The Wolf Is Guarding The Hen House: The Government’s War On Cyberterrorism

shutterstock.com

The game is rigged, the network is bugged, the government talks double-speak, the courts are complicit and there’s nothing you can do about it.”—David Kravets, reporting for Wired

Nothing you write, say, text, tweet, or share via phone or computer is private anymore. As constitutional law professor Garrett Epps points out, “Big Brother is watching…. Big Brother may be watching you right now, and you may never know. Since 9/11, our national life has changed forever. Surveillance is the new normal.”

This is the reality of the internet-dependent, plugged-in life of most Americans today.

A process which started shortly after 9/11 with programs such as Total Information Awareness (the predecessor to the government’s present surveillance programs) has grown into a full-fledged campaign of warrantless surveillance, electronic tracking, and data mining, thanks to federal agents who have been given carte blanche access to the vast majority of electronic communications in America. Their methods completely undermine constitution safeguards; and yet no federal agency, president, court, or legislature has stepped up to halt this assault on our rights.

For the most part, surveillance, data mining, etc., is a technological, jargon-laden swamp through which the average American would prefer not to wander. Consequently, most Americans remain relatively oblivious to the government’s ever-expanding surveillance powers, appear unconcerned about the fact that the government is spying on them, and seem untroubled that there is no way of opting out of this system. This state of delirium lasts only until those same individuals find themselves arrested or detained for something they did, said, or bought that runs afoul of the government’s lowering threshold for what constitutes criminal activity.

All the while, Congress, the courts, and the president (starting with George W. Bush and expanding exponentially under Barack Obama) continue to erect an electronic concentration camp the likes of which have never been seen before.

A good case in point is the Cybersecurity Information Sharing Act (CISA), formerly known as CISPA (Cyber Intelligence Sharing and Protection Act). Sold to the public as necessary for protecting us against cyber attacks or internet threats such as hacking, this Orwellian exercise in tyranny-masquerading-as-security actually makes it easier for the government to spy on Americans, while officially turning Big Business into a government snitch.

Be warned: this cybersecurity bill is little more than a wolf in sheep’s clothing or, as longtime critic Senator Ron Wyden labeled it, “a surveillance bill by another name.”

Lacking any significant privacy protections, CISA, which sacrifices privacy without improving security, will do for surveillance what the Patriot Act did for the government’s police powers: it will expand, authorize, and normalize the government’s intrusions into the most intimate aspects of our lives to such an extent that there will be no turning back. In other words, it will ensure that the Fourth Amendment, which protects us against unfounded, warrantless government surveillance, does not apply to the Internet or digital/electronic communications of any kind.

In a nutshell, CISA would make it legal for the government to spy on the citizenry without their knowledge and without a warrant under the guise of fighting cyberterrorism. It would also protect private companies from being sued for sharing your information with the government, namely the National Security Agency (NSA) and the Department of Homeland Security (DHS), in order to prevent “terrorism” or an “imminent threat of death or serious bodily harm.”

Law enforcement agencies would also be given broad authority to sift through one’s data for any possible crimes. What this means is that you don’t even have to be suspected of a crime to be under surveillance. The bar is set so low as to allow government officials to embark on a fishing expedition into your personal affairs—emails, phone calls, text messages, purchases, banking transactions, etc.—based only on their need to find and fight “crime.”

Take this anything-goes attitude towards government surveillance, combine it with Big Business’ complicity over the government’s blatantly illegal acts, the ongoing trend towards overcriminalization (in which minor acts are treated as major crimes), and the rise of private prisons (which have created a profit motive for jailing Americans); and you have all the makings of a fascist police state.

So who can we count on to protect us from the threat of government surveillance?

It won’t be the courts. Not in an age of secret courts, secret court rulings, and an overall deference by the courts to anything the government claims is necessary to its fight against terrorism. Most recently, the U.S. Supreme Court refused to hear a case challenging the government’s massive electronic wiretapping program. As Court reporter Lyle Denniston notes:

Daoud v. United States was the first case, in the nearly four-decade history of electronic spying by the U.S. government to gather foreign intelligence, in which a federal judge had ordered the government to turn over secret papers about how it had obtained evidence through wiretaps of telephones and Internet links.  That order, however, was overturned by the U.S. Court of Appeals for the Seventh Circuit, whose ruling was the one the Justices on Monday declined to review…. One of the unusual features of the government’s global electronic spying program is that the individuals whose conversations or e-mails have been monitored almost never hear about it, because the program is so shrouded in secrecy — except when the news media manages to find out some details.  But, if the government plans to use evidence it gathered under that program against a defendant in a criminal trial, it must notify the defendant that he or she has been monitored.

It won’t be Congress, either (CISA is their handiwork, remember), which has failed to do anything to protect the citizenry from an overbearing police state, all the while enabling the government to continue its power grabs. It was Congress that started us down this whole Big Brother road with its passage and subsequent renewals of the USA Patriot Act, which drove a stake through the heart of the Bill of Rights. The Patriot Act rendered First Amendment activists potential terrorists; justified broader domestic surveillance; authorized black bag “sneak-and-peak” searches of homes and offices by government agents; granted the FBI the right to come to your place of employment, demand your personal records, and question your supervisors and fellow employees, all without notifying you; allowed the government access to your medical records, school records, and practically every personal record about you; and allowed the government to secretly demand to see records of books or magazines you’ve checked out in any public library and Internet sites you’ve visited.

The Patriot Act also gave the government the green light to monitor religious and political institutions with no suspicion of criminal wrongdoing; prosecute librarians or keepers of any other records if they told anyone that the government had subpoenaed information related to a terror investigation; monitor conversations between attorneys and clients; search and seize Americans’ papers and effects without showing probable cause; and jail Americans indefinitely without a trial, among other things.

And it certainly won’t be the president. Indeed, President Obama recently issued an executive order calling on private companies (phone companies, banks, Internet providers, you name it) to share their customer data (your personal data) with each other and, most importantly, the government. Here’s the problem, however: while Obama calls for vague protections for privacy and civil liberties without providing any specific recommendations, he appoints the DHS to oversee the information sharing and develop guidelines with the attorney general for how the government will collect and share the data.

Talk about putting the wolf in charge of the hen house.

Mind you, this is the same agency, rightly dubbed a “wasteful, growing, fear-mongering beast,” that is responsible for militarizing the police, weaponizing SWAT teams, spying on activists, stockpiling ammunition, distributing license plate readers to state police, carrying out military drills in American cities, establishing widespread surveillance networks through the use of fusion centers, funding city-wide surveillance systems, accelerating the domestic use of drones, and generally establishing itself as the nation’s standing army, i.e., a national police force.

This brings me back to the knotty problem of how to protect Americans from cyber attacks without further eroding our privacy rights.

Dependent as we are on computer technology for almost all aspects of our lives, it’s feasible that a cyberattack on American computer networks really could cripple both the nation’s infrastructure and its economy. So do we allow the government liberal powers to control and spy on all electronic communications flowing through the United States? Can we trust the government not to abuse its privileges and respect our privacy rights? Does it even matter, given that we have no real say in the matter?

As I point out in my book A Government of Wolves: The Emerging American Police State, essentially, there are three camps of thought on the question of how much power the government should have; and which camp you fall into says a lot about your view of government—or, at least, your view of whichever administration happens to be in power at the time, for the time being, the one calling the shots being the Obama administration.

In the first camp are those who trust the government to do the right thing—or, at least, they trust the Obama administration to look out for their best interests. To this group, CISA is simply a desperately needed blueprint for safeguarding us against a possible cyberattack, with a partnership between the government and Big Business serving as the most logical means of thwarting such an attack. Any suggestion that the government and its corporate cohorts might abuse this power is dismissed as conspiratorial hysterics. The problem, as technology reporter Adam Clark Estes points out, is that CISA is a “privacy nightmare” that “stomps all over civil liberties” without making “the country any safer against cyberattacks.”

In the second camp are those who not only don’t trust the government but think the government is out to get them. Sadly, they’ve got good reason to distrust the government, especially when it comes to abusing its powers and violating our rights. For example, consider that government surveillance of innocent Americans has exploded over the past decade. In fact, Wall Street Journal reporter Julia Angwin has concluded that, as a result of its spying and data collection, the U.S. government has more data on American citizens than the Stasi secret police had on East Germans. To those in this second group, CISA is nothing less than the writing on the wall that surveillance is here to stay, meaning that the government will continue to monitor, regulate, and control all means of communications.

Then there’s the third camp, which neither sees government as an angel or a devil, but merely as an entity that needs to be controlled–or as Thomas Jefferson phrased it, bound “down from mischief with the chains of the Constitution.” A distrust of all who hold governmental power was rife among those who drafted the Constitution and the Bill of Rights. James Madison, the nation’s fourth president and the author of the Bill of Rights, was particularly vocal in warning against government. He once observed, “All men having power ought to be distrusted to a certain degree.”

To those in the third camp, the only way to ensure balance in government is by holding government officials accountable to abiding by the rule of law. Unfortunately, with all branches of the government, including the courts, stridently working to maintain its acquired powers, and the private sector marching in lockstep, there seems to be little to protect the American people from the fast-growing electronic surveillance state.

In the meantime, surveillance has become the new normal; and the effects of this endless surveillance are taking a toll, resulting in a more anxious and submissive citizenry. As Fourth Amendment activist Alex Marthews points out:

Mass surveillance is becoming a punchline. Making it humorous makes mass surveillance seem easy and friendly and a normal part of life…we make uneasy jokes about how we should watch what we say, about the government looking over our shoulders, about cameras and informers and eyes in the sky. Even though we may not in practice think that these agencies pay us any mind, mass surveillance still creates a chilling effect: We limit what we search for online and inhibit expression of controversial viewpoints. This more submissive mentality isn’t a side effect. As far as anyone is able to measure, it’s the main effect of mass surveillance. The effect of such programs is not primarily to thwart attacks by foreign terrorists on U.S. soil; it’s to discourage challenges to the security services’ authority over our lives here at home.

The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.

This post originally appeared on Western Journalism – Informing And Equipping Americans Who Love Freedom

How DNA Is Turning Us Into A Nation Of Suspects

shutterstock.com

“The year is 2025. The population is 325 million, and the FBI has the DNA profiles of all of them. Unlike fingerprints, these profiles reveal vital medical information. The universal database arrived surreptitiously. First, the Department of Defense’s repository of DNA samples from all military personnel, established to identify remains of soldiers missing from action, was given to the FBI. Then local police across the country shadowed individuals, collecting shed DNA for the databank. On the way, thousands of innocent people were imprisoned because they had the misfortune to have race-based crime genes in their DNA samples. Sadly, it did not have to be this way. If only we had passed laws against collecting and using shed DNA….”—Professor David H. Kaye

Every dystopian sci-fi film we’ve ever seen is suddenly converging into this present moment in a dangerous trifecta between science, technology, and a government that wants to be all-seeing, all-knowing, and all-powerful.

By tapping into your phone lines and cell phone communications, the government knows what you say. By uploading all of your emails, opening your mail, and reading your Facebook posts and text messages, the government knows what you write. By monitoring your movements with the use of license plate readers, surveillance cameras, and other tracking devices, the government knows where you go.

By churning through all of the detritus of your life—what you read, where you go, what you say—the government can predict what you will do. By mapping the synapses in your brain, scientists—and in turn, the government—will soon know what you remember. And by accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

Of course, none of these technologies are foolproof. Nor are they immune from tampering, hacking, or user bias. Nevertheless, they have become a convenient tool in the hands of government agents to render null and void the Constitution’s requirements of privacy and its prohibitions against unreasonable searches and seizures.

Consequently, no longer are we “innocent until proven guilty” in the face of DNA evidence that places us at the scene of a crimebehavior sensing technology that interprets our body temperature and facial tics as suspicious; and government surveillance devices that cross-check our biometrics, license plates, and DNA against a growing database of unsolved crimes and potential criminals.

The government’s questionable acquisition and use of DNA to identify individuals and “solve” crimes has come under particular scrutiny in recent years. Until recently, the government was required to at least observe some basic restrictions on when, where, and how it could access someone’s DNA. That has all been turned on its head by various U.S. Supreme Court rulings, including the recent decision to let stand the Maryland Court of Appeals’ ruling in Raynor v. Maryland, which essentially determined that individuals do not have a right to privacy when it comes to their DNA.

Although Glenn Raynor, a suspected rapist, willingly agreed to be questioned by police, he refused to provide them with a DNA sample. No problem. Police simply swabbed the chair in which Raynor had been sitting and took what he refused to voluntarily provide. Raynor’s DNA was a match, and the suspect became a convict. In refusing to hear the case, the U.S. Supreme Court gave its tacit approval for government agents to collect shed DNA, likening it to a person’s fingerprints or the color of their hair, eyes, or skin.

Whereas fingerprint technology created a watershed moment for police in their ability to “crack” a case, DNA technology is now being hailed by law enforcement agencies as the magic bullet in crime solving. It’s what police like to refer to a “modern fingerprint.” However, unlike a fingerprint, a DNA print reveals everything about “who we are, where we come from, and who we will be.”

With such a powerful tool at their disposal, it was inevitable that the government’s collection of DNA would become a slippery slope toward government intrusion. Certainly, it was difficult enough trying to protect our privacy in the wake of a 2013 Supreme Court ruling in Maryland v. King that likened DNA collection to photographing and fingerprinting suspects when they are booked, thereby allowing the government to take DNA samples from people merely “arrested” in connection with “serious” crimes. At that time, Justice Antonin Scalia warned that as a result of the Court’s ruling, “your DNA can be taken and entered into a national database if you are ever arrested, rightly or wrongly, and for whatever reason.”

Now, in the wake of this Raynor ruling, Americans are vulnerable to the government accessing, analyzing, and storing their DNA without their knowledge or permission. As the dissenting opinion in Raynor for the Maryland Court of Appeals rightly warned, “a person desiring to keep her DNA profile private, must conduct her public affairs in a hermetically sealed hazmat suit…. The Majority’s holding means that a person can no longer vote, participate in a jury, or obtain a driver’s license, without opening up his genetic material for state collection and codification.”

All 50 states now maintain their own DNA databases, although the protocols for collection differ from state to state. That DNA is also being collected in the FBI’s massive national DNA database, code-named CODIS (Combined DNA Index System), which was established as a way to identify and track convicted felons and has since become a de facto way to identify and track the American people from birth to death.

Indeed, hospitals have gotten in on the game by taking and storing newborn babies’ DNA, often without their parents’ knowledge or consent. It’s part of the government’s mandatory genetic screening of newborns. However, in many states, the DNA is stored indefinitely. What this means for those being born today is inclusion in a government database that contains intimate information about who they are, their ancestry, and what awaits them in the future–including their inclinations to be followers, leaders, or troublemakers.

For the rest of us, it’s just a matter of time before the government gets hold of our DNA, either through mandatory programs carried out in connection with law enforcement and corporate America, or through the collection of our “shed” or “touch” DNA.

While much of the public debate, legislative efforts, and legal challenges in recent years have focused on the protocols surrounding when police can legally collect a suspect’s DNA (with or without a search warrant and whether upon arrest or conviction), the question of how to handle “shed” or “touch” DNA has largely slipped through without much debate or opposition.

Yet as scientist Leslie A. Pray notes:

We all shed DNA, leaving traces of our identity practically everywhere we go. Forensic scientists use DNA left behind on cigarette butts, phones, handles, keyboards, cups, and numerous other objects, not to mention the genetic content found in drops of bodily fluid, like blood and semen. In fact, the garbage you leave for curbside pickup is a potential gold mine of this sort of material. All of this shed or so-called abandoned DNA is free for the taking by local police investigators hoping to crack unsolvable cases. Or, if the future scenario depicted at the beginning of this article is any indication, shed DNA is also free for inclusion in a secret universal DNA databank.

What this means is that if you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name. As Forensic magazine reports, “As officers have become more aware of touch DNA’s potential, they are using it more and more. Unfortunately, some [police] have not been selective enough when they process crime scenes. Instead, they have processed anything and everything at the scene, submitting 150 or more samples for analysis.” Even old samples taken from crime scenes and “cold” cases are being unearthed and mined for their DNA profiles.

Today, helped along by robotics and automation, DNA processing, analysis, and reporting takes far less time and can bring forth all manner of information, right down to a person’s eye color and relatives. Incredibly, one company specializes in creating “mug shots” for police based on DNA samples from unknown “suspects” which are then compared to individuals with similar genetic profiles.

If you haven’t yet connected the dots, let me point the way: Having already used surveillance technology to render the entire American populace potential suspects, DNA technology in the hands of government will complete our transition to a suspect society in which we are all merely waiting to be matched up with a crime.

No longer can we consider ourselves innocent until proven guilty. As I make clear in my book A Government of Wolves: The Emerging American Police State, now we are all suspects in a DNA lineup until circumstances and science say otherwise.

Of course, there will be those who point to DNA’s positive uses in criminal justice, such as in those instances where it is used to absolve someone on death row of a crime he didn’t commit; and there is no denying its beneficial purposes at times. However, as is the case with body camera footage and every other so-called technology that is hailed as a “check” on government abuses, in order for the average person—especially one convicted of a crime—to request and get access to DNA testing, they first have to embark on a costly, uphill legal battle through red tape; and, even then, they are opposed at every turn by a government bureaucracy run by prosecutors, legislatures, and law enforcement.

What this amounts to is a scenario in which we have little to no defense against charges of wrongdoing, especially when “convicted” by technology, and even less protection against the government sweeping up our DNA in much the same way it sweeps up our phone calls, emails, and text messages.

Yet if there are no limits to government officials being able to access your DNA and all that it says about you, then where do you draw the line? As technology makes it ever easier for the government to tap into our thoughts, our memories, and our dreams, suddenly the landscape becomes that much more dystopian.

With the entire governmental system shifting into a pre-crime mode aimed at detecting and pursuing those who “might” commit a crime before they have an inkling, let alone an opportunity, to do so, it’s not so far-fetched to imagine a scenario in which government agents (FBI, local police, etc.) target potential criminals based on their genetic disposition to be a “troublemaker” or their relationship to past dissenters. Equally disconcerting: if scientists can, using DNA, track salmon across hundreds of square miles of streams and rivers, how easy will it be for government agents to not only know everywhere we’ve been and how long we were at each place–but collect our easily shed DNA and add it to the government’s already burgeoning database?

As always, there will be those voices—well-meaning, certainly—insisting that if you want to save the next girl from being raped, abducted, or killed, then we need to give the government all the tools necessary to catch these criminals before they can commit their heinous crimes.

It’s hard to argue against such a stance. If you care for someone, you’re particularly vulnerable to this line of reasoning. Of course we don’t want our wives butchered, our girlfriends raped, or our daughters abducted and subjected to all manner of atrocities. But what about those cases in which the technology proved to be wrong, either through human error or tampering? It happens more often than we are told.

For example, David Butler spent eight months in prison for a murder he didn’t commit after his DNA was allegedly found on the murder victim and surveillance camera footage placed him in the general area the murder took place. Conveniently, Butler’s DNA was on file after he had voluntarily submitted it during an investigation years earlier into a robbery at his mother’s home. The case seemed cut and dried to everyone but Butler, who proclaimed his innocence. Except that the DNA evidence and surveillance footage was wrong: Butler was innocent.

That Butler’s DNA was supposedly found on the victim’s nails was attributed to three things: one, Butler was a taxi driver–“and so it was possible for his DNA to be transferred from his taxi via money or another person, onto the murder victim”; two, Butler had a rare skin condition causing him to shed flakes of skin—i.e., more DNA to spread around, much more so than the average person; and three, police wanted him to be the killer, despite the fact that “the DNA sample was only a partial match, of poor quality, and experts at the time said they could neither say that he was guilty nor rule him out.”

Moreover, despite the insistence by government agents that DNA is infallible, New York Times reporter Andrew Pollack makes a clear and convincing case that DNA evidence can, in fact, be fabricated. Israeli scientists “fabricated blood and saliva samples containing DNA from a person other than the donor of the blood and saliva,” stated Pollack. “They also showed that if they had access to a DNA profile in a database, they could construct a sample of DNA to match that profile without obtaining any tissue from that person.” The danger, warns scientist Dan Frumkin, is that crime scenes can be engineered with fabricated DNA.

Now if you happen to be the kind of person who trusts the government implicitly and refuses to believe it would ever do anything illegal or immoral, then the prospect of government officials—police, especially—using fake DNA samples to influence the outcome of a case might seem outlandish. But for those who know their history, the probability of our government acting in a way that is not only illegal but immoral becomes less a question of “if” and more a question of “when.”

The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.

This post originally appeared on Western Journalism – Informing And Equipping Americans Who Love Freedom

Think What’s On Your Cellphone Is Private? Don’t Cross The Canadian Border

Cellphone

A Canadian citizen discovered that what he thinks is private, and what Canadian border agents think is private, are two different things. The difference resulted in the man’s arrest.

After Quebec resident Alain Philippon, 38, landed at the Halifax Stanfield International Airport in Canada’s eastern province of Nova Scotia from a trip in the Dominican Republic, border agents asked him for the password to his cellphone. When Philippon refused, citing privacy, he was promptly arrested and charged with obstructing border officials.

According to the Canadian Border Services Agency, the minimum fine for the offense is $1,000, with a maximum fine of $25,000 and the possibility of a year in jail. Philippon has been released on bail and plans to challenge the charges against him.

The CBSA would not say why they wanted the information on Philippon’s phone. A spokesman for the organization told CBC News: “Officers are trained in examination, investigative and questioning techniques. To divulge our approach may render our techniques ineffective. Officers are trained to look for indicators of deception and use a risk management approach in determining which goods may warrant a closer look.”

The spokesman added: “Under the Customs Act, customs officers are allowed to inspect things that you have, that you’re bringing into the country…The term used in the act is ‘goods,’ but that certainly extends to your cellphone, to your tablet, to your computer, pretty much anything you have.”​

That said, the question of whether someone must give up their password has yet be answered in a Canadian court. Philippon’s first court date is May 12.

Americans should also be aware that U.S. border agents possess the same power to search all items, including cellphones, computers, and other electronic equipment that travelers bring into the country.

U.S. citizens have the Fourth Amendment right against unreasonable searches and seizures; that right applies when you have a reasonable expectation of privacy, including when you are in your home. However, that right is largely surrendered at the border, which includes international airports when you have been traveling overseas.   

h/t: The Blaze

This post originally appeared on Western Journalism – Informing And Equipping Americans Who Love Freedom

TSA Plan To Outsource PreCheck Would Let Companies Access Credit Card Data, Social Media Posts

Arina P Habich / Shutterstock.com  Arina P Habich / Shutterstock.com

The Transportation Security Administration has proposed the outsourcing of PreCheck to private companies, a proposal that would allow companies to access the credit card data and social media posts of those applying for the program.

PreCheck allows selected passengers to skip security lines at airports.

However, privacy advocates are alarmed that the TSA is turning over what should be a government responsibility to the private sector, which has less checks on it than the public sector.

Some, though, say that TSA does not have the necessary budget or personnel to continue to do the PreCheck program without help from outside companies.

Chris Calabrese, senior policy director at the Center for Democracy & Technology, a Washington-based think tank, is not sure how the companies would use the information they collect about travelers.

He stated to the Washington Times:

If PreCheck says for whatever reason I am a higher-danger traveler, what is DHS or TSA supposed to do with that information? Should I be watch-listed? Should I be given a chance to contest? These are very hard questions with real consequences. If I’m a traveler who thinks I’m signing up for the fast lane and it turns out I’m really signing up for the ‘you get searched every single time you go through’ lane, it’s less customer service.

Advocates of the program think that private companies would help market PreCheck to more people and provide better customer service.

Patricia Rojas, vice president of government relations at the U.S. Travel Association, stated: “It’s a win-win proposition because it allows the U.S. government to take a more focused approach to our homeland security as opposed to the system that we originally developed where we basically just had a blanket review of everyone.”

What do you think? Should TSA place PreCheck in private hands or not?

This post originally appeared on Western Journalism – Informing And Equipping Americans Who Love Freedom

Cyber Security Proposals Threaten Privacy

Obama on Cuban Relations

In the name of fighting against cyber attacks, Barack Obama wants to change the rules that protect your personal data. You see, the real motherlode of data on Americans currently sits in private hands.

But Obama wants to move the data into the claws of law enforcement agencies.

The goal is to have private sector companies give even more information to the government, in exchange for protection against lawsuits for the misuse of data.

It’s a beneficial deal for the companies and the government, but what this deal implies for the consumer is downright frightening…

The leading privacy advocates were aghast at Obama’s latest moves against online privacy.

In a statement criticizing the Obama proposal, the Electronic Frontier Foundation said: “Introducing information-sharing proposals with broad liability protections, increasing penalties under the already-draconian Computer Fraud and Abuse Act, and potentially decreasing the protections granted to consumers under state data breach law are both unnecessary and unwelcomed. The status quo of overweening national security and law enforcement secrecy means that expanded information-sharing poses a serious risk of transferring more personal information to intelligence and law enforcement agencies.”

The False Solution for a True Problem

Cyber security is a real problem, but the biggest threats are outside the country. Hackers from Russia and China are threatening private firms and public networks via the internet. Instead of beefing up security against these threats, the Obama team wants to broadly collect more data on generally law-abiding American citizens.

In the internet world, this is akin to having the TSA search your 85-year-old grandma at the airport. The focus is all wrong.

If you clearly analyze the myriad proposals affecting the internet from the Obama administration, they all have one common denominator: they give the federal government more control over private activity and citizens.

Another frightening proposal is pending at the Federal Communications Commission (FCC), one that would declare data networks to be public utilities. Reason being, once again, to give the government (in this case, the FCC) dramatically more power over internet providers.

Adding insult to injury, a third proposal uses the FCC to strike down laws in the states that prohibit government agencies from building broadband networks to compete against private firms. Obama and his team love the idea of socializing the internet by putting networks in the hands of local governments.

Bottom line: Should these three proposals pass, they’ll dramatically change the way the internet works. Government as the guardian of your private data? Check. Government as regulator of all private internet providers? Check. And finally, the government actually providing your internet access.

A government in control of all cyber space is slowly taking shape. Consider yourself warned.

 

This commentary originally appeared at WallStreetDaily.com and is reprinted here with permission.

The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.

This post originally appeared on Western Journalism – Informing And Equipping Americans Who Love Freedom