Should America, arguably the leading country in personal invasion - also arguably the least trustworthy - Be allowed this ever growing, never
ending power of information theft?
-----------------
James Otis fought writs of assistance in 1761.
These writs were effectively open warrants that allowed british soliders to raid and search homes based on no suspicion of criminal activity.
Otis lost but John Adams was sitting in this courtroom. This soon became the 14th amendment to massachusetts delcration of rights (Written by John
Adams) then inspiring the 4th amendment.
---------------------
Here are some of the past occurences revolving around American information and intelligence gathering in brief.
In the 1920's Cipher bureau (black chamber) monitored telegraphs for "threats to national security" given permission by WesternUnion the largest
telegraph company to monitor its messages.
During WW2 SHAMROCK was born with the same purpose, then becoming NSA. Whilst legal during WW2 the program continued afterwards analyzing many
thousands of messages a month with no warrants
ECHELON launched by NSA, Britian, New Zealand, Canada and australia with the purpose of monitering the globe amonsgt themselves, intercepting each
others domestic communications to avoid "spying on its own people". Echelon was carried out in secret during the cold war but its budget and influence
was increased after the CW, as opposed to being dismantaled.
----------------------------
In the 1950's+ Swiss company Crypto AG sold the worlds leading encryption technology; 120 nations purchased this technology, Many of them US
intelligence targets. The usage of the technology within these countries includes Military, trade and information gathering organisations. The NSA
however was in cohorts with Crypto AG and this allowed the American government free access to this classified information.
-------------
1994, Thomson S.A, located in paris, Lost profitable contracts to American rivals aided by information collected by the NSA and CIA
-------------
1995, Japanese representatives spied on during negotiations with the US over auto parts trade
-------------
In 1998 Enercon Developed a secret invention enabling it to generate electricity from wind power at a cheaper rate. When trying to market it in the
United states, They were informed by American company Kenetech it had already patented a near-identical development.
Kenetech banned Enercon from selling this equipment in the US via court order.
A NSA employee appeared on TV claiming he had stolen Enercons ideas via tapping phone communications via a computer line 15miles away from the center,
passing on detailed plans of the companys invention to Kenetech.
--------------
IN 1999 the EU denied the US access to encrryption programmes as they believed it was about industrial espionage, not law enforcement.
--------
1999 Sept. Microsoft revealed to be working with the NSA inserting special keys (Back doors) into windows software allowing federal access into
private systems. Snowden also leaked information showing microsoft and the NSA working Hand in Hand in many ventures of the micrsoft cooperation.
Alledged includes Cloud services, Skype and Outlook. The information from these passed to NSA/FBI.
In 2000 DAS, french intelligence (military) reported that in 1999 that NSA had indeed worked with
microsoft. There is even a micrsoft liason in the NSA building.
----
The Fourth Amendment of the U.S. Constitution provides, "[t]he right of the people to be secure in their persons, houses, papers, and effects,
against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
The ultimate goal of this provision is to protect people’s right to privacy and freedom from arbitrary governmental intrusions. Private intrusions
not acting in the color of governmental authority are exempted from the Fourth Amendment.
Electronic surveillance is also considered a search under the Fourth Amendment.
----
United states have pushed for Back door access to EU encrypted programs in the past and also
want access to large companies such as Apple and Google.
"The FBI wants a “backdoor” into encrypted products – not just phones, but other communications
services as well. FBI Director Comey has called for companies to build security flaws into their
encrypted products so that the government can break through and wiretap consumers or seize data stored on their devices. In the case of the San
Bernardino shooting, the FBI has sought to force Apple, Inc. to produce an insecure version of its mobile operating system, which would vastly
increase the security and privacy risks to hundreds of millions mobile devices."
----
So where do we draw the line? This is'nt just a matter of "Nothing to hide, Nothing to fear" It is a complete attack on rights and freedoms. It has
been, Is being and will be used with gross misconduct. This is mass surveillance, Big brother states, Big brother britain, Surveillance society.
Britain has 1.5x more camers than communist china despite having a fraction of its population. Give America and technology 10-20 years and they will
be inside your head. Chips inside your body tracking your every move.
Facial recognition software is being implemented so that a store will know you by name even if you have never been there before. They will know your
likes and dislikes, what your last website viewed was and how to cater to that interest.
This is just madness. We are atop a hill looking down the steep decline. We may think it a good idea to begin the adrenaline enthused decent but once
we begin we are commited. Once you begin the run there is no stoping it, even if it takes a turn for the worse.
edit on 26-7-2016 by WhatGoldStandard because: (no reason given)