website statistics

While Electronic Frontier Foundation is currently fighting out a legal battle against NSA for its wiretapping tactics, it has been discovered that a security cell has been allowed to keep data on US citizens for 5 years.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

In today’s world, the chief doctrine that drives all kinds of surveillance is national security. The public is pedaled with a fear of security into allowing the abuse of their data. EFF is currently engaged in a legal battle against NSA for its use of wiretapping methods. And yet, new surveillance methods, used by the U.S. government, have been uncovered.


Big Brother

Electronic Frontier Foundation has been actively raising voice against such methods by security agencies which infringed the basic rights of the U.S. citizens. Among these is warrantless wiretapping which NSA has been making use of since the Bush era.

The agency has allegedly been collaborating with AT&T to tap into the wireless traffic and keep track of all the outgoing telephone calls, together with other user data. EFF has tried to cite this as an essential infringement of user privacy.

NSA and the government have, as usual, tried to hype up the entire thing by claiming that they can’t reveal relevant information which is integral to national security. EFF has rebuffed that claim and has demanded the case to be continued. The Judge recently heard the arguments of both parties as to why should the case proceed and has yet to decide whether or not it should.

While EFF wages war on that front, another terrible surveillance privilege has recently been accorded to National Counterterrorism Center. As the name suggests, the Center is meant to breach user privacy and monitor them in an Orwellian manner, all in the name of security.

The government has now granted new privileges to the Center, allowing it to keep data bout innocent citizens for up to five years during which, the data will be manipulated, analysed  cross-checked against different databases and even shared with foreign agencies.

To top it off, this data comprises of many databases, from flight records to casino lists and a lot more. This, and similar other surveillance tactics have been and continue to be used on American public without their explicit consent. The government keeps rolling them out in silence which, in itself, is a despicable practice. The slippery slope of privacy breach that the security agencies have started on may soon lead to more Draconian surveillance laws if not curbed now.

Courtesy: Arstechnica/Slate

Buy Cheapest Related Product From Amazon.com


Newcastle University Wants To Introduce Biometric Scanners: Students Protesting

Popular Opinion Rejects Automatically Blocking Internet Porn
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On December 17, 2012(1 year, 4 months ago.)

Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook