Categories
general freedom government transparency national politics & policies privacy too much government

Rand to the Rescue

Nothing gets done in Washington?

Tell that to Kentucky Senator and presidential hopeful Rand Paul. Last night, he single-handily “repealed” Section 215 of the Patriot Act, ending the federal government’s mass collection of our phone records.

At least, for the next few days.

On the floor of the Senate, Paul blocked the USA Freedom Act, a “compromise” bill passed by the House. It would’ve required private telecoms to keep the data, allowing the government to query that data with a warrant.

“I’m supportive of the part that ends the bulk collection by the government,” said Paul. “My concern is that we might be exchanging bulk collection by the government [with] bulk collection by the phone companies.”

In a Time magazine op-ed, he argued, “We should not be debating modifying an illegal program. We should simply end this illegal program.”

Also last week, the Tea Party Patriots joined the ACLU in agreeing with Paul’s position: the USA Freedom Act doesn’t go far enough . . . to protect our civil rights.

Others warn we aren’t safe without maximum snooping and info-scooping by government:

  • CIA Director John Brennan called the metadata program “integral to making sure that we’re able to stop terrorists in their tracks.”
  • Attorney General Loretta Lynch said the expiration amounted to “a serious lapse.”
  • James Clapper, director of National Intelligence — most famous now for lying to Congress about the existence of the metadata program — declared we “would lose entirely an important capability that helps us identify potential U.S.-based associates of foreign terrorists.”

Yet, there’s not a single case where this bulk phone data helped capture a terrorist or stop an attack.

Sen. Paul believes “we can still catch terrorists using the Constitution.”


Printable PDF

Rand Paul vs. the Surveillance State

 

Categories
crime and punishment privacy too much government

Are They Reading This?

You’re a nice person, Gentle Reader; I’m glad to communicate with you in a public forum and listen to your responses.

But we both expect limits to this mutual access. If we’re not legitimately suspected of being criminals, we expect to go about our business without strangers intruding upon us at will. We have a right to boundaries.

More and more, though, the borders of the privacy we rely upon are routinely violated by government employees who trawl our lives at random. We often have no idea of the existence or extent of the intrusions until long after the fact.

The latest disturbing practice we’re getting a smidgen of info about is the secretive use by police agencies of so-called “sting ray” devices, which simulate cell towers to track cell phone data and location.

For years, obeying FBI demands for secrecy, prosecutors have been dropping cases rather than report how the devices are deployed. In a Baltimore murder trial, though, Detective Michael Dresser testified that his department has used the device 4,300 times. He assures us that officers await judicial permission . . . unless the circumstances are too urgent.

That’s nice. But without a lot more transparency about how and when the sting ray is deployed, I don’t have much confidence that such scrupulousness is par even in Baltimore, let alone all other locales. It’s hard to give government agencies the benefit of the doubt when the track record is so lousy.

This is Common Sense. I’m Paul Jacob.


Printable PDF

stingRaY

 

Categories
privacy

Dropout versus NSA

Bill Gates and Steve Jobs didn’t finish college, and they did okay. John Brooks dropped out of middle school at age 13, and he is doing okay.

Now 22, he began developing an encrypted chat program called Ricochet some four years ago — long before Edward Snowden so profusely exposed the National Security Agency’s spy-on-everyone programs.

Wired reports that Brooks eventually crafted “a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata — the ‘to’ and ‘from’ headers and IP addresses spy agencies use to identify and track communications. . . .” He did a better job crafting the package than others offering similar armored tech.

One problem. For a long time, few people knew about his robust chat program. But dramatic revelations of unfettered surveillance by both government and businesses of everybody can sure concentrate the mind. Many more people have become worried about metadata that can be easily scavenged without a warrant. And Brooks realized that his achievement would be widely welcome if only he could get the word out and prove that Ricochet does what it is supposed to do. If not now, when?

That’s around the time a group called Invisible.im announced plans to develop an encrypted chat program to do what Brooks had already done. He told them about his own software; they dropped their plans and are helping him finalize and distribute Ricochet.

May the best private, secure, anonymous chat program win.

This is Common Sense. I’m Paul Jacob.