Bulk wireless searches of American private communications questioned by EFF

Today, I received the following communication from Electronic Frontier Foundation:

More than five years ago, EFF filed the first lawsuit aimed at stopping the government's illegal mass surveillance of millions of ordinary Americans' private communications. Whistleblower evidence combined with news reports and Congressional admissions revealed that the National Security Agency (NSA) was tapped into AT&T’s domestic network and databases, sweeping up Americans’ emails, phone calls and communications records in bulk and without court approval. On August 31, 2011, the Ninth Circuit Court of Appeals will hear a warrantless wiretapping double-feature to decide whether EFF's two cases can proceed. At stake will be whether the courts can consider the legality and constitutionality of the National Security Agency’s mass interception of Americans’ Internet traffic, phone calls, and communications records.
Here's the full report, and it is stunning.  Consider even the following paragraph, and remember that this supposed to be your country, a country supposedly run by the People:
Hepting v. AT&T, our case challenging the telecom giant’s illegal collaboration with the NSA, faced a barrage of attacks from the government -- including outrageous claims that national security prevented the courts from considering whether AT&T and the government were breaking the law and violating the Constitution. When that gambit seemed to be failing, the White House and the telecoms led a lobbying campaign to convince Congress to pass a law threatening to terminate our suit. When that law passed we filed a follow-up suit directly against the government, Jewel v. NSA, to open a second front in our fight to stop the spying.
For another easily accessible description of these problems, visit EFF's FAQ.

Continue ReadingBulk wireless searches of American private communications questioned by EFF

Symbols, Fair Use, and Sensitivities

When you have a dream about an argument, maybe it has some weight and should be written about. Recently, I posted a photograph on my Google + page. This one, in fact (click on the photo for high-res version): My caption for it was “What more is there to say?” Partly this was just to have a caption, but also to prompt potential discussion. As symbol, the photograph serves a number of functions, from melancholy to condemnation. It did prompt a discussion, between two friends of mine who do not know each other, the core of which centers on the divergent meanings of such symbols for them and a question of sensitivity. I won’t reproduce the exchange here, because as far as I’m concerned the question that it prompted for me was one of the idea of “sacredness” and the appropriate use of symbols. Which immediately sent me down a rabbit hole about the private versus public use of symbols. Essentially, we all have proprietary relationships with certain symbols. Since I already posted the image, the sign of the cross is one, and not just for Christians. As a symbol it has achieved that universality advertisers dream of. It is instantly recognizable as the sign for a faith movement just about everywhere. It’s possible some aboriginal tribes in the beclouded valleys of New Zealand don’t know what it is, but on the level of international discourse it carries across all lines. [More . . . ]

Continue ReadingSymbols, Fair Use, and Sensitivities

Control of information as the ultimate battle

As I've been getting more involved in the preservation of net neutrality over the past few weeks, I've increasingly seen the focused and orchestrated lies of financially insatiable telecoms. It was while in this frame of mind that I read Glenn Greenwald's latest column, "A prime aim of the growing Surveillance State."

This is the point I emphasize whenever I talk about why topics such as the sprawling Surveillance State and the attempted criminalization of WikiLeaks and whistleblowing are so vital. The free flow of information and communications enabled by new technologies -- as protest movements in the Middle East and a wave of serious leaks over the last year have demonstrated -- is a uniquely potent weapon in challenging entrenched government power and other powerful factions. And that is precisely why those in power -- those devoted to preservation of the prevailing social order -- are so increasingly fixated on seizing control of it and snuffing out its potential for subverting that order: they are well aware of, and are petrified by, its power, and want to ensure that the ability to dictate how it is used, and toward what ends, remains exclusively in their hands.
If this sounds like hype, read Greenwald's column and follow his many links, and consider this:
In August of last year, the UAE and Saudi Arabian governments triggered much outrage when they barred the use of Blackberries on the ground that they could not effectively monitor their communications (needless to say, the U.S. condemned the Saudi and UAE schemes). But a month later, the Obama administration unveilled a plan to "require all services that enable communications -- including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct 'peer to peer' messaging like Skype" to enable "back door" government access.

Continue ReadingControl of information as the ultimate battle

The Fourth Amendment continues to whither

Have you ever heard of the "Internet Pornographers Act of 2011"? Until today, I hadn't either. Here's what this proposed law provides, according to Conor Friedersdorf of The Atlantic:

[U]nder language approved 19 to 10 by a House committee, the firm that sells you Internet access would be required to track all of your Internet activity and save it for 18 months, along with your name, the address where you live, your bank account numbers, your credit card numbers, and IP addresses you've been assigned . . . As written, The Protecting Children from Internet Pornographers Act of 2011 doesn't require that someone be under investigation on child pornography charges in order for police to access their Internet history -- being suspected of any crime is enough.
No probable cause is even required. It's Big Brothers' dream come true. Now we'll watch to see whether any Congressional representative who has the willingness to oppose this bill because it violates civil liberties will be accused of approving of child pornography. That is the kind of argument that one might expect in the modern-day Congress.

Continue ReadingThe Fourth Amendment continues to whither

Daniel Ellsberg looks back and forward

Interesting interview of Daniel Ellsberg appearing in a PBS Series titled POV. This quote's a gem:

In this interview, Ellsberg says, "Richard Nixon, if he were alive today, would feel vindicated that all the crimes he committed against me–which forced his resignation facing impeachment–are now legal. " (Thanks to the Patriot Act and other laws passed in recent years.) And he says all presidents since Nixon have violated the constitution, most recently President Obama, with the bombing of Libya.

Continue ReadingDaniel Ellsberg looks back and forward