Is Copyright Infringement Now Seen As Terrorism?
2013 03 05
By Washington’s Blog | GlobalResearch
Government Uses Law As a Sword Against Dissent
We reported last year:
The government treats copyright infringers as terrorists, and swat teams have been deployed against them. See this, this, this and this.
As the executive director of the Information Society Project at Yale Law School notes:
This administration … publishes a newsletter about its efforts with language that compares copyright infringement to terrorism.
The American government is using copyright laws to crack down on political dissent just like China and Russia.
We noted last month that the “cyber-security” laws have very little to do with security.
The Verge reported last month:
In the State of the Union address Tuesday, President Obama announced
a sweepingexecutive order
implementing new national cybersecurity measures, opening the door for intelligence agencies to share more information about suspected “cyber threats” with private companies that oversee the nation’s “critical infrastructure.” The order is voluntary, giving companies the choice of whether or not they want to receive the information, and takes effect in four months, by June 12.
“Cyber threats cover a wide range of malicious activity that can occur through cyberspace,” wrote Caitlin Hayden, spokeswoman for the White House National Security Council, in an email to The Verge. “Such threats include web site defacement, espionage,theft of intellectual property, denial of service attacks, and destructive malware.”
“The EO [executive order] relies on the definition of critical infrastructure found in the Homeland Security Act of 2002,” Hayden wrote.
The Homeland Security Act of 2002 (PDF), passed in the wake of the September 11, 2001 terror attacks, was what created the Department of Homeland Security. At that time, the US was still reeling from the attacks and Congress sought to rapidly bolster the nation’s defenses, including “critical infrastructure” as part of its definition of “terrorism.” As the act states: “The term ‘terrorism’ means any activity that involves an act that is dangerous to human life or potentially destructive of critical infrastructure or key resources…”
But again, that act doesn’t exactly spell out which infrastructure is considered “critical,” instead pointing to the definition as outlined in a 2001 bill, also passed in response to September 11, which reads:
“The term “critical infrastructure” means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”
Read the full article at: globalresearch.ca
CISPA IS BACK! Destroying Online Privacy
Destroying the Internet: Obama Exec Order, CISPA & Anonymous Hacktivists
Echelon Spy Network Secrets To Be Revealed in Megaupload Copyright Case
Google voluntarily plays copyright cop, punishes violators in search results
British Transport Police: Illegal Downloading Kills Babies
Latest News from our Front Page
"A world of pure imagination": How Occupy turned to anarchy
2014 04 17
In the closing ceremonies of London’s 2012 Summer Olympics, comedian Russell Brand, perched atop the Beatles’ "Magical Mystery Tour" bus, opened his performance by singing the first lines of "Pure Imagination" from the movie Willy Wonka:
Come with me
And you’ll be
In a world of
Artists ’have structurally different brains’
2014 04 17
Artists have structurally different brains compared with non-artists, a study has found.
Participants’ brain scans revealed that artists had increased neural matter in areas relating to fine motor movements and visual imagery.
The research, published in NeuroImage, suggests that an artist’s talent could be innate.
But training and environmental upbringing also play crucial roles in their ability, the authors report.
As in many areas ...
NSA-proof email service goes online
2014 04 17
A new email service that protects its users from the prying eyes of the NSA and other spy agencies has gone online. The service’s creators say it will make encrypted messaging accessible to all and curtail internet snooping.
Germany-based Lavaboom was inspired by Lavabit, the encrypted email service that was believed to have been used by whistleblower Edward Snowden before it ...
Investigative Journalist Michael C. Ruppert Dead After Lifelong Struggle With Mental Illness
2014 04 17
We’re sad to hear the news about the death of Michael Ruppert.
Rest in Peace.
From Collapse Network, which is being constantly updated with new information:
There is absolutely no doubt or question about it, Mike Ruppert took his own life.
Rest in Peace, my brother.
Wesley T. Miller
President & CEO
Collapse Network, Inc.
I have been informed that MCR has committed suicide. I ...
Cyclopean Masonry: A Mystery of the Ancient World
2014 04 16
They don’t make things like they used to, and that is, in some cases, a monumental understatement.
Silly wordplay notwithstanding, there is something to be said for the construction techniques of the old world. Where modern buildings are designed to withstand the elements; wind, temperature extremes, earthquakes and floods, today’s engineers have to strike a balance between economics ...
|More News » |