This is not just about your personal privacy

Aside from revealing the names of specific programs that the government has been using to violate the privacy of all and sundry, to most people who have been keeping track of what’s going on over the past twenty years or more, nothing Edward Snowden has so far revealed is news.

I know that a significant percentage of the population don’t care, because as far as they are concerned, “If you don’t have anything to hide, what’s the problem?”

To those people, there’s nothing you can say to convince them that a violation of privacy is a violating of privacy, whether the victim(s) have something to hide or not. But worse than that, they fail to see that this matter has implications that go beyond personal privacy.

I’ve read many articles that try to educate people on this very subject, and just came across one today. It was written by Dan Tobon of Cyphertite, a company that offers host-proof Cloud storage services. This article was published almost two months, but it’s never too old to read. Here’s an excerpt.

This is essentially a matter of the complete circumvention of the checks and balances which are the requisite safeguards in our representative democracy. Viewed from this perspective the issue becomes far more worrisome. In essence if the executive branch1 is able to effectuate a process that enables it to seemingly comply, but in effect avoid, these institutional checks on power the entire system fails its operative function.

The recent actions of the Executive branch, through the DOJ and the intelligence services, and its confederates in the secret Foreign Intelligence Surveillance Court (FISC) have seemingly engineered this very use case.


FISA theoretically purported to set in place a system of judicial safeguards which would monitor and prevent Executive overreach and abuse of power. In practice what has occurred is the blanket legitimization of all but the most egregious domestic surveillance activity on the part of the government. Due to the governments prior indiscretions FISA was passed in order prevent unwarranted surveillance of Americans.

Instead it has effectuated a process by which the Executive can escape meaningful scrutiny and circumvent the institutional checks on its power provided for in our Constitution. Ostensibly, it is like catching a criminal in the process of committing a crime and then appointing him and his friends to be the judge and jury at his trial.

You may read the complete article here.
Edward Snowden privacy NSA PRISM

Related Post:  How to create a laser light show with Fedora

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer run network ads?  Yep, no more ads from the usual suspects that track and annoy you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal or your favorite cryptocurrency.

  • Bitcoin
  • Ethereum
  • Xrp
  • Bitcoin cash
  • Bitcoin sv
  • Litecoin
  • Binance coin
  • Cardano
  • Ethereum classic
Scan to Donate Bitcoin to bc1qzvlte2m224zkayhdc7fdfjkp2rsgt0l5a496ua

Donate Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x0F4362DFF77F3Ba0Dc637F5f3Eba35D09a2fA60C

Donate Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Xrp to r4ggjvL36njsMCYTkJ3S7cTHscPsMsSGQv

Donate Xrp to this address

Scan the QR code or copy the address below into your wallet to send some Xrp

Scan to Donate Bitcoin cash to qrs0dedzp9t55af3nfwypydghp29r0xguy9s20fz2k

Donate Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Bitcoin sv to 15K9TLyVDBtLuG9cYvXCX9SSkq9C9oUKHK

Donate Bitcoin sv to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin sv

Scan to Donate Litecoin to LetJ9QQMb7u2LMZ9Tu6rtHwcBcQFW98fbG

Donate Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Binance coin to bnb1ga8trq08ssqepd90v6225nzfgy448pu5pw8gxp

Donate Binance coin to this address

Scan the QR code or copy the address below into your wallet to send some Binance coin

Scan to Donate Cardano to addr1qx2354yw49etstfljpdhwja3ajjlt487lg95vu9ngy2q6vu4rf2ga2tjhqknlyzmwa9mrm997h20a7stgectxsg5p5esq5l7d9

Donate Cardano to this address

Scan the QR code or copy the address below into your wallet to send some Cardano

Scan to Donate Ethereum classic to 0xcD6CC972a2297FcafACDcfE042C55C69516a9264

Donate Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Subscribe for updates. Trust me, no spam!

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Upcoming events

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.