Human civilization has merged with the internet. Every society has gone onto the internet, with communications between all of us as individuals but also communications between businesses, economic transfers, and even the internal communications and external communications of states. So there is no barrier anymore between the internet and global civilization. That means that when the internet develops a sickness, global civilization also runs the risk of suffering the same sickness.
And the sickness that the internet has developed over the past 10 years is that nation states and their corporate powers have ganged up together to engage in strategic interception of all communications flowing over the internet across national borders and in many countries even within, within its national confines, such as the United States. We know that that has occurred in different places as a result of whistleblowing cases, such as Mark Klein’s case or William Binney’s, a former chief of research at the National Security Agency. So, we have gone from a position that dissidents face and activists face and individuals face 10, 20 years ago, where if we’re engaged in political activity, we could be individually targeted and our friends could be targeted, to a situation where everything, almost, that everyone does over the internet is recorded and intercepted all the time. And that shift is a shift, as it’s called in the internal documents of the hundreds of companies now who supply this national security sector, a shift between tactical interception on a few people and strategic interception, intercepting the entire nation.
We exposed documents earlier this year, the Spy Files—you can look them up—where, for example, the French company AMISYS, which is closely connected to French intelligence, supplied a nationwide—that’s its own words—interception system to Gaddafi’s Libya back in 2009. And in fact, lawyers connected to WikiLeaks and the Bureau of Investigative Journalism were in the manual that AMISYS shipped to Gaddafi as an example of how the interception system worked.