#FreeAnons #Lorax #LoraxLive / all perse

#FreeAnons #Lorax #LoraxLive / all persecuted Anons ARE heroes in any book

We have only 4 days to sell these awesome hoodies to provide assistance to Lorax. Once they are gone, they are gone for good. All of the funds raised will go to support the host of #LoraxLive Radio Anonops who was silenced by arrest one year ago. We need your help to make this happen and thank you to all who stand and fight for the ones who can’t be here to fight themselves.

http://ow.ly/NE9I9

Cybergovernance and Cyberwarfare: In Whose Interests?

arpanetCybergovernance and cyberwarfare are nothing more than flawed concepts attempting to imitate real world processes, invoked by governments, on behalf of the Corporatocracy, to control people, resources, and economies world-wide through cyberspace. Think tanks like the Council on Foreign Relations aim to analyze current situations with a goal to justify and rationalize those acts and establish best practices for accomplishing those specific aims, also on behalf of the Corporatocracy.

When the Internet was originally created by DARPA (ARPANet), one of it’s purposes was to provide a means of communication that could not be destroyed by ‘enemies of the state’.

“Additionally, given that ARPA was an agency of the Defense Department, part of the motivation was related to the desire of the U.S. Military to develop a survivable communication structure in the event of nuclear attack, (though this was not the primary motivating factor that it is often emphasized to be.) After a decade of remaining a closed computer network ARPANET transformed into the openly networked Internet of the modern age. “ ~ http://www.newmedia.org/history-of-the-internet.html

Of course, the key here is how one interprets what the state is and who it’s enemies are. According to the US Constitution, the state is, ‘We, the People’ and the constitution governs and regulates the behavior of those the people entrust to govern them. So, it recognizes the potential for internal enemies to use or become the government. While violations of the Constitution are not legally considered sedition in the US, they should be because sedition is a crime against the government which is required by the Constitution to represent the people.

“In law, sedition is overt conduct, such as speech and organization, that is deemed by the legal authority to tend toward insurrection against the established order. Sedition often includes subversion of a constitution and incitement of discontent (or resistance) to lawful authority.” ~ http://en.wikipedia.org/wiki/Sedition

The ‘powers that be’ currently, do not define the state in these terms. According to them, the state is the government and the government represents the segments of corporatocracy that lines the pockets of the representatives elected by the people at any given point in time.

So, the purpose of the large ‘think tanks’, like the Council on Foreign Relations, that are funded to the tune of billions of dollars world-wide by the Corporacrats, is to coordinate projects which come up with proposals and rationales that will help tighten the grip of the corporatocracy on governance and other social, economic, political, and technological structures in order enable them to maximize their profits through influencing and thereby controlling those structures.

The Council on Foreign Relations, is a US-based think tank which collaborates with think tanks in countries around the world, to document, analyze, and present recommendations on various global projects. The Council of Councils’ Reports are just one of the projects implemented and backed by the Council on Foreign Relations.

In recent years there has been a concerted move by governments influenced by the Corporatocracy to establish various types of controls over the Internet. However, the very nature of the Internet and it’s core, fundamental structure, as well the freedom experienced by Internet users (many of whom are reluctant to give up the freedoms they are experiencing) has created stop gaps to that process. There are always ways and means to bypass the attempts to create controls which are unacceptable to those Internet users.

The most recent developments in the process have been the creation of flawed concepts like ‘cybergovernance’ and ‘cyberwarfare’.

The Council of Councils’ reflect this trend in the section of their 2015 Report Card on International Cooperation, which grades ‘Managing Cybergovernance‘. The entire segment is based on the fundamentally flawed concept that governments are in a position to control access, content, and uses of the Internet.

“Two competing visions of cyber governance have traditionally pitted a group of countries led by the United States—which supports a multistakeholder model including governments, businesses, civil society, and technical experts—against countries (including China and Russia) that champion sovereign control (though a number of countries remain in the middle). Negotiations heated up in 2014 as world leaders devoted unprecedented attention to cyber governance in the wake of the revelations of spying by the U.S. National Security Agency (NSA).

Despite concern that tensions would lead to the balkanization of the Internet, however, a slew of international meetings fostered productive discussions.” ~2015 Report Card on International Cooperation

While Balkanization could be disruptive and therefore should be a concern, it and any other form of cybergovernance will be a rather difficult task …

“The first is sovereignty: by definition, a boundary-less system flouts geography and challenges the power of nation-states. The second is piracy and intellectual property: information wants to be free, as the hoary saying goes, but rights-holders want to be paid and protected. The third is privacy: online anonymity allows for creativity and political dissent, but it also gives cover to disruptive and criminal behavior — and much of what Internet users believe they do anonymously online can be tracked and tied to people’s real-world identities. The fourth is security: free access to an open Internet makes users vulnerable to various kinds of hacking, including corporate and government espionage, personal surveillance, the hijacking of Web traffic, and remote manipulation of computer-controlled military and industrial processes.” ~The Battle for Internet Governance

As stated before, the reality is that the Internet is designed from it’s core to survive and remain functional irrespective of any restrictions placed on it. The technology itself considers restrictions an attack and there are numerous ways to bypass them.

It is, by it’s very nature an open, free and egalitarian structure and like all open, free, egalitarian structures can be abused. That doesn’t mean that the solution is to restrict the structure itself.

There is absolutely no reason why real world laws can’t be applied to cybercrimes. It might be a little more complicated and countries may need to improve existing real world laws to allow them to address the issue of international rings of cybercriminals.

What countries do not need to do is create a bureaucracy of cybergovernance to address these issues. If it’s illegal in the real world, it’s illegal in the cyberworld. It really is that simple.

The same approach can be applied to cyberwarfare which includes cyberespionage. However, reinterpreting acts of war and attempting to add corporate espionage to the definition, is simply a self-serving act by the corporatocracy to use taxpayer funds to protect and defend their interest. The fact that our politicians accept this is just an indication of how corrupt our political system has become and how much influence the corporatocracy has over real world governance. Corporate spying may have been done in real world by intelligence agencies, but it has never been part of their official mandate until recently and as part of the recent move into cyberwarfare.

While the following is true, the reason that it’s true, is that our governments are actively acting in the best interests of the corporatocracy (and not the people they are supposed to be representing).

“As major powers increasingly rely on digital networks for critical services, the number of plausible network attacks, accidents, or failures that could trigger or exacerbate an international crisis will increase. The likelihood and severity of such a destabilizing event will also grow as long as norms of appropriate behavior in cyberspace are underdeveloped, timely and convincing attribution of attacks remains difficult, and the number of cyber-capable actors increases.” ~Strategic Risks of Ambiguity in Cyberspace, Contingency Planning Memorandum No. 24 (Council on Foreign Relations)

Fear is created by statements like the one above to justify the acts of major powers like the US, Russia, and China, who are using their own intelligence agencies (US-NSA, Russia-FSB, China-PLA Unit 61398) to engage in ‘cyberwarfare’ which consists mostly of corporate spying on other countries like Brazil and Sweden.

No doubt the acts of corporate espionage will indeed escalate to political, governmental, infrastructural cyberwar sabotage in the same way and on the same grounds that real life warfare occurs.

The reality is that the problems that the ‘powers that be’ are allegedly trying to solve by incorporating cybergovernance and rules for cyberwarfare can only lead to balkanization of the Internet since the entire purpose of governance and warfare is to establish control over regions, economies, industries, etc.

Balkanization, Definition:
Balkanization, or Balkanisation, is a pejorative geopolitical term, originally used to describe the process of fragmentation or division of a region or state into smaller regions or states that are often hostile or non-cooperative with one another.

As responsible Netizens, we need to protect the Internet from such balkanization and the corruption and abuses of power that it will inevitably lead to.

In order to do that, we need to understand what the enemy within is doing by enforcing transparency which allows us to analyze the corruption and abuses of power, bring them into the light of day so that accountability and justice can be demanded and invoked through cyberprotests, cyberactivism, and boots on the ground action.

Written by Kitty Hundal