<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta name=Generator content="Microsoft Word 14 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
{font-family:Georgia;
panose-1:2 4 5 2 5 4 5 2 3 3;}
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
h1
{mso-style-priority:9;
mso-style-link:"Heading 1 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:24.0pt;
font-family:"Times New Roman","serif";
font-weight:bold;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
code
{mso-style-priority:99;
font-family:"Courier New";}
pre
{mso-style-priority:99;
mso-style-link:"HTML Preformatted Char";
margin:0in;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";}
tt
{mso-style-priority:99;
font-family:"Courier New";}
span.apple-mail-urlsharewrapperclass
{mso-style-name:apple-mail-urlsharewrapperclass;}
span.apple-mail-urlshareusercontenttopclass
{mso-style-name:apple-mail-urlshareusercontenttopclass;}
span.print-footnote
{mso-style-name:print-footnote;}
span.apple-mail-urlsharesharedcontentclass
{mso-style-name:apple-mail-urlsharesharedcontentclass;}
span.Heading1Char
{mso-style-name:"Heading 1 Char";
mso-style-priority:9;
mso-style-link:"Heading 1";
font-family:"Cambria","serif";
color:#365F91;
font-weight:bold;}
span.apple-mail-urlshareusercontentbottomclass
{mso-style-name:apple-mail-urlshareusercontentbottomclass;}
span.HTMLPreformattedChar
{mso-style-name:"HTML Preformatted Char";
mso-style-priority:99;
mso-style-link:"HTML Preformatted";
font-family:Consolas;}
p.attach, li.attach, div.attach
{mso-style-name:attach;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:9.0pt;
font-family:"Arial","sans-serif";}
p.bold, li.bold, div.bold
{mso-style-name:bold;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:10.0pt;
font-family:"Arial","sans-serif";
font-weight:bold;}
p.green, li.green, div.green
{mso-style-name:green;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";
color:#628C2A;}
p.replbq, li.replbq, div.replbq
{mso-style-name:replbq;
margin:3.0pt;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
p.ad, li.ad, div.ad
{mso-style-name:ad;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
p.underline, li.underline, div.underline
{mso-style-name:underline;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
span.yshortcuts
{mso-style-name:yshortcuts;}
p.ad1, li.ad1, div.ad1
{mso-style-name:ad1;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
p.ad2, li.ad2, div.ad2
{mso-style-name:ad2;
mso-margin-top-alt:auto;
margin-right:0in;
margin-bottom:7.5pt;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
p.underline1, li.underline1, div.underline1
{mso-style-name:underline1;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";
text-decoration:underline;}
span.yshortcuts1
{mso-style-name:yshortcuts1;
font-family:"Verdana","sans-serif";
font-weight:bold;}
span.yshortcuts2
{mso-style-name:yshortcuts2;
font-family:"Verdana","sans-serif";
font-weight:normal;}
span.EmailStyle42
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:2089498238;
mso-list-template-ids:1809992042;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=white lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal style='margin-bottom:12.0pt'><a href="http://www.alternet.org/civil-liberties/how-powerful-intelligence-world-verge-ability-make-people-digitally-disappear">http://www.alternet.org/civil-liberties/how-powerful-intelligence-world-verge-ability-make-people-digitally-disappear</a><o:p></o:p></p><div id=article><div><h1><span style='font-family:"Georgia","serif"'>How the Powerful Intelligence World Is on the Verge of the Ability to Make People Digitally Disappear<o:p></o:p></span></h1><p><em><span style='font-size:11.5pt;font-family:"Georgia","serif"'>December 6, 2013 </span></em><span style='font-size:11.5pt;font-family:"Georgia","serif"'> | <o:p></o:p></span></p><p><em><span style='font-size:11.5pt;font-family:"Georgia","serif"'>To stay on top of important articles like these, sign up to receive the </span></em><span style='font-size:11.5pt;font-family:"Georgia","serif"'><a href="https://app.e2ma.net/app/view:Join/signupId:43308/acctId:25612"><em><span style='font-family:"Georgia","serif"'>latest updates from TomDispatch.com here.</span></em></a> [3]<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>What if Edward Snowden was made to disappear? No, I’m not suggesting some future CIA rendition effort or a who-killed-Snowden conspiracy theory of a disappearance, but a more ominous kind.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>What if everything a whistleblower had ever exposed could simply be made to go away? What if every National Security Agency (NSA) document Snowden released, every interview he gave, every documented trace of a national security state careening out of control could be made to disappear in real-time? What if the very posting of such revelations could be turned into a fruitless, record-less endeavor?<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Am I suggesting the plot for a novel by some twenty-first century George Orwell? Hardly. As we edge toward a fully digital world, such things may soon be possible, not in science fiction but in our world—and at the push of a button. In fact, the earliest prototypes of a new kind of “disappearance” are already being tested. We are closer to a shocking, dystopian reality that might once have been the stuff of futuristic novels than we imagine. Welcome to the memory hole.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Even if some future government stepped over one of the last remaining red lines in our world and simply assassinated whistleblowers as they surfaced, others would always emerge. Back in 1948, in his eerie novel <a href="http://en.wikipedia.org/wiki/Nineteen_Eighty-Four#The_War" target="_blank"><em><span style='font-family:"Georgia","serif"'>1984</span></em></a> [4], however, Orwell suggested a far more diabolical solution to the problem. He conjured up a technological device for the world of Big Brother that he called "<a href="http://en.wikipedia.org/wiki/Memory_hole" target="_blank">the memory hole</a> [5]." In his dark future, armies of bureaucrats, working in what he sardonically dubbed the Ministry of Truth, spent their lives erasing or altering documents, newspapers, books, and the like in order to create an acceptable version of history. When a person fell out of favor, the Ministry of Truth sent him and all the documentation relating to him down the memory hole. Every story or report in which his life was in any way noted or recorded would be edited to eradicate all traces of him.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>In Orwell's pre-digital world, the memory hole was a vacuum tube into which old documents were physically disappeared forever. Alterations to existing documents and the deep-sixing of others ensured that even the sudden switching of global enemies and alliances would never prove a problem for the guardians of Big Brother. In the world he imagined, thanks to those armies of bureaucrats, the present was what had always been—and there were those altered documents to prove it and nothing but faltering memories to say otherwise. Anyone who expressed doubts about the truth of the present would, under the rubric of “<a href="http://en.wikipedia.org/wiki/Thoughtcrime" target="_blank">thoughtcrime</a> [6],” be marginalized or eliminated.<o:p></o:p></span></p><p><strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Government and Corporate Digital Censorship</span></strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'><o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Increasingly, most of us now get our news, books, music, TV, movies, and communications of every sort electronically. These days, Google earns more <a href="http://news.cnet.com/8301-1023_3-57548432-93/google-makes-more-money-from-ads-than-print-media-combined/" target="_blank">advertising revenue</a> [7] than all U.S. print media combined. Even the venerable <em><span style='font-family:"Georgia","serif"'>Newsweek</span></em> no longer publishes a <a href="http://online.wsj.com/news/articles/SB10001424127887324660404578201432812202750" target="_blank">paper edition</a> [8]. And in that digital world, a certain kind of “simplification” is being explored. The <a href="http://abcnews.go.com/Technology/story?id=4707107" target="_blank">Chinese</a> [9], <a href="http://www.blockediniran.com/" target="_blank">Iranians</a> [10], and others are, for instance, already implementing web-filtering strategies to block access to sites and online material of which their governments don’t approve. The U.S. government similarly (if somewhat fruitlessly) blocks its employees from <a href="http://wemeantwell.com/blog/2012/04/10/she-remained-silent-we-do-not/" target="_blank">viewing</a> [11] Wikileaks and Edward Snowden material (as well as websites like <a href="http://wemeantwell.com/blog/2011/05/15/state-department-censors-web-sites-china-allows/" target="_blank">TomDispatch</a> [12]) on their work computers—though not of course at home. Yet.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Great Britain, however, will soon take a significant step toward deciding what a private citizen can see on the web even while at home. Before the end of the year, almost all Internet users there will be “opted-in” to a system designed to <a href="http://www.huffingtonpost.com/2013/07/29/uk-internet-filter-block-more-than-porn_n_3670771.html" target="_blank">filter out</a> [13] pornography. By default, the controls will also block access to "violent material," "extremist and terrorist related content," "anorexia and eating disorder websites," and "suicide related websites." In addition, the new settings will censor sites mentioning alcohol or smoking. The filter will also block "esoteric material," though a UK-based rights group says the government has yet to make clear what that category will include.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>And government-sponsored forms of Internet censorship are being privatized. New, off-the-shelf commercial products guarantee that an organization does not need to be the NSA to block content. For example, the Internet security company <a href="http://www.edgeblue.com/?gclid=CJX47-iCi7sCFWQOOgodOzoAig" target="_blank">Blue Coat</a> [14] is a domestic leader in the field and a major exporter of such technology. It can easily set up a system to monitor and filter all Internet usage, blocking web sites by their address, by keywords, or even by the content they contain. Among others, Blue Coat software is used by the U.S. Army to <a href="http://americablog.com/2013/01/blue-coat-internet-censor-syria-burma.html" target="_blank">control</a> [15] what its soldiers see while deployed abroad, and by the repressive governments in <a href="https://www.eff.org/deeplinks/2011/10/blue-coat-acknowledges-syrian-government-use-its-products" target="_blank">Syria</a> [16], <a href="http://americablog.com/2013/01/blue-coat-internet-censor-syria-burma.html" target="_blank">Saudi Arabia, and Burma</a> [15] to block outside political ideas.<o:p></o:p></span></p><p><strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Google Search...</span></strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'><o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>In a sense, Google Search already “disappears” material. Right now Google is the good guy vis-à-vis whistleblowers. A quick Google search (0.22 seconds) turns up more than 48 million hits on Edward Snowden, most of them referencing his leaked NSA documents. Some of the websites display the documents themselves, still labeled “Top Secret.” Less than half a year ago, you had to be one of a very limited group in the government or contractually connected to it to see such things. Now, they are splayed across the web.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Google—and since Google is the planet’s number one search engine, I'll use it here as a shorthand for every search engine, even those yet to be invented—is in this way amazing and looks like a massive machine for spreading, not suppressing, news. Put just about anything on the web and Google is likely to find it quickly and add it into search results worldwide, sometimes within seconds. Since most people rarely scroll past the first few search results displayed, however, being disappeared already has a new meaning online. It’s no longer enough just to get Google to notice you. Getting it to place what you post high enough on its search results page to be noticed is what matters now. If your work is number 47,999,999 on the Snowden results, you’re as good as dead, as good as disappeared. Think of that as a starting point for the more significant forms of disappearance that undoubtedly lie in our future.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Hiding something from users by reprogramming search engines is one dark step to come. Another is actually deleting content, a process as simple as transforming the computer coding behind the search process into something predatory. And if Google refuses to implement the change-over to “negative searches,” the NSA, which already appears to be able to reach <a href="http://www.bbc.co.uk/news/world-us-canada-24751821" target="_blank">inside Google</a> [17], can implant its own version of malicious code as it has already done in at least <a href="http://www.pcworld.com/article/2066840/nsa-reportedly-compromised-more-than-50000-networks-worldwide.html" target="_blank">50,000</a> [18] instances.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>But never mind the future: here's how a negative search strategy is already working, even if today its focus—largely on pedophiles—is easy enough to accept. Google recently introduced software that makes it harder for users to locate child abuse material. As company head <a href="http://www.google.com/about/company/facts/management/" target="_blank">Eric Schmidt</a> [19] put it, Google Search has been “<a href="http://www.dailymail.co.uk/news/article-2512752/Google-technology-catches-man-accused-uploading-3-000-child-porn-images-arrested-FBI.html" target="_blank">fine-tuned</a> [20]” to clean up results for more than 100,000 terms used by pedophiles to look for child pornography. Now, for instance, when users type in queries that may be related to child sexual abuse, they will find <a href="http://www.washingtonpost.com/world/europe/google-chief-says-company-has-introduced-software-to-block-child-sex-abuse-searches/2013/11/18/3659f110-503e-11e3-9ee6-2580086d8254_story.html" target="_blank">no results</a> [21] that link to illegal content. Instead, Google will redirect them to help and counseling sites. “We will soon roll out these changes in more than 150 languages, so the impact will be truly global,” Schmidt wrote.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>While Google is redirecting searches for kiddie porn to counseling sites, the NSA has developed a similar ability. The agency already controls a set of servers codenamed <a href="https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations" target="_blank">Quantum</a> [22] that sit on the Internet’s backbone. Their job is to redirect “targets” away from their intended destinations to websites of the NSA's choice. The idea is: you type in the website you want and end up somewhere less disturbing to the agency. While at present this technology may be aimed at sending would-be online <em><span style='font-family:"Georgia","serif"'>jihadis</span></em> to more moderate Islamic material, in the future it could, for instance, be repurposed to redirect people seeking news to an Al-Jazeera lookalike site with altered content that fits the government's version of events.<o:p></o:p></span></p><p><strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'>...and Destroy</span></strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'><o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>However, blocking and redirecting technologies, which are bound to grow more sophisticated, will undoubtedly be the least of it in the future. Google is already taking things to the next level in the service of a cause that just about anyone would applaud. They are implementing picture-detection technology to identify child abuse photographs whenever they appear on their systems, as well as testing technology that would remove illegal videos. Google's actions against child porn may be well intentioned indeed, but the technology being developed in the service of such anti-child-porn actions should chill us all. Imagine if, back in 1971, the <a href="http://www.archives.gov/research/pentagon-papers/" target="_blank">Pentagon Papers</a> [23], the first glimpse most Americans had of the lies behind the Vietnam War, had been deletable. Who believes that the Nixon White House wouldn’t have disappeared those documents and that history wouldn’t have taken a different, far grimmer course?<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Or consider an example that’s already with us. In 2009, many Kindle owners discovered that Amazon had reached into their devices overnight and <a href="http://www.slate.com/articles/technology/technology/2009/07/why_2024_will_be_like_nineteen_eightyfour.html" target="_blank">remotely deleted</a> [24] copies of Orwell's <em><span style='font-family:"Georgia","serif"'>Animal Farm</span></em> and <em><span style='font-family:"Georgia","serif"'>1984</span></em>(no irony intended). The company explained that the books, mistakenly “published” on its machines, were actually bootlegged copies of the novels. Similarly, in 2012, Amazon <a href="http://www.huffingtonpost.com/2012/10/22/amazon-kindle-deleted-remotely-ebooks-drm_n_2001952.html" target="_blank">erased the contents</a> [25] of a customer's Kindle without warning, claiming her account was "directly related to another which has been previously closed for abuse of our policies." Using the same technology, Amazon now has the ability to <a href="http://www.amazon.com/forum/kindle?_encoding=UTF8&cdForum=Fx1D7SY3BVSESG&cdThread=Tx3RVFW5BNK9WP9" target="_blank">replace books</a> [26] on your device with “updated” versions, the content altered. Whether you are notified or not is up to Amazon.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>In addition to your Kindle, remote control over your other devices is already a reality. Much of the software on your computer communicates in the background with its home servers, and so is open to “updates” that can <a href="http://www.tomshardware.com/forum/60276-63-strange-software-update-habits-recently-computer" target="_blank">alter content</a> [27]. The NSA uses malware—malicious software remotely implanted into a computer—to <a href="https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations" target="_blank">change the way</a> [22] the machine works. The <a href="http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/" target="_blank">Stuxnet</a> [28] code that likely damaged 1,000 centrifuges the Iranians were using to enrich uranium is one example of how this sort of thing can operate.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>These days, every iPhone checks back with headquarters to announce what apps you've purchased; in the tiny print of a disclaimer routinely clicked through, Apple reserves the right to <a href="http://www.digitaltrends.com/mobile/apple-can-kill-iphone-apps/" target="_blank">disappear any app</a> [29] for any reason. In 2004, TiVo sued Dish Network for giving customers set-top boxes that TiVo said infringed on its software patents. Though the case was settled in return for a large payout, as an initial remedy, the judge ordered Dish to <a href="http://www.techhelpfox.com/7817379/Latest-On-Tivoforgentechostar-Lawsuits" target="_blank">electronically disable</a> [30] the 192,000 devices it had already installed in people's homes. In the future, there will be ever more ways to invade and control computers, alter or disappear what you're reading, and shunt you to sites weren't looking for.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Snowden's revelations of what the NSA does to gather information and control technology, which have riveted the planet since June, are only part of the equation. How the government will enhance its surveillance and control powers in the future is a story still to be told. Imagine coupling tools to hide, alter, or delete content with smear campaigns to discredit or dissuade whistleblowers, and the power potentially available to both governments and corporations becomes clearer.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>The ability to move beyond altering content into altering how people act is obviously on governmental and corporate agendas as well. The NSA has already gathered <a href="http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html" target="_blank">blackmail data</a> [31] from the digital porn viewing habits of “radical” Muslims. The NSA sought to <a href="http://www.emptywheel.net/2013/11/27/in-2009-nsa-said-it-had-a-present-example-of-abuse-similar-to-project-minaret/" target="_blank">wiretap a Congressman</a> [32] without a warrant. The ability to collect information on Federal judges, government leaders, and presidential candidates makes J. Edgar Hoover's 1950s <a href="http://www.thedailybeast.com/articles/2011/08/02/fbi-director-hoover-s-dirty-files-excerpt-from-ronald-kessler-s-the-secrets-of-the-fbi.html" target="_blank">blackmail schemes</a> [33] as quaint as the bobby socks and poodle skirts of that era. The wonders of the Internet regularly stun us. The dystopian, Orwellian possibilities of the Internet have, until recently, not caught our attention in the same way. They should.<o:p></o:p></span></p><p><strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Read This Now, Before It’s Deleted</span></strong><span style='font-size:11.5pt;font-family:"Georgia","serif"'><o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>The future for whistleblowers is grim. At a time not so far distant, when just about everything is digital, when much of the world's Internet traffic flows directly through the United States or allied countries, or through the infrastructure of American companies abroad, when search engines can find just about anything online in fractions of a second, when the <a href="https://www.eff.org/issues/patriot-act" target="_blank">Patriot Act</a> [34] and secret rulings by the <a href="http://en.wikipedia.org/wiki/United_States_Foreign_Intelligence_Surveillance_Court" target="_blank">Foreign Intelligence Surveillance Court</a> [35] make Google and similar tech giants <a href="http://www.theguardian.com/world/2013/sep/18/phone-companies-silent-nsa-data-collection" target="_blank">tools</a> [36] of the national security state (assuming organizations like the NSA don't simply take over the search business directly), and when the sophisticated technology can either block, alter, or delete digital material at the push of a button, the memory hole is no longer fiction.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Leaked revelations will be as pointless as dusty old books in some attic if no one knows about them. Go ahead and publish whatever you want. The First Amendment allows you to do that. But what's the point if no one will be able to read it? You might more profitably stand on a street corner and shout at passers by. In at least one easy-enough-to-imagine future, a set of Snowden-like revelations will be blocked or deleted as fast as anyone can (re)post them.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>The ever-developing technology of search, turned 180 degrees, will be able to disappear things in a major way. The Internet is a vast place, but not infinite. It is increasingly being centralized in the hands of a few companies under the control of a few governments, with the U.S. sitting on the major transit routes across the Internet’s backbone.<o:p></o:p></span></p><p><span style='font-size:11.5pt;font-family:"Georgia","serif"'>About now you should feel a chill. We’re watching, in real time, as <em><span style='font-family:"Georgia","serif"'>1984</span></em> turns from a futuristic fantasy long past into an instructional manual. There will be no need to kill a future Edward Snowden. He will already be dead.<o:p></o:p></span></p><p><em><span style='font-size:11.5pt;font-family:"Georgia","serif"'>Follow TomDispatch on Twitter and join us on <a href="http://www.facebook.com/tomdispatch" target="_blank">Facebook</a> [37] or <a href="http://tomdispatch.tumblr.com/" target="_blank">Tumblr</a> [38]. Check out the newest Dispatch Book, Ann Jones’s</span></em><span style='font-size:11.5pt;font-family:"Georgia","serif"'><a href="http://www.amazon.com/dp/1608463710/ref=nosim/?tag=tomdispatch-20" target="_blank">They Were Soldiers: How the Wounded Return From America’s Wars — The Untold Story</a> [39]<em><span style='font-family:"Georgia","serif"'>.</span></em><o:p></o:p></span></p></div></div><p class=MsoNormal><span class=apple-mail-urlshareusercontentbottomclass><o:p> </o:p></span></p><div><div><div><p class=MsoNormal><span style='color:black'>Predictions can be very difficult—especially about the future. <br>— Niels Bohr<br>Quoted in H. Rosovsky, The University: An Owners Manual (1991), Bohr always attributed the saying to Robert Storm Petersen (1882-1949), a well-known Danish artist and writer. However, the saying did NOT originate from Petersen. It may have been said in the Danish Parliament between 1935 and 1939 [Professor Erik Rüdinger, Niels Bohr Archive, Copenhagen]. <br> </span><span style='color:black'><o:p></o:p></span></p></div></div></div><p class=MsoNormal><br><br><o:p></o:p></p><div><p class=MsoNormal><span style='color:white'>__._,_.___<o:p></o:p></span></p></div><table class=MsoNormalTable border=0 cellpadding=0><tr><td style='border:solid #EAEAEA 1.0pt;background:#F2F2F2;padding:5.25pt 3.75pt 3.75pt 3.75pt'><p class=MsoNormal style='mso-margin-top-alt:15.0pt;margin-right:0in;margin-bottom:7.5pt;margin-left:0in'><b><span style='font-size:9.0pt;font-family:"Arial","sans-serif";color:white'><a href="http://groups.yahoo.com/group/Ottawadissenters/post;_ylc=X3oDMTJyZ291NHFoBF9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRtc2dJZAMyODAxMQRzZWMDZnRyBHNsawNycGx5BHN0aW1lAzEzODY4NTYwMjM-?act=reply&messageNum=28011"><span style='color:#2D50FD;text-decoration:none'>Reply via web post</span></a> <o:p></o:p></span></b></p></td><td style='border:solid #EAEAEA 1.0pt;background:#F2F2F2;padding:5.25pt 3.75pt 3.75pt 3.75pt'><p class=MsoNormal style='mso-margin-top-alt:15.0pt;margin-right:0in;margin-bottom:7.5pt;margin-left:0in'><span style='font-size:9.0pt;font-family:"Arial","sans-serif";color:white'><a href="mailto:kurtzs@ncf.ca?subject=Re%3A%20Powerful%20Intelligence%20World%20on%20the%20Verge%20of%20the%20Ability%20to%20Make%20People%20Digitally%20Disappear"><span style='color:#2D50FD;text-decoration:none'>Reply to sender </span></a><o:p></o:p></span></p></td><td style='border:solid #EAEAEA 1.0pt;background:#F2F2F2;padding:5.25pt 3.75pt 3.75pt 3.75pt'><p class=MsoNormal style='mso-margin-top-alt:15.0pt;margin-right:0in;margin-bottom:7.5pt;margin-left:0in'><span style='font-size:9.0pt;font-family:"Arial","sans-serif";color:white'><a href="mailto:Ottawadissenters@yahoogroups.com?subject=Re%3A%20Powerful%20Intelligence%20World%20on%20the%20Verge%20of%20the%20Ability%20to%20Make%20People%20Digitally%20Disappear"><span style='color:#2D50FD;text-decoration:none'>Reply to group </span></a><o:p></o:p></span></p></td><td style='border:solid #EAEAEA 1.0pt;background:#F2F2F2;padding:5.25pt 3.75pt 3.75pt 3.75pt'><p class=MsoNormal style='mso-margin-top-alt:15.0pt;margin-right:0in;margin-bottom:7.5pt;margin-left:0in'><span style='font-size:9.0pt;font-family:"Arial","sans-serif";color:white'><a href="http://groups.yahoo.com/group/Ottawadissenters/post;_ylc=X3oDMTJmZWNrdDBuBF9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDZnRyBHNsawNudHBjBHN0aW1lAzEzODY4NTYwMjM-"><span style='color:#2D50FD;text-decoration:none'>Start a New Topic</span></a> <o:p></o:p></span></p></td><td style='border:solid #EAEAEA 1.0pt;background:#F2F2F2;padding:5.25pt 3.75pt 3.75pt 3.75pt'><p class=MsoNormal style='mso-margin-top-alt:15.0pt;margin-right:0in;margin-bottom:7.5pt;margin-left:0in'><span style='font-size:9.0pt;font-family:"Arial","sans-serif";color:#2D50FD'><a href="http://groups.yahoo.com/group/Ottawadissenters/message/28011;_ylc=X3oDMTM3aGc2cjBsBF9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRtc2dJZAMyODAxMQRzZWMDZnRyBHNsawN2dHBjBHN0aW1lAzEzODY4NTYwMjMEdHBjSWQDMjgwMTE-"><span style='color:#2D50FD;text-decoration:none'>Messages in this topic</span></a> (1) <o:p></o:p></span></p></td></tr></table><div style='margin-bottom:7.5pt' id=ygrp-vital><p class=MsoNormal style='background:#F2F2F2'><b><span style='font-size:7.5pt;font-family:"Verdana","sans-serif";color:#333333;text-transform:uppercase'>Recent Activity:</span></b><span style='font-size:7.5pt;font-family:"Verdana","sans-serif"'> <o:p></o:p></span></p><div><p class=MsoNormal style='background:#F2F2F2'><span style='font-size:7.5pt;font-family:"Verdana","sans-serif";color:#1E66AE'><a href="http://groups.yahoo.com/group/Ottawadissenters;_ylc=X3oDMTJmb2ZkYzM2BF9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzEzODY4NTYwMjM-"><span style='text-decoration:none'>Visit Your Group</span></a> <o:p></o:p></span></p></div></div><div style='margin-top:3.75pt' id=ft><p class=MsoNormal><span style='font-size:8.5pt;font-family:"Arial","sans-serif"'><a href="http://groups.yahoo.com/;_ylc=X3oDMTJlMWJ2a2owBF9TAzk3NDc2NTkwBGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTM4Njg1NjAyMw--"><span style='text-decoration:none'><img border=0 width=137 height=15 id="_x0000_i1025" src="http://l.yimg.com/ru/static/images/yg/img/email/new_logo/logo-groups-137x15.png" alt="Yahoo! Groups"></span></a><o:p></o:p></span></p><div><p class=MsoNormal><span style='font-size:8.5pt;font-family:"Arial","sans-serif";color:#747575'>Switch to: <a href="mailto:Ottawadissenters-traditional@yahoogroups.com?subject=Change%20Delivery%20Format:%20Traditional"><span style='text-decoration:none'>Text-Only</span></a>, <a href="mailto:Ottawadissenters-digest@yahoogroups.com?subject=Email%20Delivery:%20Digest"><span style='text-decoration:none'>Daily Digest</span></a> • <a href="mailto:Ottawadissenters-unsubscribe@yahoogroups.com?subject=Unsubscribe"><span style='text-decoration:none'>Unsubscribe</span></a> • <a href="http://info.yahoo.com/legal/us/yahoo/utos/terms/"><span style='text-decoration:none'>Terms of Use</span></a> • <a href="mailto:ygroupsnotifications@yahoogroups.com?subject=Feedback%20on%20the%20redesigned%20individual%20mail%20v1"><span style='text-decoration:none'>Send us Feedback </span></a><o:p></o:p></span></p></div></div><div><p class=MsoNormal><span style='font-size:1.0pt;color:white'>.<o:p></o:p></span></p></div><p class=MsoNormal><img border=0 width=1 height=1 id="_x0000_i1026" src="http://geo.yahoo.com/serv?s=97359714/grpId=15209059/grpspId=1705083512/msgId=28011/stime=1386856023"><o:p></o:p></p><div><p class=MsoNormal><span style='color:white'>__,_._,___<o:p></o:p></span></p></div></div></body></html>