Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Friday, May 25, 2012




 

Express-News

 By Francisco Vara-Orta
Thursday, May 24, 2012

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

Northside, the largest school district in Bexar County, plans to modify the ID cards next year for all students attending John Jay High School, Anson Jones Middle School and all special education students who ride district buses. That will add up to about 6,290 students.

The school board unanimously approved the program late Tuesday but, in a rarity for Northside trustees, they hotly debated it first, with some questioning it on privacy grounds.

State officials and national school safety experts said the technology was introduced in the past decade but has not been widely adopted. Northside's deputy superintendent of administration, Brian Woods, who will take over as superintendent in July, defended the use of RFID chips at Tuesday's meeting, comparing it to security cameras. He stressed that the program is only a pilot and not permanent.

“We want to harness the power of (the) technology to make schools safer, know where our students are all the time in a school, and increase revenues,” district spokesman Pascual Gonzalez said. “Parents expect that we always know where their children are, and this technology will help us do that.”

Chip readers on campuses and on school buses can detect a student's location but can't track them once they leave school property. Only authorized administrative officials will have access to the information, Gonzalez said.

“This way we can see if a student is at the nurse's office or elsewhere on campus, when they normally are counted for attendance in first period,” he said.

Gonzalez said the district plans to send letters to parents whose students are getting the the RFID-tagged ID cards. He said officials understand that students could leave the card somewhere, throwing off the system. They cost $15 each, and if lost, a student will have to pay for a new one.

Parents interviewed outside Jay and Jones as they picked up their children Thursday were either supportive, skeptical or offended.

Veronica Valdorrinos said she would be OK if the school tracks her daughter, a senior at Jay, as she always fears for her safety. Ricardo and Juanita Roman, who have two daughters there, said they didn't like that Jay was targeted.

Gonzalez said the district picked schools with lower attendance rates and staff willing to pilot the tags.

Some parents said they understood the benefits but had reservations over privacy.

“I would hope teachers can help motivate students to be in their seats instead of the district having to do this,” said Margaret Luna, whose eighth-grade granddaughter at Jones will go to Jay next year. “But I guess this is what happens when you don't have enough money.”

The district plans to spend $525,065 to implement the pilot program and $136,005 per year to run it, but it will more than pay for itself, predicted Steve Bassett, Northside's assistant superintendent for budget and finance. If successful, Northside would get $1.7 million next year from both higher attendance and Medicaid reimbursements for busing special education students, he said.

But the payoff could be a lot bigger if the program goes districtwide, Bassett said.

He said the program was one way the growing district could respond to the Legislature's cuts in state education funding. Northside trimmed its budget last year by $61.4 million.

Two school districts in the Houston area — Spring and Santa Fe ISDs — have used the technology for several years and have reported gains of hundreds of thousands of dollars in revenue for improved attendance. Spring ISD spokeswoman Karen Garrison said the district, one-third the size of Northside, hasn't had any parent backlash.

In Tuesday's board debate, trustee M'Lissa M. Chumbley said she worried that parents might feel the technology violated their children's privacy rights. She didn't want administrators tracking teachers' every move if they end up outfitted with the tags, she added.

“I think this is overstepping our bounds and is inappropriate,” Chumbley said. “I'm honestly uncomfortable about this.”

Northside has to walk a tightrope in selling the idea to parents, some of whom could be turned off by the revenue incentive, said Kenneth Trump, president of National School Safety and Security Services, a Cleveland-based consulting firm.

The American Civil Liberties Union fought the use of the technology in 2005 at a rural elementary school in California and helped get the program canceled, said Kirsten Bokenkamp, an ACLU spokeswoman in Texas. She said concerns about the tags include privacy and the risks of identity theft or kidnapping if somebody hacks into the system.

Texas Education Agency spokeswoman DeEtta Culbertson said no state law or policy regulates the use of such devices and the decision is up to local districts.







privacy

Wednesday, March 7, 2012



March 6, 2012 10:02 PM

DALLAS (CBSDFW.COM) – Think about all the personal information we keep in our cell phones: It’s something to consider after the U.S. Court of Appeals for the 7th Circuit ruled it is now legal for police to search cell phones without a warrant.

Former Dallas FBI Agent Danny Defenbaugh said the ruling gives law enforcement a leg up. “I think not only will it help them, but it could be life saving,” said the former Special Agent, who was based in Dallas.

The decision stems from an Indiana case where police arrested a man for dealing drugs. An officer searched the suspect’s cell phone without warrant.

The judge in the appeal case, Judge Richard Posner, agreed that the officer had to search the phone immediately or risk losing valuable evidence. Judge Posner ruled it was a matter of urgency, arguing it was possible for an accomplice to wipe the phone clean using a computer or other remote device.

Defenbaugh says the ruling takes into account exigent or time-sensitive circumstances that could be life saving in more urgent cases, such as child abduction. ”If the child is alive and you’re only minutes behind, that could be critical to recovering that child alive,” added Defenbaugh.

Paul Coggins is the former U.S. Attorney for the Northern District of Texas. Coggins says the court’s ruling pushes the envelope on privacy issues. Judge Posner ruled that the search was legal because the officer conducted a limited search and only looked for a phone number associated with the alleged drug deal.

However, Coggins wonders if it opens the door to more extensive searches down the road. “Does that mean officers now have the right to search through your phone, search through your search history, your photographs, your e-mails and the rest, because it could all be wiped clean,” Coggins asked.

Many critics are asking the same question. They call the ruling an invasion of privacy that far outweighs the needs of law enforcement.

Both Defenbaugh and Coggins agree that the case is likely to go to the U.S. Supreme court.










privacy

Monday, October 10, 2011

But I thought, the Left was supposed to want to save us, protect us from the Right, who were busy usurping our rights and violating our liberties and taking away our freedoms.





Calif. Governor Veto Allows Warrantless Cellphone Searches



By David Kravets
October 10, 2011

California Gov. Jerry Brown is vetoing legislation requiring police to obtain a court warrant to search the mobile phones of suspects at the time of any arrest.

The Sunday veto means that when police arrest anybody in the Golden State, they may search that person’s mobile phone — which in the digital age likely means the contents of persons’ e-mail, call records, text messages, photos, banking activity, cloud-storage services, and even where the phone has traveled.

Police across the country are given wide latitude to search persons incident to an arrest based on the premise of officer safety. Now the nation’s states are beginning to grapple with the warrantless searches of mobile phones done at the time of an arrest.

Brown’s veto message abdicated responsibility for protecting the rights of Californians and ignored calls from civil liberties groups and this publication to sign the bill — saying only that the issue is too complicated for him to make a decision about. He cites a recent California Supreme Court decision upholding the warrantless searches of people incident to an arrest. In his brief message, he also doesn’t say whether it’s a good idea or not.

Instead, he says the state Supreme Court’s decision is good enough, a decision the U.S. Supreme Court let stand last week.

“The courts are better suited to resolve the complex and case-specific issues relating to constitutional search-and-seizure protections,” the governor wrote.

Because of that January ruling from the state’s high court, the California Legislature passed legislation to undo it — meaning Brown is taking the side of the Supreme Court’s seven justices instead of the state Legislature. The Assembly approved the bill 70-0 and the state Senate, 32-4.

The bill’s sponsor, Sen. Mark Leno (D-San Francisco), was flummoxed by Brown’s action. “It was a curious veto message suggesting that the courts could resolve this more effectively than the state Legislature,” he said in a telephone interview.

Under California statehouse rules, neither Leno nor any other lawmaker may introduce the legislation for at least a year.

Orin Kerr, one of the nation’s leading Fourth Amendment experts, said Brown should have backed the state’s Legislature. “I think Governor Brown has it exactly backwards. It is very difficult for courts to decide Fourth Amendment cases involving developing technologies like cellphones,” he said.

In 2007, there were 332,000 felony arrests in California alone — a third of which did not result in conviction.

Brown’s veto also shores up support with police unions and the Peace Officers Research Association of California, a police union that opposed the legislation and recently donated $38,900 to Brown’s campaign coffers. “Restricting the authority of a peace officer to search an arrestee unduly restricts their ability to apply the law, fight crime, discover evidence valuable to an investigation and protect the citizens of California,” the association said in a message.

That support would be key if Brown decides to seek a second term.

In the last year alone, at least seven police unions donated more than $12,900 each to Brown. Those unions, including the California Association of Highway Patrolmen and the Sacramento County Deputy Sheriff’s Association, had given Brown more than $160,000 in combined contributions.





 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
the left

Tuesday, June 7, 2011

Federal Government: We can spy on you, even journalists

Just so we are all on the same page.  This did not occur under Bush.  This DID occur under Obama - you remember, the guy who made idiotic claims about Bush abuses and charges against the Attorney General under Bush, and how it would all be different under Obama.  You remember.  Well, it is a bit different.  In order for the abuse to have occured, the Attorney General HAD TO SIGN OFF ON THIS for it to have occured.

How is all that change working out for you, and your civil liberties?





Feds spy on reporter in leak probe

By: Josh Gerstein
Politico
February 24, 2011 11:06 PM EST



Federal investigators trying to find out who leaked information about a CIA attempt to disrupt Iran’s nuclear program obtained a New York Times reporter’s three private credit reports, examined his personal bank records and obtained information about his phone calls and travel, according to a new court filing.

The scope and intrusiveness of the government’s efforts to uncover reporter James Risen’s sources surfaced Thursday in the criminal case of Jeffrey Sterling, a former CIA officer facing federal criminal charges for allegedly disclosing classified information. Sterling is accused of giving Risen details about what Risen describes as the CIA’s plan to give Iran faulty nuclear blueprints, hoping to temporarily thwart the regime’s ambitions to build an atomic bomb.

In a motion filed in federal court in Alexandria, Sterling’s defense lawyers, Ed MacMahon Jr. and Barry Pollack, reveal that the prosecution has turned over “various telephone records showing calls made by the author James Risen. It has provided three credit reports—Equifax, TransUnion and Experian—for Mr. Risen. It has produced Mr. Risen’s credit card and bank records and certain records of his airline travel.”

The revelation alarmed First Amendment advocates, particularly in light of Justice Department rules requiring the attorney general to sign off on subpoenas directed to members of the media and on requests for their phone records. And Risen told POLITICO that the disclosures, while not shocking, made him feel “like a target of spying.”

“We’ve argued that I was a victim of harassment by the government. This seems to bolster that,” Risen said. “Maybe I should ask them what my credit score is.”

Sterling’s attorneys and a Justice Department spokeswoman declined POLITICO’s request for comment.

The government’s interest in Risen’s sources for his 2006 book, “State of War,” has been known since 2008. In particular, investigators have zeroed in on a chapter which details what Risen describes as a botched CIA effort to trip up Iran’s nuclear program. The scheme involved using a Russian defector to deliver the faulty blueprints to the Iranians, but the defector blew the CIA’s plot by alerting the Iranians to the flaws — negating the value of the program, and perhaps even advancing Iran’s nuclear ambitions.

Risen was twice subpoenaed to appear before a grand jury to testify about his sources, but the first grand jury dissolved before a judge acted on Risen’s motion to quash the subpoena. Last year, U.S. District Court Judge Leonie Brinkema sided with Risen and quashed the second subpoena, though details of her reasoning haven’t been made public.

Soon after that decision, Sterling was indicted.

First Amendment advocates said the Justice Department’s use of business records to find out about Risen’s sources was troubling. Those records, they argue, could potentially expose a wide array of Risen’s sources and confidential contacts — information that might fall beyond the initial investigation that led to Sterling’s indictment.

“To me, in many ways, it’s worse than a direct subpoena,” said Jane Kirtley, a University of Minnesota law professor and former director of the Reporters Committee for Freedom of the Press. “Third-party subpoenas are really, really invidious…. Even if it is targeted, even if they’re trying to just look at the relevant stuff, they’re inevitably going to get material that exposes other things.”

Kirtley also said journalists often aren’t notified when the government asks telecom companies, banks or other service providers for their records.

Asked how journalists could credibly complain about such techniques when most also refuse more direct demands for information about their sources, Kirtley said reporters who become the focus of determined investigators face a “Hobson’s choice.”

“It’s the same thing as if the cops go to someone’s office with a search warrant and say, ‘Give us the information we want and we won’t tear the place apart,’” she said. “If you say ‘tear the place apart,’ all kinds of confidential information that you don’t think the police should have is going to end up in their hands.”

Lawyers tracking the case believed that both former Attorney General Michael Mukasey, who was part of the Bush administration, and current Attorney General Eric Holder gave the go-ahead to subpoena Risen. Under Justice Department rules, the attorney general must approve a subpoena for a journalist and grant permission to obtain “telephone toll records of a member of the news media.”

It’s unclear whether the records investigators obtained about Risen’s phone calls came from his billing records or from records of incoming calls to Sterling or others. The Justice Department guidelines for investigations affecting journalists don’t appear to address travel, bank or credit card records.

Risen said the government never notified him that they were seeking his phone records. But he said he got an inkling in 2008 that investigators had collected some information about his calls.

“We heard from several people who had been forced to testify to the grand jury that prosecutors had shown them phone records between me and those people—not the content of calls but the records of calls,” he said. “As a result of what they told us, my lawyers filed a motion with the court as asking how the Justice Department got these phone records and whether or not they had gotten my phone records.”

“We wanted the court to help us decide whether they had abided by the attorney general’s guidelines,” Risen said. “We never got an answer from the court or the government.”

The new defense filings also offer the first official confirmation that Risen’s work was the focus of the investigation that led to the charges against Sterling. In addition to the phone, travel and financial records, Sterling’s defense said the prosecution handed over a copy of the cover of Risen’s book along with receipts and shipping records showing it was sold in Virginia.

While those familiar with the case immediately concluded that Sterling was a source for Risen, the journalist who got classified information from Sterling was referred to simply as “Author A” in the indictment, and was not named. Justice Department policy generally bars naming unindicted individuals in an indictment.

From 2004 to 2006, the New York Times fought a court battle to keep federal prosecutor Patrick Fitzgerald from obtaining the telephone records of Times reporters Judith Miller and Philip Shenon. Fitzgerald wanted the information to help find out who leaked information that tipped off Islamic charities about federal raids on their offices.

A district judge ruled in the Times’ favor, but a federal appellate court overturned that decision. Fitzgerald ultimately obtained the records when the Supreme Court declined to step in; no one was ever charged for the leak.

Sterling’s indictment suggests that Risen urged the Times to publish details about the CIA’s attempt to stop Iran’s nuclear program, but Times editors declined after senior U.S. government officials warned that the disclosure could harm national security and endanger the life of the Russian intermediary. The information later appeared in Risen’s book.

The new details about the FBI’s investigation of Risen came in a motion that called on the government to provide more details about what specific information Sterling allegedly disclosed. Sterling's lawyers also filed a series of other motions challenging several counts of the indictment as duplicative. Some also sought to punish Sterling for acts he did not commit, such as Risen’s publication of the book, the defense argued.





 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
obama

Sunday, January 23, 2011

Dutch Children: Someone is watching them and it isn't Bush

Dutch to Open Electronic Files on Children

Associated Press

September 14 2005


AMSTERDAM, Netherlands - The Dutch government plans to open an electronic file on every child at birth as a tool to spot and protect the troubled kids of the future.

Beginning Jan. 1, 2007, all citizens will be tracked from cradle to grave in a single database — including health, education, family and police records — the health ministry said Tuesday.

As a privacy safeguard, no single person or agency will be able to access all contents of a file. But organizations can raise "red flags" in the dossier to caution other agencies about problems, ministry spokesman Jan Brouwer said.

The intention is to protect troubled children, Brouwer said. Until now, schools and police have been unable to communicate with each other about truancy records and criminality, which are often linked.

"Child protection services will say, 'Hey, there's a warning flag from the police. There's another one from school. There's another one from the doctor," Brouwer said. "Something must be going on and it's time to call the parents in for a meeting."

Every child will get a Citizens Service Number, making it easier to keep track of children with problems even when their families move, said Secretary of Health Clemence Ross.

"Safety, guidance, education and supervision are incredibly important for the development of children," Ross said.

All Dutch births are currently registered with local authorities.














Dutch

Children get electronic ID cards - Big Government Watches Over You (not Bush though)

Children to be given electronic identity cards



Electronic identity cards for all children under 12 are to be introduced in Belgium. They will bear a code designed to allow parents of missing children to be traced instantly.

The Telegraph Group Limited
Published: 00:00 June 25, 2006
The Gulf News

Brussels: Electronic identity cards for all children under 12 are to be introduced in Belgium. They will bear a code designed to allow parents of missing children to be traced instantly.

The announcement came as Belgian police continued to search for two young girls who vanished from the street outside a bar in the middle of the night a fortnight ago.

Though the ID cards would be useless in protecting children from an abductor or adult determined to do them harm, they are intended to offer a secure way of making sure a lost child can be reunited with family.

Belgians have been greatly sensitive to issues of missing children since the case a decade ago of Marc Dutroux, a paedophile rapist and killer who kidnapped six children, killing four of them, before being caught.

The new children's cards will carry a special code number and instructions on how to call a central missing child hotline.

 
[So these cards cannot help in tracking down the girls who went missing (and were found some time later dead - they had been raped and strangled) but lets give every child a card and number to feel safer.]
 
 
 
 





 
 
 
 
privacy

Are you being tracked? (and again, Bush is nowhere to be found)

Is RFID tracking you?



July 10, 2006
By Daniel Sieberg CNN



Radio frequency identification has been heralded as a breakthrough in tracking technology, and denounced as the next Big Brother surveillance tool.

RFID sounds futuristic: A transmitter smaller than a dime embedded in everything from a T-shirt to human skin, communicating data over a short distance to a reading device.

The technology has been around for decades -- the British used it to identify aircraft as friend or foe during World War II, and factory warehouses have used it more recently to make shipping more efficient.

So why is it getting so much attention now? The short answer is that RFID has moved into more common corners of society.

Today, it can be used to identify missing pets, monitor vehicle traffic, track livestock to help prevent disease outbreaks, and follow pharmaceuticals to fight counterfeit drugs. Many of us start our cars using RFID chips embedded in the ignition key.

RFID chips, injected under the skin, can store a medical history or be used to control access to secure areas. The next generation of passports and credit cards are hotbeds for RFID. It could make bar codes obsolete.

However, hackers and analysts are exposing potentially serious problems. Hackers could disable a car's RFID anti-theft feature, swap a product's price for a lower one, or copy medical information from an RFID chip.

"The dark side of RFID is surreptitious access," said Bruce Schneier, a security expert with Counterpane Internet Security Inc.

"When RFID chips are embedded in your ID cards, your clothes, your possessions, you are effectively broadcasting who you are to anyone within range," he said. "The level of surveillance possible, not only by the government but by corporations and criminals as well, will be unprecedented. There simply will be no place to hide."

But Mark Roberti, editor of RFID Journal, a trade publication that claims independence from the RFID industry, said the long-term convenience and cost-savings outweighs the potential pitfalls.

"Technology is neither good nor evil," Roberti wrote in an e-mail responding to questions from CNN. "Technology is a tool. All technologies can be used in positive or negative ways.

"The Internet is a great boon to businesses and consumers, but some use it [unscrupulously]. RFID is no different. It will be bring tremendous benefits to consumers and businesses. The key is to find ways to maximize the benefits and try to limit any potential abuses."

Most RFID chips or tags are passive, meaning they contain no battery power and can transmit data only when zapped with a reader. Active tags, which are more expensive, can carry some battery power.

Prices for the chips can range from several cents to a couple of dollars apiece, depending on the application and whether they are ordered in bulk. The cost has limited RFID's appeal. To compete with barcodes, RFID chips need to be priced at under a penny each. The cost is gradually coming down, though.

The storage space is extremely small, typically about 2KB, and the data on the tags can be read by equipment from a few inches to several feet away -- and sometimes a bit farther.

A group of hackers at the 2005 DefCon technology convention in Las Vegas, Nevada, used an antenna attached to an RFID reader to scan the information on a tag nearly 70 feet away. RFID proponents downplayed the demonstration, saying the apparatus was impractical and wouldn't work if the information on the RFID tag were encrypted, which is more often the case.

"The kind of RFID that is becoming widely used has no power source, and can send information over tens of feet. Compared to, say, a cell phone, which transmits personal identity and location information for miles, RFID's potential for misuse and abuse is quite trivial," Kevin Ashton, vice president at ThingMagic LLC, a manufacturer of RFID readers, wrote in an e-mail responding to CNN's questions.

"That said, companies that make and use RFID have a responsibility to make sure the technology is developed and adopted in ways that make it secure and useful."

That responsibility was recently addressed by a best-practices manifesto composed by the RFID industry. Participating companies included Microsoft, IBM, Intel, Visa U.S.A. and Proctor & Gamble.

The manifesto is meant to assuage consumer fears about how data could be collected, shared and stored. Key parts of the document include an agreement to notify consumers about RFID data collection and give them a choice when it comes to gathering personal information. But the manifesto doesn't suggest any penalties for not complying, and the onus would likely fall to the Federal Trade Commission to investigate any claims of harm or wrongdoing.

"Credit card companies have huge incentives to secure the transaction: They need to avoid customer complaints, counterfeiting and billing disputes, so it seems reasonable to assume high levels of security will have to be built in before such a system would be widely accepted," wrote ThingMagic's Ashton.

A company in Cincinnati, Ohio, recently delved into new territory with RFID tags by chipping its employees.

CityWatcher.com provides video surveillance for clients and police. The information it collects is the company's biggest asset and needs to be kept in a room that has more security than a lock and key, CEO Sean Darks said. The answer was an electronic lock, and the company has given its handful of employees the option of using an electronic key or getting an RFID chip implanted in their arm.

"It can't be read, it can't be tracked, it doesn't have GPS," Darks said. "It doesn't emit a signal, I do not know where my employees are unless I call them on a cell phone -- your cell phone has more GPS capability than an RFID chip does."

VeriChip Corp. is a Florida-based company that makes the government-approved, human-implantable RFID chips. A certified doctor injects the chip, which is about the size of a grain of rice.

If done for medical reasons, the RFID chip would contain a random 16-character string of numbers or letters connected to that person's medical chart. That way, in an emergency, doctors could access a patient's history even if the patient was incapable of communicating. But the technology is not available at all hospitals, and not every doctor knows to look for the implanted chips.

A few CityWatcher.com employees opted not to have the procedure done, saying the whole idea makes them nervous. They were given a key chain that contained an RFID chip. Regardless, Darks says the idea helps maintain security in the building -- and he sees some humor in the situation.

"What we like to say at CityWatcher is it helps with employee retention, because employees don't like to leave their arm if they leave the company," he said.

But this human-implant trend worries privacy advocates like Marc Rotenberg with the Electronic Privacy Information Center.

"A lot of these technologies have very useful applications," he said. "They can help large companies keep track of products, which is why companies such as Wal-Mart use RFID chips in their inventory management system. A lot of pet owners are using chips to keep track of their animals if they're lost.

"But it really seems to cross a line when technology that's used for inventory management or keeping track of pets is then placed in human beings," Rotenberg added. "And that raises ethical issues and privacy issues and probably some legal issues. I think people are going to be concerned about who uses the chip and who has access to it."

Despite these concerns, others say there are huge benefits to using RFID.

"At least 30 million people carry an RFID tag on them every day in their car keys or in their access control card to get into their office building or to buy gas or to pay a toll," wrote RFID Journal's Roberti. "Everywhere RFID has been rolled out in the consumer environment, consumers have overwhelmingly embraced it."

One new consumer application is in credit cards. Consumers could simply wave a credit card containing a passive chip at an RFID reader to pay for their purchases.

While there is concern that hackers could remotely read the card information, supporters argue it would be easier for merchants, and the speed of the processing time could shave off more than a dozen seconds per transaction, which would add up. They also say transactions would be no more or less secure than they are today.

"That is, if you buy stuff today with a credit card, that information is stored in a database," Roberti wrote. "When or if RFID is used to record sales, data will go in a database, the same one in fact. If the government wants access to the RFID data or the bar code data, it's essentially the same thing."

The controversy and discussion about RFID technology will not end anytime soon. But both sides agree that a sizable dose of debate is needed to hammer out the kinks. Meanwhile, the technology is appearing in an increasing number of places -- though even if you look around, you still might miss it.
















i spy

Color Printer? The Government is Tracking You (and Bush isn't around to blame)

Government Uses Color Laser Printer Technology to Track Documents


Practice embeds hidden, traceable data in every printed page.



By Jason Tuohey, PCWorld Nov 22, 2004 1:00 am


WASHINGTON--Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printed there that could be used to trace the document back to you.

According to experts, several printer companies quietly encode the serial number and the manufacturing code of their color laser printers and color copiers on every document those machines produce. Governments, including the United States, already use the hidden markings to track counterfeiters.

Peter Crean, a senior research fellow at Xerox, says his company's laser printers, copiers and multifunction workstations, such as its WorkCentre Pro series, put the "serial number of each machine coded in little yellow dots" in every printout. The millimeter-sized dots appear about every inch on a page, nestled within the printed words and margins.

"It's a trail back to you, like a license plate," Crean says.

The dots' minuscule size, covering less than one-thousandth of the page, along with their color combination of yellow on white, makes them invisible to the naked eye, Crean says. One way to determine if your color laser is applying this tracking process is to shine a blue LED light--say, from a keychain laser flashlight--on your page and use a magnifier.

Crime Fighting vs. Privacy

Laser-printing technology makes it incredibly easy to counterfeit money and documents, and Crean says the dots, in use in some printers for decades, allow law enforcement to identify and track down counterfeiters.

However, they could also be employed to track a document back to any person or business that printed it. Although the technology has existed for a long time, printer companies have not been required to notify customers of the feature.

Lorelei Pagano, a counterfeiting specialist with the U.S. Secret Service, stresses that the government uses the embedded serial numbers only when alerted to a forgery. "The only time any information is gained from these documents is purely in [the case of] a criminal act," she says.

John Morris, a lawyer for The Center for Democracy and Technology , says, "That type of assurance doesn't really assure me at all, unless there's some type of statute." He adds, "At a bare minimum, there needs to be a notice to consumers."

If the practice disturbs you, don't bother trying to disable the encoding mechanism--you'll probably just break your printer.

Crean describes the device as a chip located "way in the machine, right near the laser" that embeds the dots when the document "is about 20 billionths of a second" from printing.

"Standard mischief won't get you around it," Crean adds.

Neither Crean nor Pagano has an estimate of how many laser printers, copiers, and multifunction devices track documents, but they say that the practice is commonplace among major printer companies.

"The industry absolutely has been extraordinarily helpful [to law enforcement]," Pagano says.

According to Pagano, counterfeiting cases are brought to the Secret Service, which checks the documents, determines the brand and serial number of the printer, and contacts the company. Some, like Xerox, have a customer database, and they share the information with the government.

Crean says Xerox and the government have a good relationship. "The U.S. government had been on board all along--they would actually come out to our labs," Crean says.

History

Unlike ink jet printers, laser printers, fax machines, and copiers fire a laser through a mirror and series of lenses to embed the document or image on a page. Such devices range from a little over $100 to more than $1000, and are designed for both home and office.

Crean says Xerox pioneered this technology about 20 years ago, to assuage fears that their color copiers could easily be used to counterfeit bills.

"We developed the first (encoding mechanism) in house because several countries had expressed concern about allowing us to sell the printers in their country," Crean says.

Since then, he says, many other companies have adopted the practice.

The United States is not the only country teaming with private industry to fight counterfeiters. A recent article points to the Dutch government as using similar anticounterfeiting methods, and cites Canon as a company with encoding technology. Canon USA declined to comment.
























i spy, on you.

Saturday, January 22, 2011

Google and Big Brother: Makes CIA and KGB look like children

Google 'will be able to keep tabs on us all'


Alexi Mostrous and Rob Evans
The Guardian, Friday 3 November 2006

The internet will hold so much digital data in five years that it will be possible to find out what an individual was doing at a specific time and place, an expert said yesterday.

Nigel Gilbert, a professor heading a Royal Academy of Engineering study into surveillance, said people would be able to sit down and type into Google "what was a particular individual doing at 2.30 yesterday and would get an answer".

The answer would come from a range of data, for instance video recordings or databanks which store readings from electronic chips. Such chips embedded in people's clothes could track their movements. He told a privacy conference the internet would be capable of holding huge amounts of data very cheaply and patterns of information could be extracted very quickly. "Everything can be recorded for ever," he said.

He was speaking at a conference at which a report commissioned by Richard Thomas, the privacy watchdog, was launched. Mr Thomas has said Britain is "waking up to a surveillance society that is all around us" and that such "pervasive" surveillance is likely to spread.

Sir Stephen Lander, the head of the Serious Organised Crime Agency (Soca) and former head of MI5, defended surveillance by the government.

"Significant intrusion into the privacy of a small minority is justified to protect the safety and wellbeing of the majority," he said.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
privacy

Wireless World (and Bush isn't anywhere in sight)

Wireless World: Chips track license plates




Aug 12, 2005
Technology
UPI

A controversial plan to embed radio frequency identification chips in license plates in the United Kingdom also may be coming to the United States, experts told UPI's Wireless World.

The so-called e-Plate, developed by the British firm Hills Numberplates, is a license plate that also transmits a vehicle's unique identification via encryption that can be read by a small detector, whose output can be used locally or communicated to a distant host.

"RFID is all the rage these days," said Bradley Gross, chairman of Becker & Poliakoff, a law firm in Ft. Lauderdale, Fla., "but my fear is that this use of the technology is tracking at its worst."

The reason for the concern in the legal and privacy-rights communities is that e-plates may expand the ability of police to track individuals by the movement of their vehicles.

A single RFID reader can identify dozens of vehicles fitted with e-plates moving at any speed at a distance of about 100 yards. The e-plate looks just like a standard plate, but it contains an embedded chip that cannot be seen or removed. It is self-powered with a battery life of up to 10 years.

"Police will be able to track your every move when you drive," said Liz McIntyre, an RFID expert and author of the forthcoming book, "Spychips: How Major Corporations and the Government Plan to Track Your Every Move With RFID" (Nelson Current, October 2005). "What if they put these readers at a mosque? They could tell who was inside at a worship service by which cars were in the parking lot."

Indeed, the makers of the technology boast that the e-plates can furnish access control, automated tolling, asset tracking, traffic-flow monitoring and vehicle crime and "non-compliance." The chips can be outfitted with 128 bit encryption to prevent hacking.

The problem is people other than the vehicle's owner quite often are at the wheel.

"Will this, ultimately, stop terrorism?" Gross asked. "The occupants of cars change continuously. Terrorists can steal cars."

Similar technology already has been used in the United States, experts said.

"The technology side of this is readily available, as it is used in the high-frequency battery-powered transmitters in the toll road systems like Fastrak," said attorney Dave Abel, with the international law firm Squire, Sanders & Dempsey LLP, who was an engineer before coming to the bar. "To use the toll road, a user signs up -- providing name, address, billing info, et cetera, which is stored in a database. Each time they drive past the reader station they are billed or a credit is deducted from an account."

Security access points could justify the expense, but placing them even at key intersections may not be very practical, according to lawyers at Pittiglio, Rabin, Todd & McGrath in Costa Mesa, Calif., a spokeswoman said.

The cost of roadside readers is significant -- although the price per chip is estimated to be only 20 cents.

Some experts said governments already are using the chips embedded in tollway access cards without heed to privacy rights. In Texas, for example, tollway authorities have been "making printouts of the records of every time you pass through a toll booth, what time you passed through," McIntyre said. "The government hasn't established a privacy policy for this, and people are not being informed that they are doing this. This is an instance of Big Brother on the highway."



 

 
 
 
 
 
 
 
privacy

Sunday, November 14, 2010

TSA and their unproductive, violative, idiotic, unjust, dubious actions

This guys story is well worth the time.  Can I not fly - I really really want to go somewhere during Christmas break and in summer, but will make do, here.  They win - I won't fly.  The airlines will lose money, they will ask the federal government for bailout, the government will be hard pressed to explain why they paid for machines that resulted in the airlines losing money they had to give them to keep them from failing. 

All because of intransigent fools who are placed in charge of agencies they are wholly unqualified to head.

While we are at it, abolish the TSA.  Incompetents, many of whom arrived here from a small country far away or a big country just as far away, some are illegals, and others just not the brightest bunch - abolish the TSA, save us all money and do away with this insane screening process.  Use a method that is very nearly full-proof - and it isn't an x-ray machine.


The Story  <-- link and the body (minus the videos is below)



These events took place roughly between 5:30 and 6:30 AM, November 13th in Terminal 2 of the San Diego International Airport. I'm writing this approximately 2 1/2 hours after the events transpired, and they are correct to the best of my recollection. I will admit to being particularly fuzzy on the exact order of events when dealing with the agents after getting my ticket refunded; however, all of the events described did occur.



I had my phone recording audio and video of much of these events. It can be viewed below.


Please spread this story as far and wide as possible. I will make no claims to copyright or otherwise.]


This morning, I tried to fly out of San Diego International Airport but was refused by the TSA. I had been somewhat prepared for this eventuality. I have been reading about the millimeter wave and backscatter x-ray machines and the possible harm to health as well as the vivid pictures they create of people's naked bodies. Not wanting to go through them, I had done my research on the TSA's website prior to traveling to see if SAN had them. From all indications, they did not. When I arrived at the security line, I found that the TSA's website was out of date. SAN does in fact utilize backscatter x-ray machines.


I made my way through the line toward the first line of "defense": the TSA ID checker. This agent looked over my boarding pass, looked over my ID, looked at me and then back at my ID. After that, he waved me through. SAN is still operating metal detectors, so I walked over to one of the lines for them. After removing my shoes and making my way toward the metal detector, the person in front of me in line was pulled out to go through the backscatter machine. After asking what it was and being told, he opted out. This left the machine free, and before I could go through the metal detector, I was pulled out of line to go through the backscatter machine. When asked, I half-chuckled and said, "I don't think so." At this point, I was informed that I would be subject to a pat down, and I waited for another agent.


A male agent (it was a female who had directed me to the backscatter machine in the first place), came and waited for me to get my bags and then directed me over to the far corner of the area for screening. After setting my things on a table, he turned to me and began to explain that he was going to do a "standard" pat down. (I thought to myself, "great, not one of those gropings like I've been reading about".) After he described, the pat down, I realized that he intended to touch my groin. After he finished his description but before he started the pat down, I looked him straight in the eye and said, "if you touch my junk, I'll have you arrested." He, a bit taken aback, informed me that he would have to involve his supervisor because of my comment.


We both stood there for no more than probably two minutes before a female TSA agent (apparently, the supervisor) arrived. She described to me that because I had opted out of the backscatter screening, I would now be patted down, and that involved running hands up the inside of my legs until they felt my groin. I stated that I would not allow myself to be subject to a molestation as a condition of getting on my flight. The supervisor informed me that it was a standard administrative security check and that they were authorized to do it. I repeated that I felt what they were doing was a sexual assault, and that if they were anyone but the government, the act would be illegal. I believe that I was then informed that if I did not submit to the inspection, I would not be getting on my flight. I again stated that I thought the search was illegal. I told her that I would be willing to submit to a walk through the metal detector as over 80% of the rest of the people were doing, but I would not be groped. The supervisor, then offered to go get her supervisor.


I took a seat in a tiny metal chair next to the table with my belongings and waited. While waiting, I asked the original agent (who was supposed to do the pat down) if he had many people opt out to which he replied, none (or almost none, I don't remember exactly). He said that I gave up a lot of rights when I bought my ticket. I replied that the government took them away after September 11th. There was silence until the next supervisor arrived. A few minutes later, the female agent/supervisor arrived with a man in a suit (not a uniform). He gave me a business card identifying him as David Silva, Transportation Security Manager, San Diego International Airport. At this point, more TSA agents as well as what I assume was a local police officer arrived on the scene and surrounded the area where I was being detained. The female supervisor explained the situation to Mr. Silva. After some quick back and forth (that I didn't understand/hear), I could overhear Mr. Silva say something to the effect of, "then escort him from the airport." I again offered to submit to the metal detector, and my father-in-law, who was near by also tried to plead for some reasonableness on the TSA's part.


The female supervisor took my ID at this point and began taking some kind of report with which I cooperated. Once she had finished, I asked if I could put my shoes back on. I was allowed to put my shoes back on and gather my belongs. I asked, "are we done here" (it was clear at this point that I was going to be escorted out), and the local police officer said, "follow me". I followed him around the side of the screening area and back out to the ticketing area. I said apologized to him for the hassle, to which he replied that it was not a problem.


I made my way over to the American Airlines counter, explained the situation, and asked if my ticket could be refunded. The woman behind the counter furiously typed away for about 30 seconds before letting me know that she would need a supervisor. She went to the other end of the counter. When she returned, she informed me that the ticket was non-refundable, but that she was still trying to find a supervisor. After a few more minutes, she was able to refund my ticket. I told her that I had previously had a bad experience with American Airlines and had sworn never to fly with them again (I rationalized this trip since my father-in-law had paid for the ticket), but that after her helpfulness, I would once again be willing to use their carrier again.


At this point, I thought it was all over. I began to make my way to the stairs to exit the airport, when I was approached by another man in slacks and a sport coat. He was accompanied by the officer that had escorted me to the ticketing area and Mr. Silva. He informed me that I could not leave the airport. He said that once I start the screening in the secure area, I could not leave until it was completed. Having left the area, he stated, I would be subject to a civil suit and a $10,000 fine. I asked him if he was also going to fine the 6 TSA agents and the local police officer who escorted me from the secure area. After all, I did exactly what I was told. He said that they didn't know the rules, and that he would deal with them later. They would not be subject to civil penalties. I then pointed to Mr. Silva and asked if he would be subject to any penalties. He is the agents' supervisor, and he directed them to escort me out. The man informed me that Mr. Silva was new and he would not be subject to penalties, either. He again asserted the necessity that I return to the screening area. When I asked why, he explained that I may have an incendiary device and whether or not that was true needed to be determined. I told him that I would submit to a walk through the metal detector, but that was it; I would not be groped. He told me that their procedures are on their website, and therefore, I was fully informed before I entered the airport; I had implicitly agreed to whatever screening they deemed appropriate. I told him that San Diego was not listed on the TSA's website as an airport using Advanced Imaging Technology, and I believed that I would only be subject to the metal detector. He replied that he was not a webmaster, and I asked then why he was referring me to the TSA's website if he didn't know anything about it. I again refused to re-enter the screening area.


The man asked me to stay put while he walked off to confer with the officer and Mr. Silva. They went about 20 feet away and began talking amongst themselves while I waited. I couldn't over hear anything, but I got the impression that the police officer was recounting his version of the events that had transpired in the screening area (my initial refusal to be patted down). After a few minutes, I asked loudly across the distance if I was free to leave. The man dismissively held up a finger and said, "hold on". I waited. After another minute or so, he returned and asked for my name. I asked why he needed it, and reminded him that the female supervisor/agent had already taken a report. He said that he was trying to be friendly and help me out. I asked to what end. He reminded me that I could be sued civilly and face a $10,000 fine and that my cooperation could help mitigate the penalties I was facing. I replied that he already had my information in the report that was taken and I asked if I was free to leave. I reminded him that he was now illegally detaining me and that I would not be subject to screening as a condition of leaving the airport. He told me that he was only trying to help (I should note that his demeanor never suggested that he was trying to help. I was clearly being interrogated.), and that no one was forcing me to stay. I asked if tried to leave if he would have the officer arrest me. He again said that no one was forcing me to stay. I looked him in the eye, and said, "then I'm leaving". He replied, "then we'll bring a civil suit against you", to which I said, "you bring that suit" and walked out of the airport.






 
 
 
 
 
 
 
 
 
 
 
TSA

Losers: Democrats and Republicans and Body Scanners

I will end up on a no fly list for the following.  Sad I even make a joke like that.  30 years ago such a thought would have been very difficult to conceive of, let alone think ...

Dear Big Sister / Brother:
These scanners WILL NOT prevent an attack.  These scanners ARE NOT making us safer.  Anyone who believes they are is an idiot and a fool.  What they will catch are petty little people who are incredibly bigger fools than those twits who think the scanners will save us from anything.

Al Qaida are not stupid.  They are actually very bright.  The shoe and underwear guy are their throw-away test cases, as were the UPS bombs.  They are testing the walls, prodding for weakness, and testing what will and will not be discovered. 

And the funny part - DHS, CIA - they know the body scanners will not stop the next wave of successful attacks.  Yet they allow this joke to continue because it looks like we are doing something.   Mr. Obama, you are so concerned about the rights of killers in Guantanamo and violation of their rights ... yet Americans who have done nothing wrong, are being treated like terrorists - and you are quiet about our privacy and civil rights.

Why will the scanner not stop them .... hmmm .... should I say?  Why not - DHS and CIA know, al qaida knows, why is it only we, the people are not supposed to know.  Funny this whole protecting thing.  

They will consume something, just like they feared in the beginning, only now - it will come to pass.  The martyr or cold-blooded killer, will have the weapon inserted into his or her body.  This will work best through swallowing the thing and as the acid in the stomach dissolves it, the 2nd part is added, combined with the acidic stomach fluids, ignites whatever they want to ignite.  This could not be done on transatlantic flights with any intention of waiting until the plane gets over US territory (9-12 hours for that and nothing will take 9 hours to dissolve in the stomach).  Rather, these killers get on in European countries, a plane bound for the US, perhaps just another European capital.  The detonation will go off 1 hr later, meanwhile in the US, a dozen franchise members board planes that will all leave about the same time and will explode over US cities all within 1.5 hrs.

How will we combat these murderers with a full body scanner?  Won't and can't.  So they will resort to non-technological ... no one will be allowed to bring any medicine or pills with them into the cabin - pockets will be checked - by hand.  You will also have to be at the airport 2 hrs before and in the waiting area, to ensure you haven't consumed anything that may blow up, they will keep everyone segregated for 1.5-2 hours before every flight plus the pat down for everyone (I can't think of any other way of determining whether you have any pills - although they could sew them into their clothing couldn't they).  In the end, I don't know what the answer is, but full-body scanners are not the answer.

The Republicans and Democrats who are responsible for this mess need to face the wrath of the people.






'Naked scanners': Lobbyists join the war on terror

By: Timothy P. Carney
Senior Examiner Columnist
November 12, 2010

The degradations of passing through full-body scanners that provide naked pictures of you to Transportation Security Administration agents may not mean that the terrorists have won -- but they do mark victories for a few politically connected high-tech companies and their revolving-door lobbyists.

Many experts and critics suspect that the full-body "naked scanners" recently deployed at U.S. airports do little to make us more secure, and a lot to make us angry, embarrassed and late. For instance, the scanners can't see through skin, and so weapons or explosives can be hidden safely in body cavities.

But this is government we're talking about. A program or product doesn't need to be effective, it only needs to have a good lobby. And the naked-scanner lobby is small but well-connected.

If you've seen one of these scanners at an airport, there's a good chance it was made by L-3 Communications, a major contractor with the Department of Homeland Security. L-3 employs three different lobbying firms including Park Strategies, where former Sen. Al D'Amato, R-N.Y., plumps on the company's behalf. Back in 1989, President George H.W. Bush appointed D'Amato to the President's Commission on Aviation Security and Terrorism following the bombing of Pan Am Flight 103. Also on Park's L-3 account is former Appropriations staffer Kraig Siracuse.

The scanner contract, issued four days after the Christmas Day bomb attempt last year, is worth $165 million to L-3.

Rapiscan got the other naked-scanner contract from the TSA, worth $173 million. Rapiscan's lobbyists include Susan Carr, a former senior legislative aide to Rep. David Price, D-N.C., chairman of the Homeland Security Subcommittee. When Defense Daily reported on Price's appropriations bill last winter, the publication noted "Price likes the budget for its emphasis on filling gaps in aviation security, in particular the whole body imaging systems."

An early TSA contractor for full-body scanners was the American Science and Engineering company. AS&E's lobbying team is impressive, including Tom Blank, a former deputy administrator for the TSA. Fellow AS&E lobbyist Chad Wolf was an assistant administrator at TSA and an aide to Sen. Kay Bailey Hutchison, who sits on the Transportation and Defense subcommittees of Appropriations. Finally, Democratic former Rep. Bud Cramer is also an AS&E lobbyist -- he sat on the Defense and Transportation subcommittees of the Appropriations Committee.

The full-body scanners have caused an understandable uproar. Even before the devices were rolled out, they sparked predictable mischief: During training on the scanners, a group of TSA workers noted and mocked the genitalia of the guinea-pig employee sent through the scanner. The guy soon beat down one of his mockers and was arrested for assault.

After assurances by contractors and the TSA that the nude images of the scanners' subjects weren't being stored and saved, the U.S. Marshals Service admitted that it had stored thousands of such images.

Homeland Security insists that the "naked scans" are optional, but if you're randomly selected for one and you "opt out," you're subject to a very intimate frisk.

There's good reason to doubt these scanners significantly reduce the chance of a successful terrorist attack on an airplane. Deploying these naked scanners was a reaction to Umar Farouk Abdulmutallab's failed attempt to blow up a plane on Christmas 2009, but the Government Accountability Office found, "it remains unclear whether [the scanners] would have been able to detect the weapon Mr. Abdulmutallab used."

But there's a deeper question to ask: how far are we willing to go to prevent weapons or bombs from getting on airplanes? In the past decade, terrorists on airplanes have killed just about 3,000 people -- all on one day. Even if the Christmas Day bomber had succeeded, the number would be under 3,500.

Those are horrible deaths. But in that same period, more than 150,000 people have been murdered in the United States. We haven't put the entire U.S. on lockdown -- or even murder capitals like Detroit, New Orleans and Baltimore.

While reducing the murder rate to zero is very desirable, we also understand that the costs, in terms of liberty and resources, are too great. But when it comes to air travel, 9/11 seems to have stripped away our ability to put things in perspective.

Politicians feed into that paranoia with their rhetoric. And lobbyists and government contractors feed on the paranoia.













protecting us at what cost

Wednesday, September 22, 2010

OBAMA ADMINISTRATION: Privacy in Public, DOES NOT Exist

Hey - start marching against Obama and his usurpation of your civil liberties.  if not, you have no right to ever protest a Republican president when he once again, infringes upon the civil liberties of some people living in the US.  You will have lost all credibility among all sentient beings.




Feds: Privacy Does Not Exist in ‘Public Places’




By David Kravets September 21, 2010
3:29 pm
WIRED





The Obama administration has urged a federal appeals court to allow the government, without a court warrant, to affix GPS devices on suspects’ vehicles to track their every move.

The Justice Department is demanding a federal appeals court rehear a case in which it reversed the conviction and life sentence of a cocaine dealer whose vehicle was tracked via GPS for a month, without a court warrant. The authorities then obtained warrants to search and find drugs in the locations where defendant Antoine Jones had travelled.

The administration, in urging the full U.S. Court of Appeals for the District of Columbia to reverse a three-judge panel’s August ruling from the same court, said Monday that Americans should expect no privacy while in public.

“The panel’s conclusion that Jones had a reasonable expectation of privacy in the public movements of his Jeep rested on the premise that an individual has a reasonable expectation of privacy in the totality of his or her movements in public places, ” Assistant U.S. Attorney Peter Smith wrote the court in a petition for rehearing.

The case is an important test of privacy rights as GPS devices have become a common tool in crime fighting, and can be affixed to moving vehicles by an officer shooting a dart. Three other circuit courts have already said the authorities do not need a warrant for GPS vehicle tracking, Smith pointed out.

The circuit’s ruling means that, in the District of Columbia area, the authorities need a warrant to install a GPS-tracking device on a vehicle. But in much of the United States, including the West, a warrant is not required. Unless the circuit changes it mind, only the Supreme Court can mandate a uniform rule.

The government said the appellate panel’s August decision is “vague and unworkable” and undermines a law enforcement practice used “with great frequency.”

The legal dispute centers on a 1983 U.S. Supreme Court decision concerning a tracking beacon affixed to a container, without a court warrant, to follow a motorist to a secluded cabin. The appeals court said that decision did not apply to today’s GPS monitoring of a suspect, which lasted a month.

The beacon tracked a person, “from one place to another,” whereas the GPS device monitored Jones’ “movements 24 hours a day for 28 days.”

The government argued Monday that the appellate court’s decision “offers no guidance as to when monitoring becomes so efficient or ‘prolonged’ as to constitute a search triggering the requirements of the Fourth Amendment.”

The appeals court ruled the case “illustrates how the sequence of a person’s movements may reveal more than the individual movements of which it is composed.”

The court said that a person “who knows all of another’s travels can deduce whether he is a weekly churchgoer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups — and not just one such fact about a person, but all such facts.”

















obama administration

Wednesday, August 25, 2010

The Government can .... do anything it wants.

Some times I wonder.  Liberals have always made it clear, unlike the foolish right, what Bush was doing to our civil liberties and to us ... unlike the left who were passionately opposed to such infringements. 

I can only imagine what it would have been like if Bush was still in charge, given how quickly the left is erasing all our civil liberties (not erased by Bush).




The Government's New Right to Track Your Every Move With GPS


By ADAM COHEN
Time
August 25, 2010



Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway - and no reasonable expectation that the government isn't tracking your movements.

That is the bizarre - and scary - rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants - with no need for a search warrant. (Read about one man's efforts to escape the surveillance state.)

It is a dangerous decision - one that, as the dissenting judges warned, could turn America into the sort of totalitarian state imagined by George Orwell. It is particularly offensive because the judges added insult to injury with some shocking class bias: the little personal privacy that still exists, the court suggested, should belong mainly to the rich.

This case began in 2007, when Drug Enforcement Administration (DEA) agents decided to monitor Juan Pineda-Moreno, an Oregon resident who they suspected was growing marijuana. They snuck onto his property in the middle of the night and found his Jeep in his driveway, a few feet from his trailer home. Then they attached a GPS tracking device to the vehicle's underside.

After Pineda-Moreno challenged the DEA's actions, a three-judge panel of the Ninth Circuit ruled in January that it was all perfectly legal. More disturbingly, a larger group of judges on the circuit, who were subsequently asked to reconsider the ruling, decided this month to let it stand. (Pineda-Moreno has pleaded guilty conditionally to conspiracy to manufacture marijuana and manufacturing marijuana while appealing the denial of his motion to suppress evidence obtained with the help of GPS.)

In fact, the government violated Pineda-Moreno's privacy rights in two different ways. For starters, the invasion of his driveway was wrong. The courts have long held that people have a reasonable expectation of privacy in their homes and in the "curtilage," a fancy legal term for the area around the home. The government's intrusion on property just a few feet away was clearly in this zone of privacy.

The judges veered into offensiveness when they explained why Pineda-Moreno's driveway was not private. It was open to strangers, they said, such as delivery people and neighborhood children, who could wander across it uninvited. (See the misadventures of the CIA.)

Chief Judge Alex Kozinski, who dissented from this month's decision refusing to reconsider the case, pointed out whose homes are not open to strangers: rich people's. The court's ruling, he said, means that people who protect their homes with electric gates, fences and security booths have a large protected zone of privacy around their homes. People who cannot afford such barriers have to put up with the government sneaking around at night.

Judge Kozinski is a leading conservative, appointed by President Ronald Reagan, but in his dissent he came across as a raging liberal. "There's been much talk about diversity on the bench, but there's one kind of diversity that doesn't exist," he wrote. "No truly poor people are appointed as federal judges, or as state judges for that matter." The judges in the majority, he charged, were guilty of "cultural elitism."

The court went on to make a second terrible decision about privacy: that once a GPS device has been planted, the government is free to use it to track people without getting a warrant. There is a major battle under way in the federal and state courts over this issue, and the stakes are high. After all, if government agents can track people with secretly planted GPS devices virtually anytime they want, without having to go to a court for a warrant, we are one step closer to a classic police state - with technology taking on the role of the KGB or the East German Stasi.

Fortunately, other courts are coming to a different conclusion from the Ninth Circuit's - including the influential U.S. Court of Appeals for the District of Columbia Circuit. That court ruled, also this month, that tracking for an extended period of time with GPS is an invasion of privacy that requires a warrant. The issue is likely to end up in the Supreme Court.

In these highly partisan times, GPS monitoring is a subject that has both conservatives and liberals worried. The U.S. Court of Appeals for the D.C. Circuit's pro-privacy ruling was unanimous - decided by judges appointed by Presidents Ronald Reagan, George W. Bush and Bill Clinton.

Plenty of liberals have objected to this kind of spying, but it is the conservative Chief Judge Kozinski who has done so most passionately. "1984 may have come a bit later than predicted, but it's here at last," he lamented in his dissent. And invoking Orwell's totalitarian dystopia where privacy is essentially nonexistent, he warned: "Some day, soon, we may wake up and find we're living in Oceania."













game up

Make Mine Freedom - 1948


American Form of Government

Who's on First? Certainly isn't the Euro.