The Ron Paul Institute for Peace and Prosperity
Subscribe to the Institute View Us on YouTube Follow Us On Twitter Join Us on Facebook Join Us at Google Plus

Latest Posts

Liberty in Search of Protector - Interview With Vaclav Klaus
Liberty is a fundamental human right; it is the cornerstone of our existence. But liberty is under attack from all directions, whether through higher state control or individuals themselves. Liberty is in search for its protector.

28 February 2015read on...

Ron Paul: Is Government Regulation of Internet Helpful?
Ron Paul explains his opposition to the recent FCC vote to begin regulating the Internet as a public utility. Dr. Paul warns that government control will lead to a decrease in innovation, an increase in prices, and more surveillance of Americans' online activities. Tune in to Ron Paul and co-host Daniel McAdams of the Ron Paul Institute in this latest Liberty Report:

27 February 2015read on...

State Department Gives 87 Percent of Afghan Funds to Only Five Recipients
The Special Inspector General for Afghan Reconstruction (SIGAR) issued a scathing report showing the Department of State gave a staggering 87 percent of all Afghan reconstruction funds to only five recipients.

27 February 2015read on...

Stephen Hawking and the Meaning of Non-Aggression
Ron Paul's latest Liberty Report takes a look at famed physicist Stephen Hawking's comments that aggression is the greatest human failing and that the solution is empathy, which "brings us together in a peaceful, loving state." Whether intentionally or not, Dr. Hawking spells out the beauty and simplicity of the non-aggression principle.

27 February 2015read on...

‘US Spends Millions on Overseas Propaganda, But No One is Buying it’
Despite the US’ bottomless PR budget to influence overseas, people are not attracted by what’s on offer as they are tired of US interventionism, exceptionalism, and the bombing of their countries, Daniel McAdams of the Ron Paul Institute told RT.

26 February 2015read on...

Domestic Fear is the Price of Empire
If you find no other argument against American intervention abroad persuasive, how about this one? When the US government invades and occupies other countries, or when it underwrites other governments’ invasions or oppression, the people in the victimized societies become angry enough to want and even to exact revenge — against Americans.

26 February 2015read on...

Janet Yellen On Capitol Hill - Ron Paul Liberty Report
Fed Chairman Janet Yellen goes to Capitol Hill this week for her bi-annual report to Congress. At her first stop, in the Senate Banking Committee, she rejected any call for an audit of the Federal Reserve and claimed that Fed is doing a fine job of managing the country's monetary policy. Join Ron Paul and co-host Daniel McAdams (of RPI), along with special guest Paul-Martin Foss, a former Ron Paul Congressional staffer and current president of the Carl Menger Center, to get the real story of the Federal Reserve and the US economy.

25 February 2015read on...

Ukraine: A Cuban Missile Crisis in Reverse
In a rather ghastly 19th century experiment, a biologist by the name of Heinzmann found that if he placed a frog in boiling water, the frog immediately leapt out but that if he placed the frog in tepid water and then gradually heated it, the frog stayed put until he was scalded to death. Are we like the frog? I see disturbing elements of that process today as we watch events unfold in the Ukraine confrontation. They profoundly frighten me and I believe they should frighten everyone. But they are so gradual that we do not see a specific moment in which we must jump or perish. So here briefly, let me lay out the process of the 1962 Cuban Missile Crisis and show how the process of that crisis compares with what we face today over the Ukraine.

24 February 2015read on...

The Washington Post’s Gross Mischaracterization of Ron Paul’s Message
Irrespective of the commonly held view that the Washington Post is the newspaper of record of America or at least of United States politics, David A. Fahrenthold’s January 25 Washington Post article purporting to report on Ron Paul’s participation the previous day at a Ludwig von Mises Institute event provides anything but an accurate record. Instead, Fahrenthold’s article presents a gross mischaracterization of Paul’s message.

23 February 2015read on...

Another Nail in The Coffin of The Case for Libyan ‘Intervention’
Though the British press have chosen to ignore it, a recent report in the Washington Times newspaper is the latest nail in the coffin that is the mainstream narrative of the 2011 NATO intervention in Libya.

23 February 2015read on...

Featured Articles

Welcome to Post-Constitution America: The Weapons of War Come Home


Veneer Of Victory

On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”

Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”

Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, intopost-Constitutional America.

The Weapons of War Come Home

Even before the Manning trial began, the emerging look of that new America was coming into view.  In recent years, weapons, tactics, and techniques developed in Iraq and Afghanistan as well as in the war on terror have begun arriving in “the homeland.”

Consider, for instance, the rise of the warrior cop, of increasingly up-armored police departments across the country often filled with former military personnel encouraged to use the sort of rough tactics they once wielded in combat zones. Supporting them are the kinds of weaponry that once would have been inconceivable in police departments, including armored vehicles, typically bought with Department of Homeland Security grants. Recently, the director of the FBI informed a Senate committee that the Bureau was deploying its first drones over the United States.  Meanwhile, Customs and Border Protection, part of the Department of Homeland Security and already flying an expanding fleet of Predator drones, the very ones used in America’s war zones, is eager to arm them with “non-lethal” weaponry to “immobilize targets of interest.”

Above all, surveillance technology has been coming home from our distant war zones. The National Security Agency (NSA), for instance, pioneered the use of cell phones to track potential enemy movements in Iraq and Afghanistan. The NSA did this in one of several ways. With the aim of remotely turning on cell phones as audio monitoring or GPS devices, rogue signals could be sent out through an existing network, or NSA software could be implanted on phones disguised as downloads of porn or games.

Using fake cell phone towers that actually intercept phone signals en route to real towers, the U.S. could harvest hardware information in Iraq and Afghanistan that would forever label a phone and allow the NSA to always uniquely identify it, even if the SIM card was changed. The fake cell towers also allowed the NSA to gather precise location data for the phone, vacuum up metadata, and monitor what was being said.

At one point, more than 100 NSA teams had been scouring Iraq for snippets of electronic data that might be useful to military planners. The agency’s director, General Keith Alexander, changed that: he devised a strategy called Real Time Regional Gateway to grab every Iraqi text, phone call, email, and social media interaction. “Rather than look for a single needle in the haystack, his approach was, ‘Let’s collect the whole haystack,’?” said one former senior U.S. intelligence official. “Collect it all, tag it, store it, and whatever it is you want, you go searching for it.”

Sound familiar, Mr. Snowden?

Welcome Home, Soldier (Part I)

Thanks to Edward Snowden, we now know that the “collect it all” technique employed by the NSA in Iraq would soon enough be used to collect American metadata and other electronically available information, including credit card transactions, air ticket purchases, and financial records. At the vast new $2 billion data center it is building in Bluffdale, Utah, and at other locations, the NSA is following its Iraq script of saving everything, so that once an American became a target, his or her whole history can be combed through. Such searches do not require approval by a court, or even an NSA supervisor. As it happened, however, the job was easier to accomplish in the U.S. than in Iraq, as internet companies and telephone service providers are required by secret law to hand over the required data, neatly formatted, with no messy spying required.

When the U.S. wanted something in Iraq or Afghanistan, they sent guys to kick down doors and take it. This, too, may be beginning to happen here at home. Recently, despite other valuable and easily portable objects lying nearby, computers, and only computers, were stolen from the law offices representing State Department whistleblower Aurelia Fedenisn. Similarly, a Washington law firm representing NSA whistleblower Tom Drake had computers, and only computers, stolen from its office.

In these years, the FBI has brought two other NSA wartime tools home. The Bureau now uses a device called Stingray to recreate those battlefield fake cell phone towers and track people in the U.S. without their knowledge. Stingray offers some unique advantages: it bypasses the phone company entirely, which is, of course, handy in a war zone in which a phone company may be controlled by less than cooperative types, or if phone companies no longer cooperate with the government, or simply if you don't want the phone company or anyone else to know you're snooping. American phone companies seem to have been quite cooperative. Verizon, for instance, admits hacking its own cellular modems (“air cards”) to facilitate FBI intrusion.

The FBI is also following NSA's lead implanting spyware and other hacker software developed for our war zones secretly and remotely in American computers and cell phones. The Bureau can then remotely turn on phone and laptop microphones, even webcams, to monitor citizens, while files can be pulled from a computer or implanted onto a computer.

Among the latest examples of war technology making the trip back to the homeland is the aerostat, a tethered medium-sized blimp. Anyone who served in Iraq or Afghanistan will recognize the thing, as one or more of them flew over nearly every military base of any size or importance. The Army recently announced plans to operate two such blimps over Washington, D.C., starting in 2014. Allegedly they are only to serve as anti-missile defenses, though in our war zones they were used as massive surveillance platforms. As a taste of the sorts of surveillance systems the aerostats were equipped with abroad but the Army says they won’t have here at home, consider Gorgon Stare, a system that can transmit live images of an entire town.  And unlike drones, an aerostat never needs to land. Ever.

Read the entire article here. Peter's blog is here.

flickr/Idiolector

Copyright © 2013, The Ron Paul Institute for Peace and Prosperity. Permission to reprint in whole or in part is gladly granted provided full credit is given and a live link provided.
What are you supporting?
When you join the
Ron Paul Institute
for Peace and Prosperity
You are supporting

News and analysis
like you'll get nowhere else

Brave insight on
foreign policy and civil liberties

A young writer's program
and much more!

Archives