Down With Power Audiobook!

L. Neil Smith's

Number 847, November 15, 2015

I don't recall anyone ever saying "Fewer
guns, more crime.", but maybe it's time
we did. We have just been treated to an
example of that insane principle at work.

Special to L. Neil Smith's The Libertarian Enterprise

"Civilization is the progress toward a society of privacy. The savage's whole existence is public, ruled by the laws of his tribe. Civilization is the process of setting man free from men."
—Ayn Rand, The Soul of an Individualist, For the New Intellectual, 84

"I never said, 'I want to be alone.' I only said 'I want to be let alone!' There is all the difference."
—Greta Garbo, Garbo

"I think a lot of the privacy people perhaps don't understand that we still occupy the role of the Great Satan. New bombs are being devised, new terrorists are emerging, new groups—uh, actually, a new level of viciousness, and I think we need to be prepared."
—USA senator Dianne Feinstein

Being in favour of the right to privacy is fundamental to my understanding of the zero aggression principle. It is none of my business what you do in the privacy of your home, on your computer, in your e-mail messages, on the telephone, or in any other aspect of your life, provided that you are not engaged in acts of initiatory force. To paraphrase Thomas Jefferson, what you think or say neither picks my pocket nor punches my nose.

My right to defend myself, with tools as I see fit, has nothing to do with your right to think, write, talk, act, and express yourself as you see fit, unless your actions represent a threat of initiatory force to me. Equally, my freedom to defend my own privacy has nothing to do with you, your "security," or any ideas your government may have about what I should and should not do.

If Feinstein Hates It...
Not everyone agrees. I believe that Dianne Feinstein is the principal author of recent legislation attacking individual liberty, and she is one of the greatest offenders in opposing any meaningful privacy for anyone. She evidently wishes to use fear mongering to frighten people into supporting her fascist, authoritarian, privacy-destroying legislation. What she and the other seventy-odd senators pretending to represent the people of the several states have done in approving, in late October, of a comprehensive "cyber-security information sharing act" is disgusting. These senators are evil men and women who worship central planning, defy logic by believing in privacy for themselves and monitoring for everyone else, and attack individual liberty at every opportunity. I say that they are evil because they evidently are paid off by the bribes, campaign contributions, and lobbying activities of military contractors, espionage agency contractors, and other fans of big government.

Feinstein and her ilk appear to believe that government should not only be allowed to invade the privacy of individuals, they also seem to believe that government should be allowed to engage in wars of aggression, attack individuals in their homes, round up dissenters, and impose Orwellian "thought police" restrictions on free speech. She may (or may not) deny that she believes these things, but her actions and the legislation that she has promoted confirm that she does in fact believe them. Feinstein is an authoritarian who would rather see you tortured to death under extreme rendition than see you express a point of view contrary to her own, in my opinion.

In case you thought maybe fleeing to London, England would help solve your difficulties, I have sad news. The UK's "investigatory powers" bill and other rules would seem to obligate every company over there to prevent their customers from using effective encryption. You know, to keep the British Empire safe from the people it has under military occupation.

Brandeis and Warren Favoured Privacy Back in 1890, one of the most influential essays in the history of American law was published. It was written by Louis Brandeis (who would later be on the USA supreme court and write an opinion with the famous "we have more to fear from men of zeal, well-meaning, but without understanding" quote) and Samuel Warren, a Boston lawyer. You can read it here. I've excerpted some parts here to give you a sense of their thoughts on the matter.

"Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right 'to be let alone.' Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that 'what is whispered in the closet shall be proclaimed from the house- tops.' For years there has been a feeling that the law must afford some remedy for the unauthorized circulation of portraits of private persons....

"The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others. Under our system of government, he can never be compelled to express them (except when upon the witness stand); and even if he has chosen to give them expression, he generally retains the power to fix the limits of the publicity which shall be given them. The existence of this right does not depend upon the particular method of expression adopted. It is immaterial whether it be by word or by signs, in painting, by sculpture, or in music. Neither does the existence of the right depend upon the nature or value of the thought or emotions, nor upon the excellence of the means of expression. The same protection is accorded to a casual letter or an entry in a diary and to the most valuable poem or essay, to a botch or daub and to a masterpiece. In every such case the individual is entitled to decide whether that which is his shall be given to the public.

"[T]he more general right of the individual to be let alone. It is like the right not be assaulted or beaten, the right not be imprisoned, the right not to be maliciously prosecuted, the right not to be defamed. In each of these rights, as indeed in all other rights recognized by the law, there inheres the quality of being owned or possessed—and (as that is the distinguishing attribute of property) there may some propriety in speaking of those rights as property."

You can see where the technologies of the day were sufficiently invasive that they felt that a right to be let alone should be legally justifiable. You'll also notice that they don't explicitly suggest that you keep and bear arms to avoid being assaulted or beaten, nor do they make any mention of strong encryption. But, I think you can reach your own conclusions on those matters.

Some Apparatchikisti Like Privacy...
Not everyone in the government and policy area think so. For example, it is now official UN policy that governments should promote the use of strong encryption and protect anonymous expression online. In an era of unprecedentedly broad and intrusive government surveillance, these tools often offer the only safe way for people in repressive environments to express themselves freely. Maybe you should become familiar with these tools. After all, you live in a repressive environment.

Here's that exact quote from the UN specialist on the topic: "[E]ncryption and anonymity enable individuals to exercise their rights to freedom of opinion and expression in the digital age and, as such, deserve strong protection."—Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye.

You can see where the UN really makes it easy to remember David Kaye's formal title, huh?

Some Policy Influencers Like Privacy, Too
"Strong encryption and anonymity are critical for protecting human rights defenders, journalists, and ordinary users in the digital age," said Cynthia Wong, senior Internet researcher at Human Rights Watch. "Encryption allows us to preserve a safe, private space for free expression at a time when governments are expanding invasive surveillance worldwide."

Here is her group's official position: "We urge all governments to promote the use of strong encryption technologies and to protect the right to seek, receive, and impart information anonymously online. Any laws or regulations that restrict the use of encryption or anonymity online should be revised to comply with the strict three-part test the Special Rapporteur sets out in the report. We also urge information and communications technology (ICT) companies to broadly adopt encryption and other privacy-enhancing measures to safeguard the security of users." Human Rights Watch

I guess it isn't possible to use three words like "information," "communications" and "technology" without coming up with a three letter acronym (TLA).

Of perhaps greater interest is the Electronic Frontier Foundation, which is not only a policy group attempting to influence, or at least be aware of, the worst encroachments on freedom being cooked up in the Slaughterhouse on the Potomac, but also attempting to provide rational solutions to people who actually use the Internet. Here, for example, is one of their many essays on the topic of privacy.

A brief excerpt should give the flavour: "National and international laws have yet to catch up with the evolving need for privacy that comes with new technology. Several governments have also chosen to use malware to engage in extra-legal spying or system sabotage for dissidents or non-citizens, all in the name of 'national security.'"

If you want to actually do something about your privacy and freedom, you would do well to at least look over the suggestions in the Electronic Frontier Foundation's "Surveillance Self-Defence" web site.

My Thoughts
It should come as no surprise to those who know me that I am a big fan of strong encryption. Not only do I believe very strongly in e-mail encryption, having used Pretty Good Privacy (PGP) since it was an MSDOS command line programme back in 1992, but I also believe in encrypting everything else. I not only believe in information security for the defence of personal and business privacy, I also teach classes in this field through the non-profit Individual Sovereign University. Depending on what you need, from an introduction to Open PGP for $20 up to a comprehensive evaluation of technologies suited to your business operations that runs $500, on to a series of classes for you and your business associates to train you on every conceivable information privacy technology you may need (customised courses for customised prices), if there is an information security technology that exists, I can show you how to use it. I also work with other experts who build virtual privacy networks, develop and operate encrypted voice and text conferencing systems, and with several of the world's experts on digital cash. Yes, the university accepts bitcoin and litecoin.

In my own work, I use encrypted root desktops and laptops with exclusively open source software and operating systems. I use e-mail encryption. I work with open source computers so what the software does is no mystery. I use several virtual privacy networks (VPNs) to anonymise my web browsing. I avoid The Onion Router because of known security flaws, especially in the exit nodes. I use software that writes random data over the empty parts of my hard drives rather than trusting "delete file" routines. I use "no scripts" and "ad block plus" software plugins to reduce the insecurity of my web browsing activities. And, of course, I use a wallet from the Digital Cash Alliance to keep my bitcoin and litecoin activities off the blockchain.

Something else is coming, soon. It is a unique virtual privacy network being spearheaded by two of the most technically brilliant people I know. Among other unique features, it will offer audio and video call encryption. I'm not at liberty to say much more, but I can assure you that the technology behind this new development involves a familiar name in cryptography, one of the leaders in the anti-war movement. I think you'll like it. The announcement, which may be as soon as Monday 16 November will be made on Twitter @digitalcashally and elsewhere.

There is no longer any question about whether your Internet activities are being monitored. Thanks to the revelations of Chelsea Manning, Ed Snowden, and many others, you can be confident that people in the USA government, in foreign governments, and in major corporations are monitoring your writings, your browsing, and your other online activities. Your searches are used by Google to drive web advertising to your computer, tablet, and smart phone. The same is true of all the other major search engines, although there are a number of alternatives which allow you to shed these "features."

There is also no reason, based on the CISA bill just passed by the USA senate; the "Foreign Intelligence Surveillance Act" of 1978 as amended in 2001, 2007, and 2008; and the many other laws and regulations involved to believe that your government, or any other, is going to protect you from espionage and monitoring. Far from it, your government is very likely to be inflicting espionage, monitoring, thought policing, and authoritarian, dictatorial control over your online behaviour to the extent it can do so.

Self-Defence Matters
In other words, protect yourself. You should not be willing to go anywhere that you aren't "allowed" by the proprietors or others to keep and bear arms. Your life, your liberty, your property, is yours to keep, and it is your responsibility to defend it. You should not have any expectation of privacy if you don't use tools that are readily available, today, to protect the privacy of your information.

The choice is up to you. Naturally, if you want to post every detail from your daily life to Facebook and Twitter, if you want to share every idea that comes into your head with anyone who will listen, and if you want people to know exactly what you think of them, there are abundant opportunities to narrow-cast and even to broadcast your views. Express yourself as you see fit.

But, not every thought you have might be one you want to have become a part of your permanent file of data shared amongst the FBI, CIA, NSA, Department of Homeland Security, and other Gestapo agencies. You might not want what you are thinking, feeling, and saying to go any further than you choose. You might not especially want to have to use your right to keep and bear arms to defend your freedom from jackbooted thugs (SWAT, the sheriff, your local police, or various three letter government agencies (TLGAs)) who have shown a willingness to kick in doors, throw flash-bang grenades into baby cribs, and slaughter anyone home because something you wrote on the Internet has inspired an attack.

Choosing to keep and bear arms is a sensible choice. Choosing to use privacy and data security technologies is also sensible. Choose freedom, you'll be glad you did.

Jim Davidson is a sovereign individual, entrepreneur, and author. He spent 2012 to 2014 withdrawn from world affairs. He joined the Digital Cash Alliance where he serves in an unpaid, voluntary capacity in 2015 and is re-starting classes in privacy technology at Individual Sovereign University.

As a sovereign individual, Jim knows that it is resolution and determination which separate sovereign from servant. In the words of Étienne de la Boétie, "Resolve to serve no more, and you are at once freed. I do not ask that you place hands upon the tyrant to topple him over, but simply that you support him no longer; then you will behold him, like a great Colossus whose pedestal has been pulled away, fall of his own weight and break into pieces."

As an entrepreneur, Jim has been involved in dozens of start-up ventures in industries ranging from banking, aerospace, real estate, software, and e-commerce to space travel, data havens, and longevity research. He has worked in companies founded by others and in companies of his own creation. Entrepreneurs know that many companies end in failure. It is the fear of failure which prevents a great many people from ever being entrepreneurs or sovereign.

As an author, Jim has written essays, articles, poetry, fiction, and is developing a book on the new country trend. Words about him have appeared in Time magazine, The New York Times, The Wall Street Journal, and other major publications. Words by him have appeared in The Libertarian Enterprise, Final Frontier magazine, Space News, The Houston Post, The Houston Chronicle, and other publications. An earlier book, The Atlantis Papers was published in 1994 and is available from After Dark Publications. His collection of essays Being Sovereign is available from and his collection Being Libertarian is available from

Was that worth reading?
Then why not:

payment type

Just click the red box (it's a button!) to pay the author

This site may receive compensation if a product is purchased
through one of our partner or affiliate referral links. You
already know that, of course, but this is part of the FTC Disclosure
Policy found here. (Warning: this is a 2,359,896-byte 53-page PDF file!)

Big Head Press