Categories
Uncategorized

Routine

I stare into darkened windows
but cannot find another human.
We move, a machine among machines.
Around me, road billboards preach the cult of a culture
Goods are the gods,
nauseating neon signs the preachers, consumers the congregation.

All this, but still we won’t confess
Festering inside modern life is an illusion.
Moldering in our grueling routine
A fungus we never discuss.

I walk as always into the conditioned air and hollow glow
of the store, the temple of lucrative religion.
Around me masses flow into aisles like restless ocean tides
Devout addicts shambling into dope-houses
Monks marching into a well-stocked monastery.
People conditioned to care only for hollow things
They feel the trembling of their lifesprings
In a steady rhythm of income;
They are oblivious to the rhythm of their own hearts.

The market-goers tear designer-made cloth hides off shelves to hide the alienation they feel from themselves.
Across vast ocean their human kin
pour sweat into clothes they could never afford,
shackled slaves of a system they could never share in.
Without thought purchasers
Conscript their currency to the cause of yoking
the scarred hunchback of the slave-world
to the reins of the first world.

This side of the poverty line they trash food they can’t sell;
The other side they lash themselves for morsels.
Stores founded by the fortunate, funded by the pain of the poor
But agony is irrelevant when it’s on a distant shore.

Rows of pencils adorning lustrous steel shelves hide mirages of massacres.
Rows upon rows of guillotined copses.
Bodies mutilated, piled in the back of a truck.
Bodies of carbon, corpses of trees.
We hoard with the infinite thirst of black holes
But how will we quench thirst from a toxic well?
We’re manufacturing our Earth into a gateway to Hell
Greased Gulf oil slicks turn pristine sea into River Styx.
Humanity’s a fetus cutting its own umbilical cord,
poisoning its placenta.
Self-immolating before we’ve realized our potential.
Venomous fumes seethe into filthy atmosphere.
Have we forgotten that we live here?

I leave the temple and feel like I’ve left a rollercoaster
The world swirls around me as I pass the grocer
In every inch of my vision I see signs of a gangrenous age
Dents in the glaring white walls tell of lives lived.
But I cannot imagine life in this leeching bleached building.
Our stomachs are empty in a cornucopia.
Emaciated in a society saturated by gagging opulence
that seeps into our blackened souls when we cannot see

When the miasma clogs our lungs we will finally realize
Lucre cannot allay the devil’s fee.
The only passion I find is confined in synthetic-lit aisles.
I cannot blind myself to the guile in these smiles;
Counterfeit happiness mass-produced in factories.
Everyone I see is decomposing in chains.
Locked up by a desperate desire to devour trivial material.
Will we consume until the will to consume is all that remains?

Categories
Essays

A Comprehensive Demonstration of the Harms of Mass Surveillance

Composed by Logan Norris, Jeremy Hadfield, Sean Robinson, and Gabrielle Garner

For the International Public Policy Forum

On the topic Resolved: Mass surveillance is not a justified method of governmental intelligence gathering.

“The most sacred thing is to be able to shut your own door.” – G.K. Chesterton

Mass surveillance pervades every aspect of life in the digital age. The global surveillance network, codenamed ECHELON, has fifteen cooperating states and an extensive web of corporate ties and participating programs (Nabbali 2004). These ever-vigilant programs collect trillions of communications annually (Taylor 2014), can now monitor over 75% of the internet (Gorman 2013), and are expanding at a shockingly rapid pace (Von Drehle 2013). There are 30 million surveillance cameras deployed in the United States alone, shooting 4 billion hours of footage every week (Vlahos 2014). John Villesenor recognizes the significance of this: “We are crossing a threshold that has never been crossed in all of human history. It has become possible – even easy…to essentially document everything that has been said and done,” (Goodspeed 2012). Often, the damage that this surveillance creates is downplayed (Heller 2014). It is vital that society recognizes the long-term impacts and consequences of mass surveillance, from the collapse of people-ruled societies to the promotion of conformity, and that its claims at meager benefits are not sufficient to justify its use.

 

Framework and definitions:

Justified is defined as shown to be right or reasonable (Merriam Webster 2014). Three tenets that must be adhered to establish justification:

  1. Because mass surveillance is used on an international level, international laws, as represented by the International Covenant on Civil Rights and the Universal Declaration of Human Rights, must be adhered to.
  2. In accordance with the UN’s interpretation, mass surveillance can only be justified if it is proportionate and necessary. If mass surveillance is abused in most cases then it is not justified.
  3. A cost-benefit analysis, weighing harms and benefits against one another, will be used to determine justification. A cost-benefit analysis is the most useful way to measure the justification of an action (Kee 2014).

Mass Surveillance is defined as the pervasive surveillance of an entire or substantial fraction of a population. Surveillance is usually carried out by governments but may also be done by corporations at the behest of governments (U.S. Legal 2014). Mass surveillance can be accomplished through advanced technologies or through spying and police organizations (Cornelius 2004).

 

Mass surveillance increases state opacity and leads to oppression:

“[A] democratic system demands that government be transparent and accountable to the people, not the other way around.” – American Civil Liberties Union

There is not a single country in the world that has a fully transparent surveillance program (Greenwald 2014). With mass surveillance, governments make the affairs of their people completely translucent while they are bound by no standard of openness themselves. These omniscient overseers are free to conduct whatever sort of search that pleases them – unrestricted by the people and behind thorough bulwarks of secrecy.

Mass surveillance programs throughout the world have sacrificed their translucency to prevent national security secrets from entering the public domain. The NSA constructed a highly secretive court, in which “the hearings are closed to the public and the rulings of the judges are classified, and rarely released after the fact,” (O’Neill 2014). The link between mass surveillance and opacity is also evidenced by the increasing opacity of the United States government after the growth of NSA surveillance. In 2013, a record percentage of Freedom of Information Act requests for government files were denied (Bridis 2014). Almost all of the refusals originated from the Defense Department.

Countries such as the United States often hire private contractors to carry out their surveillance work. Currently, 70% of the NSA’s budget goes towards hiring private contractors (Cohen 2013). While the practice is profitable, it reduces transparency, as it is harder to track the work of the contractors and determine whether their work is justified (Thiessen 2013). The people have no oversight or power over these contractors (Goldman 2014).

When there is no oversight over or disclosure about mass surveillance, it’s impossible for the people to make an informed decision about or check the powers of surveillance programs. As James Madison wrote, “a popular Government, without popular information, or the means of acquiring it, is but a prologue to a farce or a tragedy; or perhaps both.” Unchecked government power leads to dangerous excess; power must be checked at every turn, the overwhelming evidence of history teaches us, or people will be abused. Countless regimes have perpetrated mass oppression and genocide because they were not checked by the people (Rummel 1993).

 

The abuse of systems of mass surveillance

Mass surveillance clearly breaks international law. A report given by the UN found that “the States engaging in mass surveillance have so far failed to provide…public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use” (Greenwald 2014).

Furthermore, the harms of a mass surveillance society outweigh the benefits, not just in America, but across the globe. Countries with endemic mass surveillance, such as China, North Korea, Iran, and East Germany give us a lucid view into the detrimental effects of mass surveillance.

In North Korea, citizens are under constant surveillance (France-Presse 2012). Authorities use an extensive network of informants that report individuals they suspect of subversive behavior (HRW 2014). North Korea uses this network to imprison anyone who practices free speech, political opposition, association, petition, or media representation (Winslow 2014). Mass surveillance has allowed North Korea to imprison over 200,000 in concentration camps with a 40% death rate (Amnesty International 2011). Instead of preventing terrorist attacks, mass surveillance turns governments themselves into terrorists that use technology to subjugate their citizens.

Iran has been christened one of the “State Enemies of the Internet” because of its drastic  measures of mass surveillance (Reporters Without Borders 2013). Using various digital forms of surveillance (Alimardani 2014), Iran gravely violates the freedom of information and multiple human rights (Reporters Without Borders 2013). Iran has used mass surveillance methods such as the wiretapping of phones and the monitoring of Internet activity against critics of the Iranian regime (Reuters 2012). Saleh Hamid was beaten with an iron bar by Iranian security agents who claimed that he was spreading propaganda against the regime, using Saleh’s own phone calls as evidence (Stecklow 2012). Anyone who is claimed to be a threat to the authoritarian government may be arrested and sent to Iran’s infamous Evin prison. Journalists, intellectuals, netizens and dissidents are held there for undisclosed amounts of time (Amnesty International 2014). Brutal conditions and horrendous interrogation procedures make Evin a “hell on earth” (Chiaramonte 2013).

China uses its mass surveillance, including over 30 million security cameras, to “crush its critics” (Langfit 2013). China has enacted legislation to secretly hold dissidents who challenge the Communist party (Buckley 2012). The regime used surveillance techniques to find activists and torture them for months in the name of ‘security’ (Lei 2012). For example, Ai Weiwei was held for three months and brutally beaten for speaking against the government (Foster 2014). China now monitors nearly every conversation to intimidate citizens into obedience (Langfit 2013). Chinese security agents can turn cellphones into listening devices, and Li Tiantian, a human rights lawyer in Shanghai, said that they eavesdropped on her conversations to track her movements and arrest her (Langfit 2013).

These despotic surveillance states are unnervingly similar to Western nations that are thought to be more exemplary. Documents reveal that UK and US surveillance agencies have manipulated online discourse in their favor with tactics of deception and repression, infiltrating activist groups with no conceivable connection to terrorism (Aevin 2014). They have targeted political candidates, activists, academics and lawyers (Aaron 2014). Muslim leaders who live exemplary lives have been subjecte

d to intense scrutiny (Greenwald 2014). This surveillance is used to coerce and oppress. For example, in 1963, the FBI sent a letter to Martin Luther King Jr., requiring him to commit suicide to prevent personal information that had been obtained through mass surveillance from being publicized (Corn 2013). Surveillance programs are also used for sheer voyeurism – one NSA employee spied on nine women for six years (Lewis 2013).

As it is used to abuse and silence entire populations, governmental intelligence gathering represents an implement of oppression rather than a benefit.

 

How surveillance breeds conformity

A substantial literature manifests that surveillance breeds conformity, silences dissent from state policies, inhibits creativity, and stifles intellectual freedom (Roche 2014; Tolstedt 1984). Using mass surveillance, governments have the power to see how long someone’s attention lingers on a webpage, how she expresses herself in communications, and what kinds of ideas she is being exposed to. This comprehensive data about our virtual persona means that intelligence agencies have an incredibly pellucid view of our minds, second, perhaps, to only ourselves.

One study (“Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor,” 2014) surveyed over 520 writers, and found that because of surveillance, 14% refrained from visiting controversial or suspicious websites, 27% expressed reluctance to write or speak about certain subjects, and 40% were averse to participating in social media. Another inquiry into the effects of surveillance on Internet search behavior revealed a significant decline in searches for sensitive terms after the NSA was publicized (Marthews and Tucker 2014).

These results demonstrate that without the option of privacy, individuals self-censor; they do not express dissenting views, voice opinions, or challenge the status quo. Thus, surveillance is more dangerous, if subtler, than censorship, the removal of an idea after it is expressed: it prevents ideas from ever being expressed. Free minds are key to free societies; anyone must be able to present their conception of the truth (Richards 2013), and surveillance places fetters on the mind, reinforcing compliance to the state and the imperative to act in obedience to norms (Greenwald 2012). This is illustrated by those societies that have fully invested in mass surveillance, such as North Korea, where individuals entirely conform to the government because of its all-seeing surveillance. As Edward Snowden remarked, “Under observation, we act less free, which means we effectively are less free.”

The crippling psychological effects of a watched society are demonstrated by totalitarian nations. A watched society coincides more with a fear-instilling totalitarian regime stripped of rights than a free government. Such regimes have decreased life expectancies, economic growth, and stability. According to Harvard University, citizens in totalitarian regimes experience less individual liberty and political stability; chances of a finishing secondary school are 40% lower, infant mortality is 25% higher, and agricultural yields are 25% fewer. Totalitarian regimes are also more likely to exacerbate terrorism and end up in a perpetual cycle of violence and war (Siegle 2005).

 

Mass surveillance undermines societies

A variety of behaviors key for maintaining functioning societies, such as involvement, cooperation, and well-connected relationships, are undermined by mass surveillance. In post-WWII East Germany, the surveillance agency known as the Stasi established a society where every seventh individual was an informant (Koehler 1999). Here, a single informant was associated with a 10% decrease in organizational involvement (Jacob 2010). The surveillance also had a strong negative effect on social connectivity. In addition, the effects of surveillance remain today: there is a significant economic disparity between East and West Germany, as evidenced by unemployment rates: 13.5% in the East and only 7.2% in the West. This significant imbalance owes to the lingering deficiency in cooperation that is ultimately traced to the Stasi regime’s crushing surveillance (Jacob 2010).

Not only does surveillance damage relationships between individuals, it erodes trust between the state and the people, and between private companies and their customers. This is empirically supported by the explosion of distrust and mass protest that followed the release of the “Snowden files” in the United States (Osborne 2013).

Furthermore, surveillance’s eradication of trust has harmed the economy, especially technological companies. The cloud computing industry alone will lose $35 billion by 2016, and the total profits foregone due to surveillance will be almost $180 billion (Miller 2014). Draconian mass surveillance represses creativity and reduces productivity in workplaces, and both of these are key drivers of the economy (Ovsey 2014). Microsoft labels government snooping an “advanced persistent threat,” a term usually applied to malicious hackers. Experts in technology and the internet are deeply concerned that trust will deteriorate in the wake of mass surveillance (Anderson 2014). Surveillance has also weakened computer systems to gain access to their data, which has harmed the systems comprehensively to great effect on the economy (Holder 2014).

The U.S. has seen a growing controversy regarding its inability to separate systems of mass surveillance from independent legal matters. While many countries preach that mass surveillance is only used to thwart terrorist operations, the U.S. Drug Enforcement Administration unit and the FBI have admitted that nearly 250 arrests have been made with illegally obtained information, and that they were instructed to lie about its origin (Shiffman 2013). This highlights an example of constitutional abuse and slippery illegal activity that is not proportional or necessary, reminiscent to the despotic Stasi, which expanded into jobs meant for other sectors of the government, “in essence becoming a state within a state” (Knabe 2014). The NSA now has more than 55,000 employees (not including private contractors), as compared to the Stasi’s 91,000 (Groll 2013).

 

Mass surveillance is impotent and counterproductive:

The unprecedented and brutal rise of the Islamic State in Iraq and Syria begs the question: why didn’t the almost completely unhindered surveillance programs of Western nations detect the growing militant movement? The mass gathering of metadata has so far yielded no noteworthy assistance in the effort against the Islamic State, even though it uses the Internet to communicate (Pye 2013). The answer is simple: mass surveillance is inept, and it is even harmful to national security and efforts against terrorism.

An inquiry by the Review Group of the U.S. Federal Government failed to find a single case in which metadata collection provided crucial information in a terrorism investigation (Richardson 2014). In addition, the New America Foundation investigated 54 commonly cited NSA ‘successes’, and found that the agency “played an identifiable role in initiating, at most, 1.8% of these cases” (Bergen et al 2014). NSA director Keith Alexander has admitted that there has been only one terrorist plot in which mass surveillance played a significant role (Brinkerhoff 2013). Government claims about the NSA’s success have repeatedly been shown to be false (Beauchamp 2014).

Private contractors hired by surveillance agencies are not supervised, and thus the national security secrets they manage are at extreme risk. If they release information, it can be exploited by foreign actors for malicious ends. Edward Snowden, who worked for a private contractor, released national security secrets that have been stolen by Russia and China and are now an enormous threat (Dreyfuss 2013).

Moreover, one of the central devices to the rhetoric of those who support mass surveillance is that it will prevent the horrors of terrorist attacks like 9/11 from ever happening again. However, the intensive accumulation of data would not have stopped these massacres, as they resulted from “a failure to connect the dots, not a failure to collect enough dots,” (Medine 2014). Hijacker Khalid al-Midhar’s phone calls to other conspirators were listened to, but intelligence agencies failed to recognize their significance, despite repeated opportunities (Elliot and Meyer 2014). In fact, the sheer amount of data collected by mass surveillance would probably result in the communications between hijackers being lost (Kopstein 2014).

In addition, mass surveillance is, in several ways, counterproductive. Surveillance programs often hack encrypted communications and install ‘back doors’ in internet programs (Sasso 2014). These back doors can be opened by cyberterrorists, allowing them to utilize the government’s methods to wreak catastrophe to the economy and national security of the nation in question. Inserting backdoors, sabotaging standards, and tapping commercial data centers provide malicious actors opportunities to exploit the resulting vulnerabilities (Schneier 2014). With the onset of backdoors created by the NSA, there has been a seventeen-fold increase in the amount of cyberterrorist attacks against the United States (Goldsmith 2013).

Counter-terrorism efforts have been paralyzed by mass surveillance. Knowing of surveillance programs, terrorists have changed their communication patterns to avoid them (Starr 2014). This causes them to “go dark” on surveillance radar, and makes security programs blind to defend against their attacks (Yost 2014).

Furthermore, the abrasion of trust caused by mass surveillance is damaging to counter-terrorist efforts. The recent monitoring of German chancellor Angela Merkel undermined the central pillar of diplomacy: trust (Jeffries 2013). Surveillance demonstrates to Europeans that the U.S. does not act in their interests, but only to further its own international power (Knigge 2013). A strong European-American alliance has been crucial to combating terrorism and working towards stability in the Middle East (Mauer and Möckli 2013). Damaging that alliance will allow terrorism to expand in this already-chaotic area. This is not only an issue of transatlantic diplomacy, however. The injury of trust that surveillance causes will harm relations between all states, leading to an increase in scuffles and perhaps even wars, and thwarting progress towards agreement and peace.

Furthermore, the strategy of mass surveillance is ineffective, as it means that insights are neglected and the amount of spurious correlations found multiplies (Guillart 2014). A small and highly contextual level allows for far more effective intelligence gathering, with fewer mistakes and more results (Friedersdorf 2014). Mass surveillance has had remarkably few successes despite, or perhaps because of, its immense pool of data.

 

Conclusion

The inherent nature, negative results, and dysfunctionality of mass surveillance render it a thoroughly unjustified method for governmental intelligence gathering. Mass surveillance requires an opaque and unchecked government that inevitably begins to abuse the rights of its people. It negatively affects the behaviors and relationships of individuals, states, and companies. It is and has been used by international governments to oppress their people. It leads to a collapse of trust and a subsequent fallout in international relations, obstructing the struggle for peace and against terrorism; bolsters conformity; and undermines economic relationships, leading to a decline in overall affluence. Finally, mass surveillance is an impotent and counterproductive strategy of intelligence gathering.

 

Works Cited

Aaron, Craig. “The Unchecked Spying Needs to Stop.” Free Press. 9 Jul 2014. Web. Accessed 17 Oct 2014. <http://www.freepress.net/blog/2014/07/09/unchecked-spying-needs-stop>

Aalto University. “Negative effects of computerized surveillance at home: Cause of annoyance, concern, anxiety, and even anger.” ScienceDaily. 8 October 2012. Web. Accessed 17 Oct..

ACLU. “Rein in the Surveillance State.” American Civil Liberties Union. Web. Accessed Oct 17 <https://www.aclu.org/rein-surveillance-state>

Amnesty International. “Iran must investigate ‘Black Thursday’ brutality at Evin Prison.” Amnesty.org. 15 May 2014. Web. 11 Jan 2015.

Amnesty International. “End horror of North Korean political prison camps.” 04 May. 2011. Web. 21 October. 2014. <http://www.amnesty.org/en/appeals-for-action/north-korean-political-prison-camps>

Anderson, Janna and Rainie, Lee. “Net Threats: Experts say internet is challenged by state surveillance.” Pew Research Center – Internet Project. 3 July 2014. Web. Accessed 18 Oct 2014. <http://www.pewinternet.org/2014/07/03/net-threats/>

Alimardani, Mahsa. “Iran on the Day to End Mass Surveillance in Iran.” Global Voices
Advocacy. 11 Feb 2014. Web. 11 Jan 2015. <http://advocacy.globalvoicesonline.org/
2014/02/11/iran-on-the-day-to-end-mass-surveillance>

Aevin, Craig. “New Snowden Documents Reveal that Governments are ‘Attempting to Control, Infiltrate, and Manipulate, and Warp Online Discourse.” WashingtonsBlog. 25 Feb 2014. Web. 11 Jan 2015. <http://www.washingtonsblog.com/2014/02/british-spy-agency.html>

Buckley, Chris. “China parliament unveils dissident detention powers.” Reuters. 8 March Web. 21 October 2014. <reuters.com/article/2012/03/08/us-china-npc-law-idUSBRE8270BP20120308>

Bridis, Ted.“US Cites Security More to Censor, Deny Records.” The Big Story – Associated Press. 3 September 2013. Web. Accessed 16 Oct 2014. <http://bigstory.ap.org/article/us-cites-security-more-censor-deny-records>

Bergen, Peter et al. “Do NSA’s bulk surveillance programs stop terrorists?” New America Foundation. Jan 2014. Web. Accessed 18 Oct 2014. <http://www.newamerica.net/sites/newamerica.net/files/policydocs/Bergen_NAF_NSA%20Surveillance_1_0.pdf>

Beauchamp, Zack. “5 Revealing Facts From the Sweeping New Study of NSA Surveillance.” Jan 13 2014. Web. 11 Jan 2014.

Brinkerhoff, Noel. “NSA Director Alexander Admits He Lied About Phone Surveillance About Stopping 54 Terrorist Attacks.” AllGov.com. 7 Oct 2013. Web. Accessed 18 Oct 2014. <http://www.allgov.com/news/controversies/nsa-director-alexander-admits-he-lied-about-phone-surveillance-stopping-54-terror-plots-131007?news=851326

Chiaramonte, Perry. “Hell on Earth: Inside Iran’s brutal Evin prison.” Fox News. 28 January.
2013. Web. 21 October 2014. <http://www.foxnews.com/world/2013/01/28/inside-evin-look-at-world-most-notorious-political-prison/>

“Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor.” PEN America. Research Conducted by the FDR Group. 12 Nov 2013. Web. Accessed 17 Oct 2014.<http://www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf>

Cohen, Andrew. “Privacy Expert Hoofnagle Analyzes Implications of NSA Surveillance.”Berkeley Law. 5 July. 2013. Web. 10 October 2014.<http://www.law.berkeley.edu/15551.htm>

Corn, David. “Dark Side of ‘I Have a Dream’: The FBI’s War on Martin Luther King.” Mother Jones. 28 Aug 2013. Web. Accessed 17 Oct 2014. <http://www.motherjones.com/politics/2013/08/j-edgar-hoover-war-martin-luther-king>

Cornelius, Kai. “Vom spurlosen Verschwindenlassen zur Benachrichtigungspflicht bei Festnahmen.” Berlin BMV. 2004. Web. 10 October 2014.

Wong, Cynthia. “A Clear-Eyed Look at Mass Surveillance.” Human Rights Watch. 25 July 2014. Web. 11 Jan 2015.
DailyNK. “The Secret of the North Korean Regime’s Surprising Resilience”. 12 December. Web. 10 October 2014 <http://www.dailynk.com/english/keys/2000/1/09.php>

Dreyfuss, Bob. “Did Russia, China Harvest Snowden’s Secrets?” The Nation. 25 Jun 2013. Web. 11 Jan 2015. <http://www.thenation.com/blog/174983/did-russia-china-harvest-snowdens-secrets>

Elliot, Justin and Meyer, Theodoric. “Claim on ‘Attacks Thwarted’ by NSA Spreads Despite Lack of Evidence.” ProPublica. 23 Oct 2013. Web. Accessed 18 Oct 2014. <http://www.propublica.org/article/claim-on-attacks-thwarted-by-nsa-spreads-despite-lack-of-evidence>

France-Presse, Agence. “Massive police state controls North Korea: study.” The Raw Story. 19 July. 2012. Web. 15 October. 2014.<http://www.rawstory.com/rs/2012/07/massive-police-state-controls-north-korea-study/>

Friedersdorf, Conor. “No Place To Hide: A Conservative Critique of the Radical NSA.” 14 May
Web. Accessed 18 Oct 2014. http://www.theatlantic.com/politics/archive/
2014/05/on-nsa-surveillance-glenn-greenwald-is-not-the-radical/370830/>

Foster, Peter. “China’s Ai Weiwei Speaks Out Over Activist’s Detentions on Twitter.” The Telegraph. 9 Aug 2014. Web. 8 Jan 2015.<http://www.telegraph.co.uk/news/worldnews/asia/china/8691475/Chinas-Ai-Weiwei-sp eaks-out-over-activists-detentions-on-Twitter.htm>

Greenwald, Glenn & Hussain, Murtaza. “Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On.” The Intercept. 8 Sep 2014. Web. Accessed 17 Oct 2014. <https://firstlook.org/theintercept/2014/07/09/under-surveillance/>

Greenwald, Glenn. “How America’s Surveillance State Breeds Conformity and Fear.” AlterNet.org. 4 Jul 2012. Transcript of Speech – Web. Accessed 17 Oct 2014. <http://tinyurl.com/clfnle3>

Gouillart, Francis. “Big data NSA spying is not even an effective strategy.” Fortune. 10 Jun Web. Accessed 19 Oct 2014. http://fortune.com/2013/06/10/big-data-nsa-spying -is-not-even-an-effective-strategy/

Goldman, Adam. “NSA Leak Highlights key role of Private Contractors.” Huffington Post. 10 June. 2013. Web. 12 October. 2014. http://www.huffingtonpost.com/2013/06/10/nsa-leak-contractors_n_3418876.html

Gorman, Siohban and Valentino-Devries, Jennifer. “New Details Show Broader NSA Surveillance Reach – Programs Cover 75% of Nation’s Traffic, Can Snare Emails.” Wall Street Journal. 20 Aug 2013. Web. Accessed 16 Oct 2014. <http://tinyurl.com/n7gl7zx>

Goodspeed, Peter. “Goodspeed Analysis: The Arab Spring may have helped usher in a new era of government surveillance.” National Post – Full Comment. 21 Apr 2012. Web. Accessed 17 Oct 2014. <http://tinyurl.com/villesenor12>

Groll, Elias. “By the numbers: The NSA’s super-secret spy program, PRISM.” Foreign Policy. 7 June 2013. Web. 11 Jan 2015. <http://foreignpolicy.com/2013/06/07/by-the-numbers-the-nsas-super-secret-spy-program-prism/>

Heller, Matthew. “Government Downplaying Sensitivity of Metadata Collected by NSA.” Mint Press News. 24 June 2014. Web. Accessed 16 Oct 2014. <http://www.mintpressnews.com/government-downplaying-sensitivity-of-metadata-collected-by-nsa/192810/>

Holder, Jonathan. “4 Ways That Mass Surveillance Destroys the Economy.” WashingtonsBlog. 29 June 2014. Web. 11 Jan 2015 <http://www.washingtonsblog.com/2014/06/surveillance-makes-us-poor.html>

Jeffries, Adrianne. “US has been monitoring German chancellor Angela Merkel since 2002, report says.” The Verge. Oct 2013. Web. Accessed 18 Oct 2014. <http://www.theverge.com/2013/10/26/5031990/us-has-been-monitoring-german-chancellor-angela-merkels-phone-since-2002>

Jacob, Marcus. “The legacy of Surveillance: An Explanation for Social Capital Erosion and the Persistent Economic Disparity Between East and West Germany” European Business School Oestrich-Winkel and Harvard University. 17 March. 2010. Web. 21 October 2014 <http://isites.harvard.edu/fs/docs/icb.topic718237.files/JacobTyrell_Surveillance%20Social%20Capital%20Economic%20Performance.pdf>

Kee, James. “Cost- Effectiveness and Cost-Benefit Analysis.” Handbook of Practical Program Evaluation. 10 June 2010. Web. 25 October 2014.<http://home.gwu.edu/~scellini/CelliniKee21.pdf>

Knabe, Hubertus. “The dark secrets of a surveillance state” TED. June. 2014. Web. 21 October 2014.  <http://www.ted.com/talks/hubertus_knabe_the_dark_secrets_of_a_surveillance_state?language=en>

Knigge, Michael. “NSA Surveillance Eroded Transatlantic Trust.” Duetsche Welle.  27 Dec Web. Accessed 18 Oct 2014. <http://www.dw.de/nsa-surveillance-eroded-transatlantic-trust/a-17311216>

Kopstein, Joshua. “The NSA Can ‘Collect-it-All,’ But What Will It Do With Our Data Next?” The Daily Beast. 16 Mar 2014. Web. Accessed 18 Oct 2014. <http://www.thedailybeast.com//2014/05/16/the-nsa-can-collect-it-all-but-what-will-it-do-with-our-data-next.html>

Koehler, John. “The untold story of the East German Secret Police” Westview Press, 1999. Web. 15 October. 2014. <https://www.nytimes.com/books/first/k/koehler-stasi.html>

Langfit, Frank.  “In China, Beware: A Camera May Be Watching You.”  NPR.  29 January. 2013.  Web. 21 October. 2014 <http://www.npr.org/2013/01/29/170469038/
in-china-beware-a-camera-may-be-watching-you>

Lei, Alexis. “Chinese Artist Ai Weiwei places himself under home surveillance” CNN, 2012. Web. 21 October. 2014 <http://www.cnn.com/2012/04/04/world/asia/ai-weiwei-webcams/>

Lewis, Paul. “NSA Employee spied on nine women without detection, internal file shows.” The Guardian. 27 Sep 2014. Web. 11 Jan 2015.

Matthews, Alex and Tucker, Catherine. “Government Surveillance and Internet Search Behavior.” Social Science Research Network. 18 Aug 2014. Web. Accessed 17 Oct 2014. <http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2412564>

Madison, James. “Securing the Republic: James Madison to W.T. Barry.” The Founder’s Constitution. 4 Aug 1822. Uploaded Print. Accessed 17 Oct 2014.<http://presspubs.uchicago.edu/founders/documents/v1ch18s35.html>

Mauer, Victor and Möckli, Daniel. “European-American Relations and the Middle East: From Suez to Iraq.” Routledge Publishing. 23 July 2012. Print.

Miller, Claire. “Revelations of NSA Spying Cost U.S. Tech Companies.” New York Times. 21 March 2014. Web. Accessed 18 Oct 2014. http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html?_r=0

Makino, Yoshihiro. “Inside Pyongyang (1): Kim Jong Un’s dictatorship intensifies in North
Korea”. The Asahi Shimbun: Asia and Japan Watch. 28 January. 2014. Web. 16 November 2014 <http://ajw.asahi.com/article/asia/korean_peninsula/AJ201401280009>

Moglen, Eben. “Privacy under attack: the NSA files revealed new threats to democracy”. The Guardian. 27 May. 2014. Web. 20 October. 2014.<http://www.theguardian.com/technology/2014/may/27/-sp-privacy-under-attack-nsa-files-revealed-new-threats-democracy>

Medine, David. “Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court.” Privacy and Civil Liberties Oversight Board. 23 Jan 2014. Web. Accessed 18 Oct 2014. <https://www.eff.org/files/2014/01/23/final_report_1-23-14.pdf>

Merriam-Webster. “Definition of Justified.” Merriam-Webster Dictionary. 2014. Web. 11 Jan 2015. <http://www.merriam-webster.com/dictionary/justify>

Nabbali, Talitha. “Going for the Throat: Carnivore in an ECHELON World – Part II.” Computer Law and Security Review. Pg. 84-97. 13 Mar 2004. Web. Accessed 16 Oct 2014. <http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1974304>

Osborne, Louise. “Europeans outraged after NSA spying, threaten action.” USA Today. 29 Oct
Web. 7 Jan 2015 <http://www.usatoday.com/story/news/world/2013/10/28/report-nsa-spain/3284609/>

O’Neill, Ben. “FISA, the NSA, and America’s Secret Court System.” Ludwig von Mises Institute. 22 Feb 2014. Web. Accessed 17 Oct 2014.<http://mises.org/daily/6672/FISA-the-NSA-and-Americas-Secret-Court-System>

Ovsey, Dan. “Beware! Big Brother culture will have adverse effect on creativity, productivity.” Financial Post. 26 Feb 2014. Web. 11 Jan 2015.

Pye, Jason. “Obama’s NSA completely missed the rise of Islamic militants in Iraq.” United Liberty. 17 Jun 2014. Web. Accessed 18 Oct 2014. <http://tinyurl.com/ISISpye2014>

Rummel, R.J. “Democide in Totalitarian States: Mortacracies and Megamurders: An Annotated Bibliography.” University of Hawaii System. 3 Jul 1993. Web. Accessed 17 Oct 2014. <https://www.hawaii.edu/powerkills/CHARNY.CHAP.HTM>

Richards, Neil M. “The Dangers of Surveillance.” Harvard Law Review. 20 May 2013. Web. Accessed 17 Oct 2014. <http://tinyurl.com/richards2013>

Richardson, Michelle. “The Nine Things You Should Know About the NSA RecommendationsFrom the President’s Review Group.” American Civil Liberties Union. 20 Dec 2013.Web. Accessed 18 Oct 2014. <https://www.aclu.org/blog/national-security-technology-and-liberty/10-things-you-should-know-about-nsa-recommendations>

Roche, Jason. “Surveillance Empowers Conformity [A Review of the Psychological Literature].” The Massachusetts Daily Collegian. 20 Feb 2014. Web. Accessed 17 Oct 2014. <http://dailycollegian.com/2014/02/20/surveillance-empowers-conformity/>

Reporters Without Borders. “Enemies of the Internet 2014: entities at the heart of censorship and surveillance.” Reporters Without Borders: For Freedom of Information. 2014. Web. 18 October. 2014. <http://12mars.rsf.org/2014-en/enemies-of-the-internet-2014-entities-at-the-heart-of-censorship-and-surveillance/>

Richards, Neil. “PRIVACY AND TECHNOLOGY: THE DANGERS OF SURVEILLANCE, p. 1934.” Washington University School of Law, Harvard Law Review. 20 May. 2013. Web. 11 September. 2014.<http://harvardlawreview.org/2013/05/the-dangers-of-surveillance/>

Sasso, Brandon. “The NSA Isn’t Just Spying on Us, It’s Also Undermining Internet Security.” National Journal. 29 April.  2014. Web. 19 October. 2014.<http://tinyurl.com/sasso2014>

Schneier, Bruce. “Open Letter From Top Technology Security Experts Slams NSA Spying as Destroying Security.” WashingtonsBlog. 25 Jan 2014. Web. 11 Jan 2015.

Shiffman, John. “Exclusive: U.S. directs agents to cover up program used to investigate Americans.” Reuters. 05 August. 2014. Web. 02 October. 2014 <http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805>

Starr, Barbara. “Terrorists try changes after Snowden leaks, official says.” CNN. 25 June. 2013. Web. 10 October. 2014.<http://security.blogs.cnn.com/2013/06/25/terrorists-try-changes-
after-snowden-leaks-official-says/>

Stecklow, Steve. “Foreign tech companies pitched real-time surveillance gear to Iran”. Reuters.05 December. 2012. Web. 21 October. 2014.<http://investigations.nbcnews.com/_news/2012/12/05/15701843-foreign-tech-companies-pitched-real-time-surveillance-gear-to-iran>

Stray, Jonathan. “FAQ: What you need to know about the NSA’s surveillance programs.”

ProPublica News: Journalism in the Public Interest. 5 Aug 2014. Web. Accessed 16 Oct <http://www.propublica.org/article/nsa-data-collection-faq>

Tolstedt, Betsy E.; Joseph P. Stokes. “Self-disclosure, Intimacy, and the Depenetration Process.” Journal of Personality and Social Psychology. 46 (1): 84–90. Sep 1984. Accessed Oct 17 2014. http://psycnet.apa.org/journals/psp/46/1/84/

Thomas, John. “The Government’s Under-the-Radar Mass Surveillance Program.” Partnership for Civil Justice Fund. 14 Aug 2014. Web. Accessed 17 Oct 2014.<http://www.justiceonline.org/commentary/the-governments.html>

Taylor, Stuart. “The Big Snoop: Life, Liberty, and the Pursuit of Terrorists.” Brookings Institution. April 29, 2014. Web. Accessed 16 Oct 2014.<http://www.brookings.edu/research/essays/2014/big-snoop>

Thiessen, Marc. “The danger of what Edward Snowden has not revealed.” Washington Post. 01 July. 2013. Web. 08 October. 2014. <http://www.washingtonpost.com/opinions/marc-thiessen-the-danger-of-what-edward-snowden-has-not-revealed/2013/07/01/67f95a18-e251-11e2-aef3-339619eab080_story.html>

U.S. Legal. “Definition of Mass Surveillance.” U.S. Legal. 10 October. 2014. Web. 20 October. <http://definitions.uslegal.com/m/mass-surveillance/>

“International Covenant on Civil and Political Rights”. UN. 16 December. 1966. Web. 20 October. 2014.<http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx>

“The Universal Declaration of Human Rights”. UN. 10 December. 1948. Web. 20 October. <http://www.un.org/en/documents/udhr/>

Von Drehle, David. “The Surveillance Society.” Time International (South Pacific Edition). 8 Dec 2013. Web. Accessed 16 Oct 2014.<http://nation.time.com/2013/08/01/the-surveillance-society/>

Vlahos, James. “Surveillance Society: New High-Tech Cameras Are Watching You.” Popular Mechanics. 1 Mar 2014. Web. Accessed 17 Oct 2014.

Winslow, Robert. “Crime and Society:  A Comparative Criminology of the World Asia- North Korea”. Web. 15 October. 2014. <http://www-rohan.sdsu.edu/faculty/rwinslow/index.html>

Yost, Pete. “Lawmakers: Terrorists change tactics after leaks.” ABC News. 14 Jun 2014. Web. 11 Jan 2015. <http://www.wggb.com/2013/06/13/lawmakers-terrorists-change-tactics-after-leaks/>

Categories
Essays Philosophy Religion & Spirituality

The Incompatibility of Kantianism and Christianity

Be ye therefore perfect, even as your Father which is in heaven is perfect.

— Matthew 5:48

I’m about to argue that one cannot be a Christian and a Kantian at the same time. Before I do that, we’ll need some definitions: First, as deontology, or duty-based ethics, is a broad field, I’ll limit it to Kantian deontology, as set forth in the Metaphysics of Morals. Second, Christianity will be defined as belief in Yawheh; the deific nature, atonement, and resurrection of Jesus; and a general belief in the truth of the Old and New Testaments. Now on to the argument.


Summary 

1. The Christian God does not act immorally; he is morally perfect.

2. The morally perfect Christian God performed the Atonement of Jesus Christ.

3. The Atonement of Jesus Christ is immoral under a Kantian framework.

4. Thus, Christians may not be Kantians and maintain rational consistency.


Premise one: The Christian God does not act immorally.

As shown in the opening quote, the Bible frequently repeats that God is perfect, and it supplicates God’s followers to strive to be perfect like him (Deuteronomy 18:13 is another good example, though it is ironic, considering the atrocities committed by God in that same book). Furthermore, moral perfection is one of the defining aspects of the concept of God; if God is not morally perfect, then why call him God? Why not just an advanced human? An omniscient being would necessarily know all things, including the nature of morality, and an omnibenevolent being would necessarily follow the nature of morality.


Premise two: The morally perfect Christian God performed the Atonement of Jesus Christ. 

This is not very controversial, though it gets slightly strange if you are trinitarian, considering the whole ‘God sacrificing himself and then praying to himself on the cross’ deal. The only controversy may arise around how exactly God went around performing it; was it God who did it, or was it Jesus for the sake of God, or was it Jesus’ singular choice? And how much choice, exactly, did Jesus have? He was most certainly coerced, after all, by the fact that everyone’s souls would be set on fire if he didn’t atone for them. Like the coward that I am, I’ll avoid these questions by simply saying that God caused the Atonement to happen by integrating it into his plan. Again, there is the question of how much choice God had in creating the plan, but regardless, he created the plan, and that inevitably led to the Atonement.

Crucifix statue

Premise three: The Atonement of Jesus Christ is deontologically immoral. 

It is quite clear that Kantian deontology would rule the Atonement immoral. The Atonement distinctly violates the primary principle of Kantianism: we should never act in such a way that we treat others as a mere means to an end. It is using Christ as a mere means to an end, primarily as an instrument for the benefit of the vast majority. I do not mean ‘mere’ as a derogatory term, but rather as a philosophical condition: mere as in ‘little more than as specified.’ The Atonement, after all, was not a mere act, but a pivotal point in Christian theology.  However, it is almost universally recognized that Christ was never an end, but that he was always a means. After all, he was called the Lamb for a reason: he was a sacrifice for the sake of others. He offered all of his glory unto his father. This is the type of ‘sacrifice of the minority for the majority’ situation that Kantians condemn. Christ went through horrific tortures, suffering  the pain of literally everyone, so that the sins of humanity could be erased. This is permissible under a teleological moral framework, where the means can be justified by its ends, but abhorrent under a deontological, and especially Kantian, moral framework.


Conclusion: Christians may not be Kantians and maintain rational consistency. 

One who believes in a morally perfect God must also model his/her morality around this God. Any action that this God performs is necessarily good, and so mortals cannot deny the morality of the action and must, instead, agree with it. It would be irrational and contradictory to say that a morally perfect God did something immoral. If the Atonement is immoral under a Kantian framework, then either God is morally imperfect, the Kantian framework is false, or God does not exist. Only one of these options allows one to retain their status as a Christian, which I defined as one who believes in a morally perfect God, among other things. The other option is to believe that Kantianism is false.


Possible criticisms 

1. God and humans have different moral standards. It is justified for God to kill, but it is not justified for humans to do so. It is justified for God to bystand in the face of suffering, but it is not justified for humans to do so. Thus, we do not have to base our morality on God’s.

2. Kant’s morality is only for autonomous wills (Stanford), and God did not have any choice in the Atonement. It was a necessary aspect of the universe. Thus, he was not an autonomous will, and he was not making the sort of act that Kantianism applies to.


References

Deuteronomy 18:13 – Thou shalt be perfect with the Lord thy God.

Kant’s Moral Philosophy. The Stanford Encyclopedia of Philosophy. First published in 2004; substantive revision in 2008.

Categories
Essays

Synaptic Pruning

This is a short informative essay I  wrote for the final project of the Neurobiology course from the University of Michigan. 

Synaptic pruning, or synaptic elimination, is an essential aspect of the development of the brain. It is when the brain destroys itself, removing unwanted synapses, neurons or neuronal configurations to increase efficiency of connections. The process and timing of  pruning is thought to be significantly changed by the experiences, genes, and even the thoughts of the developing mind.

During early childhood, there is a huge proliferation of connections between neurons, usually peaking around the age of two. The adolescent brain then cuts down the amount of connections, deciding which ones should be kept and which can be let go. While there are various theories as to the molecular mechanisms by which pruning actually occurs, most agree that pruning is primarily carried out by a very motile form of glial cell, called microglia [1], which is the first part of the nervous system that is active during synaptic pruning. These microglia are thought to remove cellular debris during the healing process of an injured brain, but in the healthy, developing brain they have a possibly more important function. If a synapse receives little activity, it is weakened and eventually deleted by microglia and other glial cells. After the synapse has been removed, the space and resources that it once used are taken by other synapses, which are thensynapsesgraph strengthened.These processes [2] and various others take place throughout development, peaking at adolescence and ending around the age of 21, and transform the brain to create more complex and efficient neuronal configurations.

Various factors can affect the methods, timing, and results of synaptic pruning. Comprehensive research [3] has shown that mutations in genes lead to abnormalities in the pruning process that lead to unwanted connections remaining active or important connections being pruned out, impairing the brain permanently.  Some neuroscientists have made educated guesses as to the nature of these mutations, and there has been relative consensus that microglia, being part of the immune system, remove the synapses because they appear to be either unnecessary, damaged, or a foreign object. This abnormal synaptic pruning could be a significant source of the symptoms of schizophrenia [3]. Pruning is also highly dependent on experience. Neural plasticity reaches its peak during childhood and before synaptic pruning begins. Thus, if a child begins to learn a language or any other complex function before synaptic pruning, that function will be deemed important and the neural connections pertaining to it will be kept and strengthened [4]. This gives new meaning to the saying “use it or lose it.” Experiences during and before synaptic pruning are perhaps some of the most important in development, because they directly affect brain function for the rest of the subject’s life. It is thought that connections deleted during pruning cannot be regained. “The fact that there are more connections [in a child’s brain] allows things to be moved around,” said physiologist Ian Campbell from the University of California, Davis. “After adolescence, that alternate route is no longer available. You lose the ability to recover from a brain injury, or the ability to learn a language without an accent. But you gain adult cognitive powers.” [5]. Your actions during pruning affect which circuits remain in existence and which do not.

It is not fully known what the function of synaptic pruning is, while the general explanation of “pruning removes unnecessary connections” is the most widely accepted and well-researched. It remains unknown whether connections removed during pruning can ever be regained. Pruning is often thought to represent learning, but this is almost certainly an oversimplified explanation for a very complex cluster of processes. Synaptic elimination may also be a method utilized by the brain to adapt to the most efficient form of thinking in its specific environment [6].

There are a wide variety of very interesting questions that deal with synaptic pruning. One that has intrigued me specifically is whether children and adolescents who have not fully undergone synaptic pruning are more creative than adults. It seems that large amount of synapses leads to more overall thought, and thus we can infer that before pruning, the brain is more sidetracked and inefficient. If distraction aids creativity, as a considerable amount of research shows, then that would mean that the more distracted, pre-pruning mind is more creative than the post-pruning mind. Some researchers believe that synaptic pruning is determined somewhat by the culture and society in which the child is raised. This would mean that after pruning, an adult in one society no longer has the same neuronal connections as an adult in a different society – those connections have been trimmed out. Is this an underlying cause of culture shock and/or genocide? Is the developing mind more open to change and new connections then the “narrow,” developed mind? Until the scientific community has a greater understanding of synaptic pruning, these questions will remain unanswered.

Synaptic pruning remains only barely understood by scientists, and the research already conducted has shown that it is far more complicated than previously thought. It is a critical part of neurobiological development that has tremendous consequences on the fully developed adult.

 

BIBLIOGRAPHY

[1] “The Role of Microglia in the Healthy Brain,” Marie-Éve Tremblay et al; Department of Psychiatry, University of Wisconsin-Madison, 1/3/2014

Click to access 16064.full.pdf

[2] “Synaptic Pruning in Early Development,” St. Olaf University Department of Neuroscience. http://www.stolaf.edu/depts/ciswp/buff/Documents/synapticpruning.pdf

[3] “Abnormal Synaptic Pruning in Schizophrenia: Urban myth or reality?,” Patricia Boksa, PhD; March 2012, US National Library of Medicine. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3297065

[4] “Brain Development and the Role of Experience in the Early Years,” Adrienne Tierney and Charles A. Nelson et al; Harvard Medical School/Children’s Hospital of Boston, 3/6/2009. http://main.zerotothree.org/site/DocServer/30-2_Tierney.pdf?docID=10001

[5] “Teen Brains Clear Out Childhood Thoughts,” Clara Moskowitz, LiveScience Magazine, March http://www.livescience.com/3435-teen-brains-clear-childhood-thoughts.html

[6] “Pruning Synapses Improves  Brain Connections,” Ed Yong; 2/2/2013, The Scientist http://www.the-scientist.com/?articles.view/articleNo/39055/title/Pruning-Synapses-Improves-Brain-Connections/

SIDENOTE

A thought-provoking interview of Jeff Lichtman and Juan Carlos Tapia, professors at Harvard University who conducted some experiments on synaptic elimination.

https://www.youtube.com/watch?v=b5y2HyD-wH0

 

 

Categories
Uncategorized

Waiting for Havana

No more, no less, than fifty years had passed since they all had disappeared and he had been left.

Vilero, as they called him, was staring toward the distant coast of America: a dark line that fringed the distant horizon, barely visible in the mist of the Carribean. The scarlet rays of the setting sun could not penetrate this mist. It was gray or white or a pale blue, and heavy as a blanket of lead.

Sitting on the seawell stretched across the island’s coast, like he had every night since they’d left. The Malecón held back the waves unceasingly, but what was it guarding; what was it protecting from the tide? There was nothing left here. The pale glow of the streetlights reflected off the water and fell upon the cold cement of the Malecón. Its illumination did not reveal anything, and the whispers of the streets were silent. He remembered this same night.

An hour passed. The rain had begun to fall, and Vilero remained. A collection of boys crowded into an empty doorway to hide from the torrent of water from above. Their breath was warm, their hands shaking with energy and just beginning to feel the cold. It hadn’t rained like this in a very, very long time. Vilero was waiting for snow in Havana, but perhaps this freezing rain was the closest he would ever come.

He didn’t know exactly how long it had been, for whenever he tried to remember his mind was clouded with memories of those he had lost. The streets had raised him, and they had raised him well, but a son always takes the spirit of his father. Vilero was the son of these muttering streets.

He slipped off the Malecón, plunging into the waters of the Carribean. They were not as warm as they had been years ago, and while they weren’t cold, a strange chill shivered up Vilero’s old body as he sank. He did not even struggle as he died, and it was not a death of fear or sadness. This was the end he had been waiting for. This is the happy ending.

A corpse floated to the surface, exposing itself to the night air. A young couple were sitting by the Malecón, and they saw the body. They stared at it, but did not move.

Categories
Uncategorized

Gypsies Don’t Fly

Voices clamored for attention, pushing the small, dark boy toward the makeshift trampoline. Estev had contrived his brainchild from a collection of rubber from spare tires, young wood, and some metal springs he had saved up for, then, after a month’s worth of work, bought from the ancient church-man from down the road.

The children screamed excitedly, grabbing almost desperately at his feet.

Estev’s emotions were quiet, as always. Cold, empty thoughts raced through his mind, hindered only by the occasional sharp pain in his right leg. It was better than it had ever been, and the wheelchair Estev had built for the twisted, broken leg had been taken apart and used for other creations. Almost a year had passed since he had built the trampoline, yet it still hadn’t been christened by it’s creator’s tattered shoes.

The voices grew louder and the words came more frequently, rising steadily and quickly. But it would never reach its crescendo of sound.

“I’ll do it,” he said, and the group went quiet. He had always been the one left out, the one who spent days building and earning and saving and working and inventing and dreaming, then watched his friends enjoy the fruits of his labor. It was a shocked silence. Then one of them cheered, and the group erupted into laughter and cries of triumph. He felt a host of cold hands push him forward.

Without second thought, Estev leaped. His legs slammed into the rubber, and the trampoline thrusted him into the cold winter air. A heavy, inescapable weightlessness enveloped him. He turned, his legs moved impossibly slowly, and the excited screams of the boys around him slowly faded into silence, replaced by the whispers of the air.

Thoughts sped through his mind, so much to think, so little time before he returned to the hard earth, to the world that had never accepted him. He no longer knew which way was forward, and he couldn’t know where he would land. It was thrilling, terrifying. Did he truly want to leave this life? This life of restrictions and oppression, and yet of the purest freedom. Did he want to know where he would land?

The boy’s feet slammed into the ground, and he forgot it all. The whispers of the air faded, and the wild screams returned as the boys leaped on their older friend. They pulled him to the ground. They were laughing, he was laughing, and he had lost the thoughts of the cold winter air.

Categories
Uncategorized

Gaysavār

Warm rain thrashed the filthy streets, scarring the bent, twisted and frail city that was Jodhpur. A boy wandered the alleyways, his feet wrapped in rags, clutching a tiny piece of bread. A small calf – Raksåka – followed him, nudging the boy with her warm, wet muzzle every time she caught up. The two knew each other well. Both were young, raised without a taste of their mother’s milk, starving orphans in a desecrated paradise.

They trudged through the city, avoiding contact with the other urchins that filled these streets. Suddenly the boy turned, standing in front of the holy animal with the confidence of desperation and fatigue. The calf continued to walk forward, aimlessly bumping into the boy. The boy, insulted, grabbed Raksåka by the head and wrestled her to the ground. Squealing, but unable to move, the calf kicked desperately until she was too tired to struggle. Then the boy released her. She scrambled to her feet. The boy tackled her again.

Malnourished as they were, this happened only three times before they collapsed. But the boy rose quickly from his exhaustion. He held the calf on the cobbled streets for the greater part of the hour. Then both of them rose, and the calf began to wander once again. But the boy would not be walking any farther. He leaped on the calf’s knobbled back, holding on desperately to her slippery skin. Raksåka did nothing, continuing her pointless roamings with the tiny weight of the boy on her back.

The rain continued, but seeing it was useless to try and avoid soaking their rags and saris and expensive Western clothing, the people left their houses and returned to their work. They watched with amazement as the boy, who had tamed the beast of the streets, rode past them. They named him Gaysavār, rider of the cow, king of starving orphans.

Categories
Uncategorized

The Die is Cast

A cool mist rose from the slow-moving waters of the Rubicon. On the north bank of the river was Gaul and the legion of Gaius Julius Ceasar. To the south was Italy Proper and the seat of Roman power. The river was a dividing line: one that was forbidden to be crossed by any general leading forces. To cross would mean civil war.

The faces of the legion were stoic, unchanging; they stared blankly across the water and towards Rome, but their minds were all focused on the same thing. Would their general lead them across, would he order them to attack their homeland and wage war on their brethren? Or would their march end here?

Ceasar was more than aware of the misgivings of his soldiers. But he was also confident in their loyalty. He had depended on them to follow him as much as they had depended on him to lead them. Thus was the bond and the way of Legio XII Gemina and its leader. Ceasar knew, if he crossed, the world of Rome would collapse as he knew it and a war like none ever seen before would follow. The support he had was sufficient, and he was almost certain that, at the end of the bloodshed, he would emerge victor. This is what he deserved, and he expected no less.

A ray of sunlight broke through the cold mist, and when Caesar looked up toward the skies, an eagle eclipsed the sun, casting its shadow upon the river. The legion needed no more sign, and their doubts were almost instantly dispersed.

Julius Caesar took the first step into the river, breaking the mirrored surface.

“Alea iacta est.” He said. The die is cast. His eyes focused on the capital of the greatest empire that ever stood, less than six days march away. He would hobble the very empire he was born to serve and lived to protect; and this step would become the fall of the Republic of Rome and the rise of the Roman Empire. As he continued to wade forward, and the water churned as the legion followed, Caesar’s gaze never broke from Rome.

Categories
Uncategorized

The Tooth-Breaker

And she stood, pushing her trembling body out of the mire of manure and moss that covered the floor of the cavern. Above her was the Red-Fanged Beast, towering, smoke and poisonous gases leaking out of the corner of his half-open mouth that could not contain his immense teeth, even when they were broken and half-gone. It stared through its black pits down at the half-child human girl, and she stared back up at it, defiant but with a hint of pleading in her eyes. Long ago, its sight had been taken from it by the cold steel arrows of men, but it could see her there, a living tithe offered to a Beast that wanted nothing but to end it.

The Beast shifted forward, and the girl flinched imperceptibly. An uncontrollable wave of primal fear rushed through her. She stifled it. Her father had said to die like a man, die like her mother had, without fear. But the Beast did not crush her with its huge, coarse hands just yet. it walked slowly  past her, and she was transfixed by its movement. The Beast reached the opening of the cave. it was touched by the warm sunlight, and a low rumble of pain emanated from it. it reached upward and dug its hands into the rocky ceiling, then pulled downward. The girl watched, and then realised what it was doing. She ran toward the Beast and threw her fists at its feet wildly.

“Stop! We are both going to die in here!” She screamed. it took no notice. She dug her fingernails into its thick, black-grey skin. She bit it. The cave shook and dust fell from the ceiling. A boulder fell outside the cave and blocked the light. The dark red veins of the Beast throbbed from the exertion. At last she stopped her vicious assault and collapsed. A tear slipped from her white-clouded eye and she immediately, instinctively,  wiped it away, hoping that no one had seen. The mountain was groaning and parts of the cave had already fallen. She looked upward and it was already looking down, at her. it had heard the sound of the tear. it was a sweet, delicate sound, but shockingly loud. it pulled its hands from the ceiling, reached down toward the girl’s face and touched it, lightly. She pulled away, punching the hand. But it was too late.

It had felt the wetness of her cheek. It had not been lying to itself. She had cried. And as the mountain collapsed around them both, the Beast cried also. Crimson blood seeped from its skin, dripping and falling to the shaking floor. The girl watched in horror. it’s sightless craters, now filled with blood, stared at her in desperation that she could not understand, hoping beyond hope that she would someday know truth. Then its blood became a river, pouring from gaping wounds that had opened themselves. And the floor of the cavern was covered with its sticky, foul-smelling blood. And then the Beast fell, almost crushing the girl but stopping itself, rooting its hands into the ground, locking its arms in place. Then its head drooped as the last of its lifeblood seeped out of it.

There was near silence, for a brief moment, as the eye of the storm passed. And then the mountain fell, and boulder after boulder pounded the huge, broad, rough back of the Beast, as the porcelain girl hid beneath it.