Navigation
SEARCH BOX - USE KEY WORDS, NAMES, OR PHRASES.

866-391-6593

Call For Quote

or Click Link!

  •   Build Your Brand
  •       with KLAS!
CODAmeds®

CODAmeds® Dispensers

Manage pills & supplements

« Nancy Pelosi's P.C. Police Force | Main | Obama Gives Away U.S. Internet Free Speech »
Wednesday
Sep102014

Looking at 5 Eyes through Trifocals 

Our national security requires a view through Trifocal lens to see near, far and farthest to assess not only the kind of threat but the distance from an approaching threat and the anticipated time it will arrive. What clouds our lens is the collective hubris of government agencies which only adds fuel to the fires of public distrust. People see politicians as incapable of self-regulation and so consistent oversight, review and congressional authority under U.S. constitutional laws must be maintained to control this bureaucratic invasive monster. This is a love-hate relationship for which Americans must endure heightened vigilance in order to ensure their absolute safety and well-being.

“To approach the stranger is to invite the unexpected, release a new force, let the genie out of the bottle.  It is to start a new train of events that is beyond your control...” - T.S. Eliot

Written in 1963, fifty years ago, how apropos these music lyrics are today.

"...'cause the night has a thousand eyes
And a thousand eyes can't help but see if you are true to me
So remember when you tell those little white lies
That the night has a thousand eyes." - Bobby Vee

With revelations of spyware planted on 50,000 networks, the "Five Eyes" states have been allowed to trample over their citizens' privacy for far too long.  - Editorial Credit: Eric King, The Guardian 11/26/13.

 "For more than 60 years, the secret patchwork of spying arrangements and intelligence-sharing agreements that makes up the Five Eyes alliance has remained obfuscated by the states that it benefits – Australia, the US, Canada, New Zealand and the UK. Save for one critically important release of declassified documents in 2010, the Five Eyes states have spent almost 70 years concealing from their citizens the scope and extent of their global surveillance ambitions – eroding the public's ability to communicate privately and securely without examination or question."

"Despite the fact that the Five Eyes comprises democratic governments, the rules that govern the arrangement – rules that have allowed the infiltration of every aspect of the modern global communications systems – are entirely hidden from the public. Providing for a complex division of roles, responsibilities and lines of authority, and the establishment of jointly run operations centres, the Five Eyes arrangement creates a signals intelligence architecture faster than NATO. And while its actions implicate the private communications of every connected individual across the globe, the arrangement was executed and operates clandestinely, hidden from the scrutiny of public oversight mechanisms and – until recently – the public."

"A fundamental principle of a democratic society is that people should know the laws and rules that govern the society in which they live. We cannot allow the Five Eyes to continue to operate shrouded in vague justifications of promoting security and defending against terrorism. [That is a very tough point to lobby much public support for because of the IS bloodlust to kill all infidels - i.e., Christians, Jews, Non-Believers & Apostates.]  

 "There is an urgent need to unmask this two-faced, five-eyed monster and subject it to the rigours of modern democratic criticism and scrutiny. The Five Eyes must be held to a new legal framework that respects the rights of all individuals, not just the citizens that live within a respective government's borders. [An international legal authority as a "new legal framework" such as the U.N. would be impossibly unable to address the security needs of each individual sovereign nation.] Without acting swiftly, the five-eyed monster will continue to grow in ambition, size, and scale, swallowing up everything in its path until we have no privacy left."


PrintView Printer Friendly Version

EmailEmail Article to Friend

References (1)

References allow you to track sources for this article, as well as articles that were written in response to this article.

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>