drgoodword wrote: The era of a (mostly) free press is rapidly coming to an end.
Someone accuses you of stealing some well logs, so gubmint agents come knocking on your door and smash your hard drives. Wouldn't you expect some due process?ROCKMAN wrote:Take a simple example: someone steals all your financial and medical records and gives them to the Guardian: wouldn't you expect the govt to force the Guardian to delete all the info from their files even if they weren't the ones who stole the data?
"Due process" would be to get a warrant to seize the hard drives for evidence and then return them to you if they did not proceed with charges. There does not seem to be any "crime" or "stealing" involved, at least under UK law, otherwise they would have proceeded.(Ironically, much of this "stolen" information was itself "stolen" by "authorities".)ROCKMAN wrote:Keith - No one accused the Guardian of having stolen files...they admitted it. That's due process, Isn't it? If I admit I have stolen logs wouldn't they authorities have the right to immediately take them from me? There is no supposition of innocence if you admit you're guilty, is there?
Again, very simple: someone admits they have your stolen property. No one denies it was stolen. In fact they go on TV and explain that they stole it and why they did it. Someone else publicizes they have your property. So at what point do the authorities need any more cause to recover your stolen items? It really doesn’t seem like a very complicated issue IMHO. We may not like some of what the govt has been doing and are glad it was exposed. But it doesn’t change the nature of the crime. Soon the govt will have all your medical and financial data. If someone steals it and gives it to the Guardian wouldn’t you want the authorities to remove it from their possession? Or is theft OK if it’s something you would like to see made public? I doubt you would take such a position.
I can understand why folks would be upset with the crap our govt and others are doing. But it doesn’t change the law. Edwards had his reasons for doing what he did. One can agree or disagree with those reasons. But he admits he committed a crime. A crime which he feels was justified but a crime no less. Thus he’s admitted his guilt. The Guardian admitted they were in possession of stolen material. They have their reasons for believing they should have made that info public. But they have admitted to having stolen property. Seems like due process has been followed just as you or I would expect it to be. Again simplistic: if I steal your X, admit I stole your X and tell the authorities where I have your X should I be allowed keep your X until I go to court and am officially convicted of stealing your X? Or would you want to authorities to immediately recover your X? Changes the tone of the discussion when you don’t specify what X is, doesn’t it?
Cressida Dick, an assistant commissioner at Scotland Yard, confirmed for the first time that detectives were examining whether staff at the newspaper had committed an offence.
She also told MPs that her officers are looking at potential breaches of a specific anti-terrorism law which makes it unlawful to communicate information about British intelligence agents.
After grilling the Guardian's editor, Alan Rusbridger, I am delighted the select committee I sit on will be summoning the security chiefs we really need to hear from.
When I think of terrorists, newspaper editors aren't the first people who spring to mind. Yet today the editor of the Guardian was hauled before the Commons home affairs select committee – of which I am a member – and accused of breaching terrorist law.
Frankly, any such allegation highlights how ludicrously broad these laws are.
Thomas Drake, a computer software expert and former senior executive with the National Security Agency in the U.S., talks about the recent spate of whistleblowers, who have been shining a light in the dark corners of international cyber-spying. Mr. Drake was himself a whistle-blower; he was charged, but never convicted.
Before Edward Snowden, there was Thomas Drake.
Like the famed ... or some would say infamous ... former NSA contractor turned whistle-blower, Thomas Drake became increasingly concerned about the far-reaching surveillance system the U.S. government was building at the National Security Agency.
The high-ranking executive at the agency was concerned that the NSA was running rough-shod over protections enshrined in the U.S. constitution. He tried to raise his concerns internally, but no one seemed interested.
I really wanted to make it a trilogy, you know? I mean, what could be cooler than a trilogy of near-future Scottish police procedurals about crimes that don't exist yet, written in multi-viewpoint second person? (Elizabeth Bear has a term for that kind of thing: she calls it "stunt writing".)
Unfortunately the NSA have done it again:To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency's impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs.
Real-life agents have been deployed into virtual realms, from those Orc hordes in World of Warcraft to the human avatars of Second Life. There were attempts, too, to recruit potential informants from the games' tech-friendly users.
At this point, I'm clutching my head. "Halting State" wasn't intended to be predictive when I started writing it in 2006. Trouble is, about the only parts that haven't happened yet are Scottish Independence and the use of actual quantum computers for cracking public key encryption (and there's a big fat question mark over the latter—what else are the NSA up to?).
I'm throwing in the towel. I probably will write another near-future Scottish police procedural by and by, but it won't be a sequel to the first two except in the loosest sense. The science fictional universe of "Halting State" and "Rule 34" is teetering on the edge of turning into reality. Meanwhile, the financial crisis of 2007 forced me back to the drawing board for "Rule 34"; the Snowden revelations have systematically trashed all my ideas for the third book.
...
Sometimes I wish I'd stuck with the spaceships and bug-eyed monsters. Realism in fiction is over-rated.
...
A US judge has ruled the National Security Agency's mass collection of telephone data unconstitutional.
Federal District Judge Richard Leon said the electronic spy agency's practice was an "arbitrary invasion".
The agency's collection of "metadata" including telephone numbers and times and dates of calls was brought to light by ex-NSA contractor Edward Snowden.
The White House dismissed the suggestion Mr Snowden receive amnesty if he stopped leaking documents.
In his ruling in a Washington DC federal court on Monday, Mr Leon called the NSA's surveillance programme "indiscriminate" and an "almost Orwellian technology that enables the government to store and analyze the phone metadata of every telephone user in the United States".
Earlier this month, Alan Rusbridger, editor of the Guardian newspaper, which has published many of the Snowden documents, told UK MPs that only 1% of files leaked by Mr Snowden had been published by the newspaper.
The US has charged Mr Snowden with theft of government property, unauthorised communication of national defence information, and wilful communication of classified communications intelligence.
Each of the charges carries a maximum 10-year prison sentence.
At the weekend, the NSA allowed a CBS television crew into its headquarters for the first time, in an effort to be more open about what the agency does with the data it collects.
Spyware for mobile phones was even on offer in the 2008 version of the catalog. A Trojan for gaining total access to iPhones, which were still new at the time, was still in development, though its specifications are listed in the catalog.
'Implants' for Cisco, Juniper, Dell, Huawei and HP
...
The NSA has also targeted products made by well-known American manufacturers and found ways to break into professional-grade routers and hardware firewalls, such as those used by Internet and mobile phone operators. ANT offers malware and hardware for use on computers made by Cisco, Dell, Juniper, Hewlett-Packard and Chinese company Huawei.
Keith_McClary wrote:German Television Channel NDR does an exclusive interview with Edward Snowden. (ENGLISH) 30 min.
http://www.liveleak.com/view?i=f93_1390833151
The contracting culture of the national security community in the United States is a complex topic. It’s driven by a number of interests between primarily limiting the number of direct government employees at the same time as keeping lobbying groups in Congress typically from very well funded businesses such as Booze Allen Hamilton. The problem there is you end up in a situation where government policies are being influenced by private corporations who have interests that are completely divorced from the public good in mind. The result of that is what we saw at Booze Allen Hamilton where you have private individuals who have access to what the government alleges were millions and millions of records that they could walk out the door with at any time with no accountability, no oversight, no auditing, the government didn’t even know they were gone.
Keith_McClary wrote:The contracting culture of the national security community in the United States is a complex topic. It’s driven by a number of interests between primarily limiting the number of direct government employees at the same time as keeping lobbying groups in Congress typically from very well funded businesses such as Booze Allen Hamilton. The problem there is you end up in a situation where government policies are being influenced by private corporations who have interests that are completely divorced from the public good in mind. The result of that is what we saw at Booze Allen Hamilton where you have private individuals who have access to what the government alleges were millions and millions of records that they could walk out the door with at any time with no accountability, no oversight, no auditing, the government didn’t even know they were gone.
Plantagenet wrote:
Vote to pass a bill that adds ecoterrorism to the states criminal code. The bill defines ecoterrorism as the intention to intimidate, coerce, prevent or obstruct an individual lawfully participating in an activity involving animals, plants or an activity involving a natural resource facility. The bill sets a penalty of no more than 40 years in prison and up to a $100,000 fine for a first-degree felony. The bill also requires the convicted individual to pay the property owner restitution of up to three times the amount of damage caused. The bill also makes intentional agricultural crop destruction a felony in the second degree.
James Powers, Pennsylvania Homeland Security Director contracted with an anti-terrorism contractor, Institute of Terrorism Research and Response (ITRR), to spy on gas drilling opponents. ITRR intercepted communications and tracked group members and their affiliations.
Newfie wrote:James Powers, Pennsylvania Homeland Security Director contracted with an anti-terrorism contractor, Institute of Terrorism Research and Response (ITRR), to spy on gas drilling opponents. ITRR intercepted communications and tracked group members and their affiliations.
This is a valid story.
Return to Geopolitics & Global Economics
Users browsing this forum: No registered users and 5 guests