Saturday, March 4, 2023

Deep State OFFICIALLY Hijacked the Internet and Free Speech/ 1st Amendment on March 2, 2023

Sundance, "People Behind Biden Announce Creation of Formal National Surveillance State, Yet No One Seems Bothered"
The “National Cybersecurity Strategy” aligns with, supports, and works in concert with a total U.S. surveillance system, where definitions of information are then applied to “cybersecurity” and communication vectors. This policy is both a surveillance system and an information filtration prism where the government will decide what is information, disinformation, misinformation and malinformation, then act upon it.

In part, this appears to be a response to the revelations around government influence of social media, the Twitter Files. Now we see the formalization of the intent. The government will be the arbiter of truth and cyber security, not the communication platforms or private companies. This announcement puts the government in control.

All of the control systems previously assembled under the guise of the Dept of Homeland Security now become part of the online, digital national security apparatus. I simply cannot emphasis enough how dangerous this is, and the unspoken motive behind it; however, to the latter, you are part of a small select group who are capable of understanding what is in this announcement without me spelling it out.

Remember, we have already lost the judicial branch to the interests of the national security state. All judicial determinations are now in deference to what is called broadly “national security,” and the only arbiter of what qualifies to be labeled as a national security interest is the same institutional system who hides the corruption and surveillance behind the label they apply.

We cannot fight our way through the complexity of what is being assembled, until the American People approach the big questions from the same baseline of understanding. What is the root cause that created the system? From there, this announcement takes on a more clarifying context – where we realize this is the formalization of the previously hidden process.

Barack Obama and Eric Holder did not create a weaponized DOJ and FBI; the institutions were already weaponized by the Patriot Act. What Obama and Holder did was take the preexisting system and retool it, so the weapons of government only targeted one side of the political continuum.

This point is where many people understandably get confused.

Elevator Speech:
(1) The Patriot Act turned the intel surveillance radar from foreign searches for terrorists to domestic searches for terrorists. 
(2) Obama/Biden then redefined what is a “terrorist” to include their political opposition.

*** 

Read the full strategy here

Today, the Biden-Harris Administration released the National Cybersecurity Strategy to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this decisive decade, the United States will reimagine cyberspace as a tool to achieve our goals in a way that reflects our values: economic security and prosperity; respect for human rights and fundamental freedoms; trust in our democracy and democratic institutions; and an equitable and diverse society. To realize this vision, we must make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace.
1. We must rebalance the responsibility to defend cyberspace by shifting the burden for cybersecurity away from individuals, small businesses, and local governments, and onto the organizations that are most capable and best-positioned to reduce risks for all of us.

2. We must realign incentives to favor long-term investments by striking a careful balance between defending ourselves against urgent threats today and simultaneously strategically planning for and investing in a resilient future.
The Strategy recognizes that government must use all tools of national power in a coordinated manner to protect our national security, public safety, and economic prosperity.

VISION

Our rapidly evolving world demands a more intentional, more coordinated, and more well-resourced approach to cyber defense. We face a complex threat environment, with state and non-state actors developing and executing novel campaigns to threaten our interests. At the same time, next-generation technologies are reaching maturity at an accelerating pace, creating new pathways for innovation while increasing digital interdependencies.

This Strategy sets out a path to address these threats and secure the promise of our digital future. Its implementation will protect our investments in rebuilding America’s infrastructure, developing our clean energy sector, and re-shoring America’s technology and manufacturing base. Together with our allies and partners, the United States will make our digital ecosystem:
Defensible, where cyber defense is overwhelmingly easier, cheaper, and more effective;

Resilient, where cyber incidents and errors have little widespread or lasting impact; and,

Values-aligned, where our most cherished values shape—and are in turn reinforced by— our digital world.
The Administration has already taken steps to secure cyberspace and our digital ecosystem, including the National Security Strategy, Executive Order 14028 (Improving the Nation’s Cybersecurity), National Security Memorandum 5 (Improving Cybersecurity for Critical Infrastructure Control Systems), M-22-09 (Moving the U.S. Government Toward Zero-Trust Cybersecurity Principles), and National Security Memorandum 10 (Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems). Expanding on these efforts, the Strategy recognizes that cyberspace does not exist for its own end but as a tool to pursue our highest aspirations.

APPROACH

This Strategy seeks to build and enhance collaboration around five pillars:

1. Defend Critical Infrastructure – We will give the American people confidence in the availability and resilience of our critical infrastructure and the essential services it provides, including by:
Expanding the use of minimum cybersecurity requirements in critical sectors to ensure national security and public safety and harmonizing regulations to reduce the burden of compliance;

Enabling public-private collaboration at the speed and scale necessary to defend critical infrastructure and essential services; and,

Defending and modernizing Federal networks and updating Federal incident response policy
2. Disrupt and Dismantle Threat Actors – Using all instruments of national power, we will make malicious cyber actors incapable of threatening the national security or public safety of the United States, including by:
Strategically employing all tools of national power to disrupt adversaries;
 
Engaging the private sector in disruption activities through scalable mechanisms; and,
 
Addressing the ransomware threat through a comprehensive Federal approach and in lockstep with our international partners.
3. Shape Market Forces to Drive Security and Resilience – We will place responsibility on those within our digital ecosystem that are best positioned to reduce risk and shift the consequences of poor cybersecurity away from the most vulnerable in order to make our digital ecosystem more trustworthy, including by:
Promoting privacy and the security of personal data;

Shifting liability for software products and services to promote secure development practices; and,

Ensuring that Federal grant programs promote investments in new infrastructure that are secure and resilient.
4. Invest in a Resilient Future – Through strategic investments and coordinated, collaborative action, the United States will continue to lead the world in the innovation of secure and resilient next-generation technologies and infrastructure, including by:
Reducing systemic technical vulnerabilities in the foundation of the Internet and across the digital ecosystem while making it more resilient against transnational digital repression;

Prioritizing cybersecurity R&D for next-generation technologies such as postquantum encryption, digital identity solutions, and clean energy infrastructure; and,

Developing a diverse and robust national cyber workforce
5. Forge International Partnerships to Pursue Shared Goals – The United States seeks a world where responsible state behavior in cyberspace is expected and reinforced and where irresponsible behavior is isolating and costly, including by:
Leveraging international coalitions and partnerships among like-minded nations to counter threats to our digital ecosystem through joint preparedness, response, and cost imposition;

Increasing the capacity of our partners to defend themselves against cyber threats, both in peacetime and in crisis; and,'

Working with our allies and partners to make secure, reliable, and trustworthy global supply chains for information and communications technology and operational technology products and services.
Coordinated by the Office of the National Cyber Director, the Administration’s implementation of this Strategy is already underway.

###

15 comments:

  1. The Biden White House creates fake news? WHo knew?

    ReplyDelete
  2. The "Conservative Tree House" is not the Biden Administration. The Biden administration did not announce the creation of a formal national surveillance state. The announcement concerns cyber Security and cyber crimes. No surprise Minus stands with the bad guys and against America on this issue. He always does.

    ReplyDelete
  3. Replies
    1. It's Nappy Time for Derpish! πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„πŸ˜„

      Delete
  4. Fake Dervish Sanders strikes again.

    ReplyDelete
  5. This comment has been removed by the author.

    ReplyDelete
    Replies
    1. The Honorable, Esteemed And Distinguished Judge Dervish Sanders (A High IQ Bourgeois Elitist) March 8, 2023 at 3:26 PM

      "All comments that say they are from 'Dervish Sanders' were made by me. I'm not faking comments from myself."

      Interesting admission, Dervish...

      Delete
    2. I said ABOVE. In reference to 2 specific comments. You say "interesting" because now you are going to start faking comments as "Dervish Sanders" and falsely claim I said all "Dervish Sanders" are mine. Because you are a comment faking POS.

      Delete
  6. Mystere: Fake Dervish Sanders strikes again.

    All comments above that say they are from "Dervish Sanders" were made by me. I'm not faking comments from myself. Mystere is the comment faker.

    ReplyDelete
    Replies
    1. You need reading glasses, Dervish. My name is Rattrapper, not Mystere.

      Delete
    2. Your name is Edward Endo, Mystere.

      Delete
  7. Who want's me to shut off comments? Anyone?

    Last warning.

    ReplyDelete
    Replies
    1. Edward Endo got scared and ran away.

      Delete