website statistics
While Electronic Frontier Foundation is currently fighting out a legal battle against NSA for its wiretapping tactics, it has been discovered that a security cell has been allowed to keep data on US citizens for 5 years.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...Loading...

In today’s world, the chief doctrine that drives all kinds of surveillance is national security. The public is pedaled with a fear of security into allowing the abuse of their data. EFF is currently engaged in a legal battle against NSA for its use of wiretapping methods. And yet, new surveillance methods, used by the U.S. government, have been uncovered.


Big Brother

Electronic Frontier Foundation has been actively raising voice against such methods by security agencies which infringed the basic rights of the U.S. citizens. Among these is warrantless wiretapping which NSA has been making use of since the Bush era.

The agency has allegedly been collaborating with AT&T to tap into the wireless traffic and keep track of all the outgoing telephone calls, together with other user data. EFF has tried to cite this as an essential infringement of user privacy.

NSA and the government have, as usual, tried to hype up the entire thing by claiming that they can’t reveal relevant information which is integral to national security. EFF has rebuffed that claim and has demanded the case to be continued. The Judge recently heard the arguments of both parties as to why should the case proceed and has yet to decide whether or not it should.

While EFF wages war on that front, another terrible surveillance privilege has recently been accorded to National Counterterrorism Center. As the name suggests, the Center is meant to breach user privacy and monitor them in an Orwellian manner, all in the name of security.

The government has now granted new privileges to the Center, allowing it to keep data bout innocent citizens for up to five years during which, the data will be manipulated, analysed  cross-checked against different databases and even shared with foreign agencies.

To top it off, this data comprises of many databases, from flight records to casino lists and a lot more. This, and similar other surveillance tactics have been and continue to be used on American public without their explicit consent. The government keeps rolling them out in silence which, in itself, is a despicable practice. The slippery slope of privacy breach that the security agencies have started on may soon lead to more Draconian surveillance laws if not curbed now.

Courtesy: Arstechnica/Slate

Buy Cheapest Related Product From Amazon.com


Newcastle University Wants To Introduce Biometric Scanners: Students Protesting

Popular Opinion Rejects Automatically Blocking Internet Porn
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On December 17, 2012(2 years, 8 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Our today’s tutorial is about how to change Font on Android.
Here is the tutorial about how to setup MMS on Android device.
In this tutorial I will show you how to enable Instant Upload inside your Google+ app on Android, so that you can sync your photos and videos with Google+ instantly.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook