You Are Breaking The Law

There are so many laws on the book that at any given moment you are breaking one without even realizing it. They are designed to make everyone a criminal, so that the police can arrest you for any cause. Do you know how many arrests have been made on because of a broken tail light? The broken tail light is the number one reason police use to pull someone over, and because they pull you over, they have to inspect and search you vehicle, and if they find some other infraction on you they can make a charges stick because the broken tail light gave the police probably cause to stop you to begin with.

When there are so many laws in the book, the police can use any one of them as tools not for serving the people but by selectively using them to control the people. This is similar to the how public institutions used to discriminate, they set up arbitrary admissions tests that would just happen to be that much more difficult for “undesirables.”

Here is commentary on admissions question that were used on Jewish applications. As described by the comments, the problem set given Jewish applicants were just that more difficult to answer and any mistaken would disqualify you. This is what happens when you have complex set of rules, laws, or ordinances. When you have a complex body of laws, the population may at time be trespassing any one of those laws but since they are enforced selectively.

Do you really believe, even today, that all laws are enforced equally? I’ve never seen a jay walking ticket be given out in an affluent neighborhood, even though kids take up a whole block to toss the ball around.

You Are Being Occupied

Protesters are not occupying Wall Street, at best they are occupying a public park several blocks away from Wall Street. The protesters themselves are occupied, they are sounded by agent provocateurs, enforcement officers from several dozens of local, state, and federal agencies, they’ve been infiltrated by plain clothes police and operatives, they are arrested at the whims of police, beat women down and arrest them for resisting arrest, run over legal observers, they are entrapped by the hundreds into walking in the middle of a bridge only to be arrested by walking on the bridge. The Occupy Wall Street protesters are not occupying anything, they themselves are occupied.

Slave Technology

As a people, we are becoming more reliant and dependent on technology, such as smart phones, laptops, web services, printers, etc. But this technology that we depend on can be used to turn against us. Government agencies and organized groups, such as the MPAA and RIAA, routinely use vulnerabilities, back doors, rootkits, identifying attributes, and other information in our technology to track, monitor, retaliate, and incriminate you.

Examples of slave technology include all of Google’s products. Google’s search engine tracks individuals via unique identifying IDs in cookies and singed-on sessions and saves all searches associated with those IDs. Even if you are not signed into Google’s other products like GMail, your online searches conducted on Google search are stored and associated with a unique identifier associated with your computer. You can try to delete your browser’s cookies, but if they wanted to they could use your IP address to track you.

In layman’s terms, the IP address of your computer is much like your home address. It uniquely identifies your computer in the internet. Your ISP, such as Comcast or AT&T, provided you with an IP address automatically when you connect to the internet. Every time you visit a website, your IP address is typically logged along with the pages you viewed. The IP address is the typical way to identify individuals based on blog comments, Facebook accounts, or emails messages that most users think are anonymous. Simply put there is no such time as being anonymous in the internet. You are being watched. Some groups, most notably the government, want to introduce a Internet ID or true identity for your online usage. If such a ID program would come to passed, you can quickly imagine the associated fees, taxes, renewal process, and the fact that your access could be revoked for some bureaucratic reason.

The government is not the only one tracking you, in fact advertisers have the most to gain from your online usage. Have you ever noticed how some online ads seem to know your location? I’ve noticed this more from Groupon ads where they post ads on random deals in my home town. How does Groupon know my hometown if I am not a member? I’ve never even been to their site so how do they know my location. Groupon and other advertisers use techniques involving your IP address and cookies to try to track what sites you’ve visited, what search terms you were recently looking for, and other identifying information.

In addition to an IP address, if you are using an iPhone you can also be transmitting the phone’s UDID. Th iPhone UDID is a unique identifier that app developers have access that uniquely identifies one iPhone from the millions of others.

You might not have suspected this, but even your printer is designed to turn you in. It is widely known that some models of printers print hard to see patterns of yellow dots in documents. These patterns can then be used to to match printed documented to a specific printer.

There is a lot more than just technology, but information you provide or is collected from or about you by mobile and personal devices and website operators is used. For example, in California police officers don’t need a search warrant to go through the contents of your cell phone or other devices that were confiscated at the time of your arrest. So if they find incriminating information about you, even about a case different from the one you were originally detained or arrested for, this can be used against you. Another example is how Facebook gives access to third-party developers and advertisers of personal information, such as email and phone numbers of it’s users. So now, Facebook advertisers can target you with their ads inside and outside of Facebook, in your email inbox, etc.

Laws Against Humanity

There are some crimes so heinous, barbaric, and brutal that they are considered Crimes Against Humanity. One definition of crimes against humanity is the following.

Odious offences in that they constitute a serious attack on human dignity or grave humiliation or a degradation of one or more human beings. They are not isolated or sporadic events, but are part either of a government policy or of a wide practice of atrocities tolerated or condoned by a government or a de facto authority.

A crime is a breach or break of a rule or law but what is lawful is not necessary what is considered morally acceptable. Some laws, can themselves, be considered crimes against humanity and had lead to some of the worst atrocities ever committed. Arizona Senate Bill 1070, signed into Law by Governor Brewer, is such a law that it can be viewed systematic, institutionalize, and codified “attack on human dignity or grave humiliation or a degradation of one or more human beings.” SB 1070 is biased, it is not meant to be enforced equally, it is targeted on a particular ethnic group, it is blatantly xenophobic, it is reminiscent of Jim Crow Laws.

The the pages of history, there have been a few instances of Laws Against Humanity. Such laws that have degragated the human condition include Nuremberg Laws, Anti-Miscegenation Laws, Jim Crow Laws, Chinese Exclusion Act.