expands accountability, safeguards fundamental freedoms, enhances personal privacy, and strengthens national and international security.”

In May of 2018, the DHS released their latest in cybersecurity policies including seven guiding principle- Risk Prioritization, Cost-effectiveness, Innovation and Agility, Collaboration, Global Approach, Balanced Equities, and National Values. The policy went on, stating the following:

Through our efforts to accomplish seven identified goals across these five pillars, we work to ensure the availability of critical national functions and to foster efficiency, innovation, trustworthy communication, and economic prosperity in ways consistent with our national values and that protect privacy and civil liberties.”

            The DHS cybersecurity policy of 2018 includes five pillars and seven goals.

  • Pillar I – Risk Identification

Goal 1: Assess Evolving Cybersecurity Risks.

We will understand the evolving national cybersecurity risk posture to inform and prioritize risk management activities.

  • Pillar II – Vulnerability Reduction

Goal 2: Protect Federal Government Information Systems.

We will reduce vulnerabilities of federal agencies to ensure they achieve an adequate level of cybersecurity.

Goal 3: Protect Critical Infrastructure.

We will partner with key stakeholders to ensure that national cybersecurity risks are adequately managed.

  • Pillar III – Threat Reduction

Goal 4: Prevent and Disrupt Criminal Use of Cyberspace.

We will reduce cyber threats by countering transnational criminal organizations and sophisticated cyber criminals.

  • Pillar IV – Consequence Mitigation

Goal 5: Respond Effectively to Cyber Incidents.

We will minimize consequences from potentially significant cyber incidents through coordinated community-wide response efforts.

  • Pillar V – Enable Cybersecurity Outcomes

Goal 6: Strengthen the Security and Reliability of the Cyber Ecosystem.

We will support policies and activities that enable improved global cybersecurity risk management.

Goal 7: Improve Management of DHS Cybersecurity Activities.

We will execute our departmental cybersecurity efforts in an integrated and prioritized way.

 

Despite all of these policies, departments spying nationally and internationally, software for constant watch in cyberspace, during the 2016 US Presidential elections, it has been stated by the US government that Russia mingled in the election process, hacked the Democratic Party’s (DNC) servers and computers, including Hillary Clinton’s emails, and many believe they possibly got Trump elected as US President. However, the official report claims that no tampering with the vote count took place. On July 13th, 2018, twelve Russian agents were indicted as being the conspirators and hackers. This group worked with Russian Federation’s Main Intelligence Directorate of the General Staff, also known as GRU.

On July 16th, 2018, Trump met with Putin and they discussed a number of things including Trump questioning Putin if Russia committed those acts, to which Putin denied. Trump and Putin went on to assert that they both believe their countries should work together to ensure cybersecurity for both countries and the world. Yet, due to the supposed hacking and mingling in the election process, many in US Congress have said that Trump’s offer to work with Russia and Putin is near treasonous and wrong.

However, as stated earlier, during Obama’s administration the Russians had been accused of supposedly committing cyberattacks and cyberterrorism in the US and other countries, Obama also met with Putin, and the two countries signed agreements to work with one another in cybersecurity. The contradictions and hypocrisy of Congress and those in the media is just as perplexing as the amount of cybersecurity the US and Russia already have, and yet these supposed acts of cyberattacks and hacking continue. This is not a statement in support of Trump, rather, things do not add up.

During the 2016 US Presidential Campaign, it was stated by Trump repeatedly that Hillary Clinton had rid her computers and servers of thousands of emails that included illegal activities by Clinton. If Clinton caused the problem with the servers and emails, the federal government or Congress would not want that information out because it would jeopardize the legitimacy of the government and the DNC. If Trump colluded with the Russians to gain election, it would undermine the election process, while also questioning the legitimacy of Justice within the government.

Also, if Trump advocated for the hacking of the DNC in order to gain private or secure information on Clinton, it undermines legal processes and the cybersecurity of the US. Both accounts would call into question the cyber capabilities of the US government. The best case scenario for the federal government is to point to outside countries rather than internal. If Trump says he does not believe Putin or that he does believe the tampering occurred, this puts Trump at a more trustworthy stance with the US and world than that of Putin and Russia. Equally, Trump agreeing that the Russians did perform the attacks and hacks would give his former running opponent, Hillary Clinton, a means to save face. In the end, all of this may be evidence of faux diplomacy more than actual cyber threats.

As for the ongoing spying, hacking, and watch of the US government, the Five Eyes, Russia, and others, via cybersecurity, there is not much that can be done at this point, until politicians and the civilians of these countries begin making changes. Although the US and Russia have signed cybersecurity agreements, it does not seem to be helping or it is all a ruse. Until changes have been made, it is good that whistleblowers like Snowden and others are willing to risk everything to point out the wrong being done by governments, and it behooves every individual to protect themselves in cyberspace.


To support 71 Republic, please donate to our Patreon, which you can find here.

Featured Image Source