The Streisand Effect doesn't necessarily cause something to go viral, though it often can. It does, how ever, increase awareness of the thing one is attempting to censor.
Viral only describes how well known/popular a thing has become, but doesn't touch reasoning. Hearing that it's gone viral sounds like "this is the new cool thing that everyone is talking about". The Streisand Effect on the other hand makes clear that some one out there doesn't want you to know about it.
I don't think "viral" is a good choice for the description, as the meaning is incomplete, it's not always accurate, and implies something that isn't necessarily true.
I don't have access to any documentation really, and none of it that I've seen is incriminating. Also, screwing up computer systems (and badly) isn't illegal. Disturbing, definitely, incompetent, absolutely, but legal.
As an employee of ACS, faulty computer software causing serious problems is sadly not a surprise. Although, I wasn't in the company around the time of most of the other issues in the article (loss of personal information or credit cards), I have been witness to some very serious computer issues. At one point it was occuring nearly twice a week, and serious enough to bring the entire set of systems we work with to a halt.
Communism isn't about removing the rights of the citizens, and could theoretically be achieved with out doing that. Communism is supposed to be about preventing the regular masses from being exploited by the rich. A government with supreme power is the method used for this, because it makes it harder for a business to try and influence it. It was great in theory, but failed in practice. Yes, the communist governments that formed did remove all ideas of privacy, but that isn't actually a part of what communism is about.
After reading the article, I noticed Masnick mention that the Beastie Boyz have been trying to shy away from the song. Perhaps this is yet another foolish attempt to try and hide something that they feel causes embarrassment. Get rid of the Girls parody, make people once again forget about the original. But, as we all know, that pretty much always fails.
I'm guessing Hague has seen some speculation regarding intelligence capabilities that are accurate, but not yet revealed. He's likely just trying to cover up what ever speculation he saw, which leaves one to guess what speculation it was.
If "an outsider" did something like this, I would expect the NSA to create talking points about terrorists hacking us, and using it as an excuse to demand more power and funding, than it already has right now.
The point being made is 20% of applicants, as a whole, is most likely inaccurate. For example, if out of all the applicants they interview, only 20% raise flags, and 20% of those have the terrorist ties, you're sitting at 4% of all applicants having terrorist ties is all, not the 20% as per the title.
Also worth noting, since they don't specify what counts as a terrorist tie, that number might also be inaccurate. Imagine that NSA feels a chance encounter while shopping at a store with some one the NSA suspects counts as a "tie", or your mother's ex-husband's second cousin twice removed is suspected as a terrorist. Once again, the tie is not one that you can really see as realistic. The numbers here just aren't all that informative. Far more worrying is the history of the whole interviewing process that was described, including "contractors being caught interviewing dead people" and falsifying background checks.
Part of the reason the DoJ isn't concerned with the way these bankers uses these funds is they are going to have to pay the money back, with interest, eventually. Some of the banks are constantly paying interest back to the government as well, so this is a bit of a cash cow for them. Would you care if you "bailed" some one out with your money, while constantly having them pay you back interest over the course of several years, knowing eventually you'll get back everything you spent and more, and the person you bailed out misused the money?
Geeks already have been. BitMessage is one such example. Functions like email, except your "address" in this instance is actually a public encryption key, with a private key locally saved. Data transmitted between computers/servers on the way to destinations do not have the ultimate source or destination IP addresses, only the current computer's IP address, and the next computer in line to receive the data. When you connect, you simply download a copy of all the encrypted data, filter for anything with your public key, unencrypt and store in your Inbox, and forward anything that's not yours received further down the line. The result is that any message you send out, goes to literally everyone connected to the system, yet only the recipient can read it. Anyone snooping on your connection won't be able to distinguish between which messages are yours, vs some one else's.
It's still in testing, and looking for independent security experts to audit the encryption system to confirm the level of security they're after, but they have had some people examining the encryption and trying to break it already, then reporting their results. It's a work in progress, but already it's functioning quite well.
That's a false equivalency you propose. Assuming one would find it funny to catch some one in the act (I personally wouldn't), walking in at the wrong time is not the same as setting up cameras in the room so one can keep a record of each and every time it happens.
I'm not sure what you're referring to with your "bought credentials", you referring to a diploma? With any decent school, that's not something you simply buy, but something you must work for, and earn. You not only need to know the information being presented, but must be able to demonstrate the ability to use it. Even so, I'm not sure what this has to do with the mass surveillance state.
Not turning down information about a competitor, once again, isn't the actively looking for the information, or worse, following them, and copying down their every activity.
The things you describe aren't even remotely similar to the spying going on, so I'm not sure why you thought to compare coming across information to actively seeking to remove privacy in order to obtain it.
That's not necessarily true. If the officers are coming with a warrant for specific information, and not one from the secret courts, it means the request was subject to actual oversight, and deemed worthy of obtaining the information because law enforcement was able to prove there's just cause to have that information revealed.
I forgot to mention, the keys aren't really interacted with by the user, merely saved then used automatically as needed. Aside from your public key acting as an email address, you don't need to see the keys at all. The public key is also just text, so one can copy/paste the one line as a key quite easily. This gets rid of the hassle for the casual user, while still providing the protection you're after.