Forgot your password?
typodupeerror
Government Businesses Privacy United States

Snowden and the Fate of the Internet As a Global Network 505

Posted by samzenpus
from the times-they-are-a-changing dept.
Hugh Pickens DOT Com writes "John Naughton writes in the Guardian that the insight that seems to have escaped most of the world's mainstream media regarding the revelations from Edward Snowden is how the US has been able to bend nine US internet companies to its demands for access to their users' data proving that no US-based internet company can be trusted to protect our privacy or data. 'The fact is that Google, Facebook, Yahoo, Amazon, Apple and Microsoft are all integral components of the US cyber-surveillance system,' writes Naughton. 'Nothing, but nothing, that is stored in their "cloud" services can be guaranteed to be safe from surveillance or from illicit downloading by employees of the consultancies employed by the NSA.' This spells the end of the internet as a truly global network. 'It was always a possibility that the system would eventually be Balkanised, ie divided into a number of geographical or jurisdiction-determined subnets as societies such as China, Russia, Iran and other Islamic states decided that they needed to control how their citizens communicated. Now, Balkanisation is a certainty.' Naughton adds that given what we now know about how the US has been abusing its privileged position in the global infrastructure, the idea that the western powers can be allowed to continue to control it has become untenable. 'Why would you pay someone else to hold your commercial or other secrets, if you suspect or know they are being shared against your wishes?' writes Neelie Kroes, vice-president of the European Commission. 'Front or back door – it doesn't matter – any smart person doesn't want the information shared at all. Customers will act rationally, and providers will miss out on a great opportunity.'"
This discussion has been archived. No new comments can be posted.

Snowden and the Fate of the Internet As a Global Network

Comments Filter:
  • Encryption: (Score:5, Insightful)

    by Redeye Carci (2932323) on Monday August 05, 2013 @10:21AM (#44476777)
    Something to actually use.
    • Re:Encryption: (Score:5, Insightful)

      by aaaaaaargh! (1150173) on Monday August 05, 2013 @10:24AM (#44476805)

      Technical solutions to social & political problems don't work.

      • Re:Encryption: (Score:5, Insightful)

        by lister king of smeg (2481612) on Monday August 05, 2013 @10:38AM (#44476961)

        Technical solutions to social & political problems don't work.

        Really you want to try brute force decrypt 4092 bit random key encrypted folder stored to random joe's sky drive folder? No, well neither does the NSA.

        • Re:Encryption: (Score:5, Interesting)

          by localman57 (1340533) on Monday August 05, 2013 @10:45AM (#44477047)
          If Random Joe doesn't share it with anybody, they probably don't give a shit. The NSA is perfectly happy to let Random Joe sit around enjoying his porn collection. But when people start working together, they get interested. They care if Random Joe is going to share it with somebody at somepoint. And they're real interested in that. Even if they never decrypt it, they can tell that Random Joe uploaded it, and Random Bob downloaded it. Now, the interesting question is what is the relationship between Random Joe and Random Bob? That connection between those two is valuable information, and you can get it without ever decrypting the actual data.
          • Re:Encryption: (Score:5, Insightful)

            by TapeCutter (624760) on Monday August 05, 2013 @11:31AM (#44477627) Journal

            Now, the interesting question is what is the relationship between Random Joe and Random Bob?

            You've nailed it. The secret service does not exist to crush dissent, it exists to crush organised dissent before it takes root.. They collect "meta data" not because of the fig-leaf of privacy it affords but because it holds the information they want - relationships between "subversives" (real or imagined). Trawling a gazzillion emails for key phrases is inefficient and error prone, the network of relationships tell you exatly which individuals to remove to most effectively dismantle the entire organisation.

            Trivia: Biologists use the same network analysis methods to identify key species in different habitats.

          • Re:Encryption: (Score:4, Insightful)

            by houghi (78078) on Monday August 05, 2013 @02:50PM (#44479617)

            1) So you say there is no need for them to read our emails? Apparently the NSA disagrees with you.
            2) To avoid the direct link between two people, avoid the direct link between two people.
            Person 1 posts it into a group. Posting can be done in plain text, in code, inside a binary or just something like "John has a big moustage"
            Person 2 reads this message and knows it is time to do whatever he needs to do. Or he replies in yet another group as a reply. e.g. an image of cat, that means he agrees.

            Usenet has the advantage that there is no direct link between sender and receiver. They can not know who I was intending the images for that I post on alt.binaries.pictures.wallpaper. Does the image quasi_unknown_20120908_15hevl.jpg posted on 5 Aug 2013 contain any message? Or perhaps the name contains the code? And if it is a message, for who was it intended? Perhaps _I_ do not even know.

            Usenet can be the poor peoples number station [wikipedia.org]. And do not forget that terrorists (the people who intend to catch, I hope) are not stupid.

            If I can think of it, I am sure they will have many others who can think of it and better methods as well.

        • by synapse7 (1075571)
          the xkeyscore presentation suggests they do this while they get coffee.
          • the xkeyscore presentation suggests they do this while they get coffee.

            I thought they were using stolen ssl keys or blank ssl keys provided by verasign for that.

            • Does it really matter how if they have all the keys?

            • by Synerg1y (2169962)

              *shrug* verisign isn't the only CA, it's just the biggest one. It doesn't even have to be a trusted CA (you'll just get ominous looking browser messages till you add it). I think that's going to be the biggest fallout from this, non-NSA compromised off-shore offerings are going to start cropping up for services primarily used by everybody but hosted in the US. Megaupload's takedown took down a ton of other businesses as well, somehow I doubt those businesses host their data on shore now.

              This however won'

      • by leehb9 (3009071)
        But since we know that they're out there and looking, anything I can do to slow them down a bit is a step in the right direction. Encrypt all your shit!
      • Re: (Score:3, Interesting)

        by Pi1grim (1956208)

        It's not a social problem. It's problem of power abuse. Making it harder to abuse can help contain the problem. If everyone uses end-to-end encryption, then centralized ubiquitous surveillance is impossible.

      • Re:Encryption: (Score:5, Insightful)

        by JaredOfEuropa (526365) on Monday August 05, 2013 @10:47AM (#44477083) Journal
        Technical solutions can to some degree mitigate social and political problems. Using encryption isn't going to solve the issue of governmental and commercial parties snooping and sharing stuff that we the people do not want them to access, nor will it solve the deeper issue of these organisations thinking that they have a right to access that data to begin with, but encryption can reduce the amount of useful data they can actually access.

        In this case, the solution fails for technical / practical reasons. Corporations do not use "the cloud" just for storage, but for processing of data as well, which means it'll have to exist in plaintext on the cloud server at some point. If you want your data to be secure, you should certainly encrypt it, but you aso should stop using the cloud for anything but storage of already encrypted data.
    • Re:Encryption: (Score:4, Insightful)

      by Anonymous Coward on Monday August 05, 2013 @10:34AM (#44476905)

      Encryption is not a solution. You can't reasonably use cloud computing, webmail or social networks with encryption in a way to prevent the kind of snooping that is going on. The solution is to stop using untrustworthy providers: Don't use US services.

      • by Pi1grim (1956208)

        You're using the encryption wrong. If you are the only one who has the key, then NSA can go and build quantum computer. Untill they do that, you are in the clear.

      • Re:Encryption: (Score:4, Insightful)

        by MightyMartian (840721) on Monday August 05, 2013 @11:14AM (#44477375) Journal

        These are *services* on the Internet, not the Internet itself. Yes, individual services like SMTP are vulnerable, but no one says you have to use it, or Facebook or whatever hipster doofus smocial smetworking site is the be-all and end-all this week. There are ways to use the Internet that make you far less vulnerable. Nothing, of course, is 100%, and if They (whoever They are) can take advantage of vulnerabilities on your hardware, well that is a problem, but it is a different kind of problem.

        Not even China can afford to cut the tubes between here and the West, and not even the West, despite its governments' singular desire to know every utterance its citizens make over said tubes, can afford to so damage the Internet in a quest for that kind of total knowledge. They will all push the boundaries of technology, but at the end of the day, too much of the global economy has become reliant on the Internet to allow it to be too balkanized.

        That is not to say there aren't problems here. Whether it's trying to censor what citizens see (as China and Iran have done, and what the UK is trying to do) or ubiquitous spying (as probably all governments now do) these are threats to the free exchange of information, but at least so far as the letter is concerned, that can be fixed by using alternative protocols and encryption. Just because it's no longer secure to post shit on Facebook or use SMTP to send confidential emails (when was it ever really secure to use SMTP) doesn't mean the Internet is doomed.

    • Re:Encryption: (Score:5, Insightful)

      by Penguinisto (415985) on Monday August 05, 2013 @10:39AM (#44476965) Journal

      One small problem - encrypted messages won't get very far if the packets are blocked as being non-readable by whatever censorship authority runs the firewall/choke-point/etc.

      A truly 'Balkanized' Internet would mean that there would be choke-points through which packets have to travel between subnets.

      Now if you said 'steganography' instead, well, different story. But an obviously encrypted message would likely be blocked cold.

    • by tgd (2822)

      Something to actually use.

      Until you can put the crypto chip into your head, all that does is move the needle, and not by much.

    • by CdXiminez (807199)

      More interesting that your content, is who you share it with.
      They map out who sends what to whom, to find interest networks and classify people:

      http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/ [kieranhealy.org]

  • Free speech* (Score:5, Insightful)

    by i kan reed (749298) on Monday August 05, 2013 @10:22AM (#44476779) Homepage Journal

    *As long as that speech falls into the category of things that benefits the U.S. government.

    • Re:Free speech* (Score:5, Interesting)

      by CrimsonAvenger (580665) on Monday August 05, 2013 @10:23AM (#44476799)

      Nah, you can say whatever you want.

      Of course, the Feds will be listening....

  • It does not spell the end of a global network, just like spam did not end the popularity of e-mail. More programs that are capable of storing things in the cloud will feature encryption from now on, and more people will use it.
    • Which raises the eternal question, "(How long) will the encryption be sufficient to avoid others snooping into it?" This is an easy question for information with no value, but as information becomes more valuable (in conjunction with an unknown amount of other information available for cross correlation), the question becomes harder.

      I could see today some company offering confidential decryption services for corporate spying, which is run secretly by some professor on a big university's supercomputer to av

    • by DarkOx (621550)

      Encryption in the cloud is not all that realistic. Encryption of any real value requires good key management. That is to say only the people who are supposed to read and or author the plain text documents have the keys.

      Right now what you mostly see if you see data at rest ciphered at all is the provider has all the keys, if you are really really lucky the provider stores the keys and keeps them weakly ciphered with some crappy password you have. Which they have many opportunities to intercept for any arm

    • Most of these products already featured encryption. Unfortunately the companies in question were more than helpful when it came to letting the NSA breach that encryption.

      If the mob ran the security alarm company, do you really think those alarms would do you much good against the mob? That's the exact position we're in now.

  • it was always a series of government and privately owned networks, interconnected together for some limited communication and a common naming/addressing scheme for communication

  • This isn't news. (Score:5, Insightful)

    by intermodal (534361) on Monday August 05, 2013 @10:26AM (#44476819) Homepage Journal

    It's always been the elephant in the room. The only new thing is that it has become obvious to a larger number of people that encryption isn't just an "in case" precaution. Anyone who knows anything about the way the Internet works has been aware for years that nothing is secure unless you both encrypt it and control the only means to decrypt it (either by encrypting it to someone's public key whom you trust or by encrypting it for your own secure decryption later).

    So again, the only real change is that the tinfoil hats were verifiably right for once. The question nobody seems to be answering is, what (other than nothing) will the general public do about it? The answer to that is, only as much as they are forced to.

  • by Anonymous Coward on Monday August 05, 2013 @10:28AM (#44476841)

    Is there really anything worthwhile on the non-Western Internet, at least from the perspective of most Westerners?

    I know I couldn't care any less if I could no longer access Russian or Chinese websites, for instance. Due to language differences, they're already pretty much useless to me. I know this also holds true for most Americans and Australians, and many Europeans, too.

    Yeah, I know, there are probably a small number of expats and academics who find some use in such information, but there aren't many of them. Aside from them, I don't think that Westerners in general would really miss those very foreign parts of the Internet if they suddenly disappeared.

    • Is there really anything worthwhile on the non-Western Internet, at least from the perspective of most Westerners?

      I know I couldn't care any less if I could no longer access Russian or Chinese websites, for instance. Due to language differences, they're already pretty much useless to me. I know this also holds true for most Americans and Australians, and many Europeans, too.

      Yeah, I know, there are probably a small number of expats and academics who find some use in such information, but there aren't many of them. Aside from them, I don't think that Westerners in general would really miss those very foreign parts of the Internet if they suddenly disappeared.

      Would you care if you could no longer send email to those countries? What about parts of Europe? What about India? India, China, and Asia represent something like 40% of the Human race... that's a huge portion of potential customers that now have a catastrophically negative image of storing their data in our country on our servers.

      We've really screwed ourselves here.

      • if we lost ability to email china and india, think of the jobs that would have to come back home again!

        the silver lining, in a way.

        perhaps mistrust of other nations (and vice versa) would be good for us.

    • by AmiMoJo (196126) *

      American companies care. How are they going to buy all that cheap stuff from China and sell it to you if they can't access Chinese' web sites? How will Apple email the guys at the Foxconn factory?

    • by Joehonkie (665142) on Monday August 05, 2013 @11:20AM (#44477491) Homepage
      Good god, how did this get modded up? The way to deal with a globalization and the myriad cultures on this planet is to stick you fingers in your ears and avoid anything that doesn't interest you directly? How many expats, or 3rd or even 4th generation folks do want access to that? How many "academics," which apaprently to you means "anyone with an interest in a culture I don't care about?" Probably more than you think.
    • Let me get this straight. Did you really just say that, because you believe that "most people" lead a one-country/one-language existence, I'm obliged to give up the global life I've led for most of the last 30 years?

      Just who the hell do you think you are?

  • Nothing but nothing? (Score:4, Interesting)

    by Hatta (162192) on Monday August 05, 2013 @10:28AM (#44476843) Journal

    Try storing an encrypted container. When you want to access it, download it, decrypt it locally, do your work, reencrypt, and reupload. Unless your home PC is keylogged, you're safe. But if your PC is keylogged, whether you use cloud services is irrelevant.

  • by pr0nbot (313417) on Monday August 05, 2013 @10:32AM (#44476873)

    Suppose your philosopher king came to you and said, "We want to set up our own national network with privacy/neutrality as the core principle, away from the prying eyes of our tyrannical neighbours".

    What would you do differently? Can much of the problem be engineered out, at least at the network layer?

    Is it just end-to-end encryption? Or anonymised routing? What's the collection of technolgies you'd use to make things at least better?

  • by sureshot007 (1406703) on Monday August 05, 2013 @10:32AM (#44476879)
    I don't know why this is a surprise to anyone out there. The internet was never a secure place to store any information, or discuss anything. Putting something in "the cloud" is like putting on your front porch. When is the general public going to realize this? Google is giving you email for free, do you really think no one is reading it?
  • by Old97 (1341297)
    It's hardly shocking that the U.S. government will pressure companies or anyone with in its reach to serve its interests. Every government does that though some governments have more evil aims than others. (Like people, the U.S. is not evil though sometimes it does bad things.) Did AT&T ever refuse a government request to tap a phone line? I've read that in the 1930's the U.S. pressured ITT which was installing Germany's telephony infrastructure to include things to help us tap their lines. Not sure
    • Re: (Score:2, Interesting)

      by Anonymous Coward

      I have no idea why your comment is rated 4, Interesting as it is void of insights.

      First of all, you are completely missing the point. The point is a rational sovereign nation will kick out US companies and generally this leads to balkanization.

      Secondly, your point is absolutely useless:
      "The point is that if you put information and valuables where somebody else can get it, assume someone will."

      Can you propose a place where information and valuables can be put where nobody can get at it? Say we put them on

    • No, the news here is that the US actually applied that leverage, not that it has it. And to spell it out for you, this is news because of the contradiction between the gross violation of civil liberties on the one hand and the Defenders Of Liberty narrative the US spins around itself on the other. Additionally, there are many safe places to store information: libraries, books, journals, universities, etc.. There are even safe places to store information you do not want others to access, if you think about i
  • by RogueWarrior65 (678876) on Monday August 05, 2013 @10:39AM (#44476969)

    IMHO, the author's conclusion is a bit overly dramatic. I think a more realistic conclusion is a gradual fade out of cloud computing and cloud storage. Business and people will be more inclined to keep their private data on local, closed systems now because they no longer trust the government not to stick their nose in where it doesn't belong. How long will it be before the same effect happens to socialized medicine? Would you trust the government not to use your medical status against you?

  • by scotts13 (1371443) on Monday August 05, 2013 @10:41AM (#44476999)

    ... is that, either literally or metaphorically, it's vulnerable to someone holding a gun to your head and demanding the key. We're seeing this (the literal version) in the USA already. I agree with the thesis of the original article: The farther you can keep your data from USA-entangled entity, the better.

  • by sl4shd0rk (755837) on Monday August 05, 2013 @10:43AM (#44477025)

    Most people won't really care/comprehend much past the drama generated around the whole thing. In the US, Reality TV wins, everything else is lucky if it gets a confused, apathetic nod. If it's more work than walking to the checkout line at a Walmart, people just won't do it.

  • UNLIMITED Domain Hosting, UNLIMITED GB Hosting Space, UNLIMITED GB File Transfer, UNLIMITED Email Accounts, FREE Domain, FREE Site Builder ..
    vs the ~10 Gb bandwidth, 2 Gb Disk space other parts of the world offer at the low end.
    The mid and high end will start to think about air gap, no cloud, encryption and trusted local staff.
    The real fun is in bilateral agreements, trade deals and telcos just helping so the paperwork is signed.
    http://www.crikey.com.au/2013/07/12/telstras-deal-with-the-devil-fbi-access [crikey.com.au]
  • by Bob9113 (14996) on Monday August 05, 2013 @10:45AM (#44477049) Homepage

    My congressional rep is a pretty far right "We gotta stop the terr'rists" type. I've been trying to figure out the message that will ring with him, to help him understand what we have at stake here. I think it is this: Surveillance cannot become a condition of purchasing American goods and services, or we will lose business. And the solution is already in use in New Jersey:

    "Under settled New Jersey law, individuals do not lose their right to privacy simply because they have to give information to a third-party provider, like a phone company or bank, to get service."

    I don't want to play to stereotypes, but the reality is that New Jersey is host to some of the traditionally hard-to-crack criminal enterprises. Yet they have decided that the ability to do business must not take a back seat to making law enforcement a little easier. We cannot let surveillance become a condition of purchasing American goods and services.

  • by nine-times (778537) <nine.times@gmail.com> on Monday August 05, 2013 @10:46AM (#44477067) Homepage

    It's still a global network, and will continue to be a global network even if it's balkanized. Your business network is part of "the Internet" even though it's protected by a firewall. You might use different servers and services, but it's still all connected.

    The Internet has never been so uniform a thing as what this summary implies. Different countries have been filtering access, providing different services, etc. Even in cases where access is unfettered, there are still language barriers, cultural barriers, an geographic barriers. I don't access Russian sites and services very much because I don't speak Russian, I don't live in Russia, and I'm not Russian. But we can still access many of the same sites, and we can still send email to each other.

  • by schneidafunk (795759) on Monday August 05, 2013 @10:48AM (#44477091)
    I'm still surprised this is such big news when the AT&T scandal [wired.com] got little national interest.
  • by EmperorOfCanada (1332175) on Monday August 05, 2013 @11:16AM (#44477405)
    The key here is trust. Before people might have said, 'Well AWS, Google, Microsoft won't cave because it would hurt their business models." But now we are even asking if the chips themselves might have back doors. So I suspect that now people are looking at their infrastructure and saying, "Trust nothing" Thus you design your infrastructure to assume that nearly everything is compromised.

    But this brings back a new tool into the tool into the toolbox. Security through obscurity. The idea is that if you are using well known protocols and systems then the voracious data monsters may very well have ways to tap into them. But if you adopt the weirdos then you might very well avoid easy data loss. These can be layered. So you might use SSH(or some VPN) for the outer layer but underneath you might even use some homebrew encryption. As everyone knows the chances of getting your own encryption right is low but it takes you out of the realm of automated data harvesting. Some group of humans have to now pick through your protocol and crack it. Then you just keep making regular tweaks to your protocol, not to make it better but to change the weirdness.

    But this whole thing is a huge opportunity for a country with good privacy protections. A whole industry of secure routers and whatnot could be created that people would trust. I would infinitely prefer a router from an Icelandic(designed and built) company than a technically better router from Cisco (designed in the US and probably made in China).

    Also this is where opensource is going to get a whole lot more interesting. Tools like Skype would be better trusted if the code was opensource (they can still retain the copyrights and say, you can poke through it and compile it for your own use but not modify and distribute it). This way when the NSA demands a back door. Skype can say, "No problem but people will discover it in 5 seconds." On top of that it would be great if tools like skype had better plugins for things like encryption and comm. This way you could download 3rd party tools all day to keep shaking things up. Your buddies would have to have the same plugin but among friends or corporations this would not be a problem.

    The ideal setups would allow you to know that your ISP was compromized, your software provider was compromised, and the feds hated you, yet you could still use the Internet in complete privacy.

    Personally the only security I would trust if I were wanting perfect secrecy would be one time pads. By hand I would deliver one time pads to my trusted companions (divided into slices and delivered by multiple trusted couriers) and use only those for communications. The occasional HD should suffice for nearly all communications. Also the machines being used for communications would not be networked. You would take the transmission from an (assumed compromised) machine, put it on a storage device, then read it on the trusted non-networked machine using the matching one-time-pad, prepare an encrypted response, and then put it back on the compromised machine for sending. Good luck back dooring that setup.
  • by msobkow (48369) on Monday August 05, 2013 @11:22AM (#44477523) Homepage Journal

    The idea that the spying means balkanization must happen is a false premise.

    Anyone with a functioning brain cell who relies on cloud services already knows they're insecure and open to data theft. Those who bought into the hype of cloud services who thought otherwise were only deluding themselves that they could trust a vendor.

    You've never been able to trust a vendor with data. If you have/had data that needed to be truly secure, you implemented and maintained your own infrastructure to deal with it; in fact most government and high security contracts require you to do so.

    Or did you think someone like a bank would ever rely on something like AWS?

  • by Max_W (812974) on Monday August 05, 2013 @11:30AM (#44477621)
    I think it will be the end of "social networks" and return to the Internet, which based on open source technologies.

    The approach - "trust me, trust my closed binaries, as I am good guy" - is over.

    I expect clearer interfaces, as people will not trust convoluted websites and OSs anymore.

    It could be a chance for small and medium companies from all over the world. Why, for instance, to have one Skype when we can have several competing clients talking via open protocols.
    • by jader3rd (2222716)

      I think it will be the end of "social networks" and return to the Internet, which based on open source technologies.

      You don't know any non-nerds, do you?

  • Oh The Irony... (Score:5, Insightful)

    by SuperCharlie (1068072) on Monday August 05, 2013 @11:55AM (#44477877)
    The most ironic and insidious part of this whole mess is.. They got us to pay for the surveillance network above our taxes. They got us to pay for the cable lines, they got us to pay for the websites, they got us to pay for Windows, they got us to pay for iPhones and Android phones, they got us to practically beg for all of it and take our money.to build our own cages.
  • by WOOFYGOOFY (1334993) on Monday August 05, 2013 @01:00PM (#44478519)

    Look, it's not just the US that does this, it's every developed nation. The UK does it the EU does it the Far East and Middle East nations do it, no there's no escaping it.

    Why do they do it? National security- same reason the US does it.

    Fact: the internet is how non-state actors plan their violence, raise their money, spread their vision, do reconnaissance . Of course it gets state scrutiny- as much as the state can bring to it.

    The reason that's a Big Deal in the news now is because the U.S. government appears to be contravening the US Constitution's Fourth Amendment and lying about it to the American people, and purely instrumental John Yoo-style of "findings" does not count as "lawful".

    It's pretty clear to all Americans that their internet searches, their contacts, the time place and duration of those contacts qualify as their "papers" which the Constitution expressly says shall be free from unreasonable search and further that capturing those and rifling through them, analyzing them, drawing conclusions and inferences about the people behind them and then indexing all that away under the key Smith, John , well that's pretty much the definition of "search".

      To Americans, myself included, that's a big fucking deal and something that needs to be publicly, seriously and and in a sustained and methodical way considered with the goal of reaching a consensus about how we should go forward.

    The government ignores this at their own peril: the terrorist have as their explicit goal to provoke reactions from the US government which de-legitimize that government in the eyes of its own people. They intend to do this and it's their greatest and perhaps only real weapon.

    The purpose of doing that is divide the nation against itself and thus generate home-grown discontents which they can cynically join in a common cause (hating the US government). One of the reasons we haven't been hit the way the UK and say Spain have been is because, aside from sleeper cells composed of foreign nationals, al Queda is having a tough time finding Americans who want to support them locally.

    Provoking such responses from the US government also serves to undermine the US government's legitimacy with their foreign partners by de-legitimizing the US with those nation's citizens.

    So far, they're winning. They won with Abu Graib (thanks Cheney!!!!! Thanks Yoo !!! ) . They won when they turned the Depatment of Justice into a made-to-order *legal* sausage factory , thanks to Yoo , Cheney, David Addington Jay Bybee and Alberto Gonzales.

    Now they're poised to win again with this shit. This time it's structural. As one of his first official acts, Obama nullified and set aside all of messy diapers John Yoo left behind in the DoJ. But this time, it's all going to be carried forward.. it's going structural folks. You need to take this seriously.

    This is Obama's legacy. This and what he does about climate change are the things history will judge him on, Obamacare is small beans in comparison.

    At this exact moment in history Snowden has given him something no one could have foreseen- the perfect excuse to engage the nation in a meaningful debate over complex and fast changing relationship between personal privacy and national security and the 4th Amendment.

    It's been presented to him on a mother fucking silver platter, and is he going to engage the nation like a goddamn motherfucking leader and bring us, together, as a nation, as Americans into a shared and accepted understanding about this issue strong enough to take us forward into the next century or is he going to blink this nettlesome thing before him away and let mere circumstance, some random future chain of unfortunate events decide the issue for us in a way that is incoherent, chaotic, instrumental and divisive?

    Which is it going to be, Mr. President? This is an issue that is all, and only, up to you.

    That's the REAL issue that no one in the main stream media is talking about.

Thufir's a Harkonnen now.

Working...