Leahy’s rewritten bill would allow more than 22 agencies — including the Securities and Exchange Commission and the Federal Communications Commission — to access Americans’ e-mail, Google Docs files, Facebook wall posts, and Twitter direct messages without a search warrant. It also would give the FBI and Homeland Security more authority, in some circumstances, to gain full access to Internet accounts without notifying either the owner or a judge. (CNET obtained the revised draft from a source involved in the negotiations with Leahy.)
Unpossible I say, a politician rewriting a bill to be counter to the interests of Americans after debuting it as being to their benefit? It’s like they know the public doesn’t want this but it’s the only way they can pull it off.
Who needs the 4th amendment, am I right? They’re not even trying to be overt about this anymore. Can someone please explain to me why the government needs this kind of power. How is it that the act of informing a judge and getting a warrant to express probable cause for the invasion of privacy is necessary is a hindrance?
Oh, that’s right, it’s a hindrance to finding undesirables to be weeded out of the population. While anyone with half a brain should know not to expect those things to be private, which is why I’m not a big fan of the cloud, it seems a far stretch the government cannot first obtain a warrant.
Contact your legislator now and start raising hell. Just to illustrate the double standard of this, I’m reasonably sure it’s safe elected officials will be exempt and still require a warrant. Laws for thee not for me. If these elected representatives want this, they need to make their services public for all to see… They’ve got nothing to hide right? At least that’s what they keep telling us.
Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms.
He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.