Home

1984 Doublespeak

Leave a comment

Author,
Chuck Frank

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The definition of Doublespeak is language used to deceive usually through concealment or misrepresentation of truth.  Merriam-Webster.  For decades, an example of doublespeak can be seen through political persuasion, educational propaganda, censorship or fake news.  Augustus and Tiberius were dedicated to Rome’s imperial doubled doublespeak,  paying lip service to the Republic while ruling as oppressive emperors.

Taking this discourse a bit further, where is the evidence for America using the charade of doublespeak? Besides concealing certain events though censorship or fabrication with the likes of the mainstream media, Facebook or Google tampering, all one must do is look at how many executive orders are used by a U.S. President. One example shows that President Obama used executive orders that surpassed the combined executive total of all of the past Presidents.

Is this the unpardonable sin? Consequently, the American “Republic” took the biggest, emperor hit ever, considering that the power of any Republic rests with the people and the Congressional representatives who are elected, “by the people.” Yet why had Congress looked the other way?

Furthermore, in this day and age, doublespeak takes on other maladies.  For instance, some have declared that those who were our Founders and went to war with Great Britain during the American Revolution were “terrorists”.  Yet, these same people who attack the likes of George Washington, Thomas Jefferson and the rest, are presently attempting to rewrite history and steer our entire nation towards a secular, Marxist form of government that would eventually become part of an un-elected New World Order where nationalism withers away.

Is not the European Union one of the best examples of the coming oppression? More

Advertisements

This Attorney General wants to revive SOPA and censor the Internet.

Leave a comment

strip bannerFIGHT FOR THE FUTURE.ORG

AG_Jim_Hood_AW_t670_png_400x0_q85
What is Jim Hood’s plan for the Internet?

Mississippi AG Jim Hood says he wants a list of sites that search engines and ISPs would be legally required to block. Who makes the list? Well, leaked emails show Hood is working for the MPAA, the lobby that brought us the Internet censorship bill SOPA. His own legal filings were written by MPAA lawyers!

Hood’s office number is: 1-601-359-3680. Call him now, or sign the petition below. When you call, say: “I have a message for Jim Hood. Stop working with movie executives to censor America’s Internet”.

Go here to sign this letter to Jim Hood!

Control of the Internet in Global Binding Treaty?

7 Comments

Avaaz.org

Right now at a UN meeting in Dubai, authoritarian regimes are pushing for full governmental control of the Internet in a binding global treaty — if they succeed, the internet could become less open, more costly and much slower. We have only 2 days to stop them.

The Internet has been an amazing example of people power — allowing us to connect, speak out and pressure leaders like never before. That’s largely because it’s been governed to date by users and non-profits and not governments. But now countries like Russia, China and United Arab Emirates are trying to rewrite a major telecom treaty called the ITR to bring the Internet under its control — the web would then be shaped by government interests and not by us, the users. Tim Berners Lee, one of the “fathers of the Internet,” has warned that this could increase censorship online and invade our privacy. But if we object with a massive people-powered petition, we can strengthen the hand of countries fighting this power grab.

We have stopped attacks like this before and can do it again before the treaty text is locked this week. A wave of opposition to a new ITR is already building — sign the petition to tell governments hands off our Internet! and then forward this email to everyone you know — when we hit 1 million signers, it’ll be delivered straight to the delegates at this cozy meeting: More

The Virtual Wars: How Hacktivism Finally Became a Powerful Virtual Weapon

2 Comments

Source: frugaldad.com

Hacking might not be something you think of very often in terms of major conflicts. The Internet has been around for a relatively small portion of history, but today it represents a serious battleground for many different kinds of conflict, from the petty to the monumental.

This infographic takes a look at how hacking has become a weapon in many kinds of conflict. From governments gathering information on people they perceive as in opposition all the way to types of political speech, hacking and “hacktivism,” are on the rise.

I found it especially interesting that most hackers are located in the United States—66% of them, in fact. It’s becoming such a common thing that I feel like everyone should be aware of it—and aware that it’s a weapon wielded by governments and parties on all sides of conflict. Hacking has evolved far beyond online thieves and fraud: these days it’s a much more complex and versatile thing.

View the info graphic from Frugaldad here: More

Congress: We are insane to let these people even assemble

35 Comments

Marti Oakley

copyright 2012

__________________________________________________________

The attempts to take over the net, regardless of what reasons they give are indicative of a government that has removed itself so far from the people it claims to represent that I believe we are insane to even let these people assemble. Its too much like watching an invading army that is fully determined to destroy us at any cost.

Just today, another of those staged “committee hearings” was taking place in the efforts to revive the federal governments intention to launch a full frontal attack on the first amendment and free speech.  Of course no one of any consequence appeared as a witness opposing this intent to take over the net, but we did have the usual line-up of the Permanent Political Class sitting front and center ready to deliver what could be nothing less than their own personal version of the dooms-day scenario they envision for us if we do not comply with their desire to throttle the net for political purposes.

Among these political hacks who are cheering on the assault on freedom of speech was Diane Feinstein, Jay Rockefeller, Susan Collins and of course our all-time despised political puppet, good ol’ Joe Lieberman.  These characters were accompanied by Tom Ridge, Janet Napolitano and whomever else Lieberman could drag in to this stage show, willing to do their part in attempting to terrify the nation into viewing an open and free internet as not only a threat to national security, but to economic security as well.  More

The Wild, Wild Web: Wrestling Online Privacy

1 Comment

The Frugaldad comes though again with an eye popping chart on just how vulnerable we have become on the web.

Last week we debuted an infographic on the SOPA blackout, showing how the internet has become a powerful tool for activism. But the spread of social media also has its risks. Those same sites that we use to connect to family, friends and our community can also compromise sensitive information. According to Carnegie Mellon researchers, information listed on social media may be enough to guess a social security number, the key to identity theft. And with mobile banking apps, more and more people are logging sensitive information from their smart phones. Add confusing Terms of Service agreements into the mix (they take an average of 10 minutes each to read!), and it’s easy to see why online privacy can feel mystifying.

The following infographic helps explain some of the biggest issues in web safety and gives tips on how to keep yourself protected, from passwords to privacy policies. With a few steps, you can be confident that you control what you share online. Click here to view graphic! More

Open Letter to Senator Franken Re: S:968

4 Comments

Marti Oakley


______________________________________________________

Dear Senator Franken:

I received your reply to my objection to SOPA and PIPA, and have noted that either you have been totally misled about online piracy, or have intentionally misrepresented the issue at hand.

Contrary to your letter, something has already been done to protect copyright infringement.  They call it the TRIPS agreement.  There are 185 member states.  I think that’s just about everyone. 

This agreement is used by corporations and individuals worldwide to protect every thing from fictitious patents from Monsanto and other bio-pirates that claim a new life form has been created, to musical compositions, literary works, creative arts, traditional knowledge, inventions of all kinds, seeds, gene splicing, hybridization of animals, scientific papers and dissertations and theory, mechanical design, fluid designs, poetry, books, surveillance methodologies, movies and other theatrical creations, etc..

You get the picture.  Everything that SOPA and PIPA claim they would cover is already covered in the TRIPS agreement, including trademarks, with the appropriate enforcement included.

From your letter:

“Right now, a company has no way to enforce its rights if it finds that its products are being pirated or counterfeited on a website hosted overseas. The PROTECT IP Act was designed to give the Attorney General and private companies a way to cut off the flow of money to these foreign sites. We can’t force those sites to stop infringing our copyrights and trademarks because they’re not subject to our courts, but we can make sure they don’t make money in the process.” [end quote]

Wrong  Senator!  They have the TRIPS agreement and god only knows how many other agreements, rules, regulations, harmonization agreements, etc., that we don’t even know about….yet.   Surely we have some economy killing trade agreement with these countries that allow the infringing that could be used for leverage. More

Older Entries

%d bloggers like this: