It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
"Edward never uses an iPhone, he’s got a simple phone," Anatoly Kucherena told Russian news agency RIA Novosti. "The iPhone has special software that can activate itself without the owner having to press a button and gather information about him, that’s why on security grounds he refused to have this phone."
This also plays into Parallel Construction, a term used to describe a process of building an incriminating case against a citizen without their knowledge, and then tipping local authorities off when and where they will be to do a routine traffic stop and find the incriminating evidence that authorities already knew was there.
Follow me? Reuters did a nice job explaining it:
The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
This is blatantly against the fourth amendment, of course, but the US Government has bypassed this issue by utilizing the FISA (Foreign Intelligence Surveillance Act) court's warrant rubber-stamping process (here's list of the warrant requests presented, approved, modified, or rejected). Of note, 0.3% of requests are denied.
Also, the vast majority of these warrants have nothing to do with terrorism, as you may think. The court even reinterpreted the legal doctrine used to compel railway workers to get drug tested (a minimal intrusion in privacy) to allow for almost limitless electronic surveillance on Americans. I # you not.
In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures, the officials said.
How patriotic! Continuing:
The special needs doctrine was originally established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government’s need to combat an overriding public danger. Applying that concept more broadly, the FISA judges have ruled that the N.S.A.’s collection and examination of Americans’ communications data to track possible terrorists does not run afoul of the Fourth Amendment, the officials said.
So, that overwhelming public danger (drugged out railway workers laying railroads) was legally bound to terrorism in the schema of minimally invasive privacy intrusions. Your tax dollars hard at work, people.
Also, the President's legal framework adjustments entitled Updated Administration Proposal: Law Enforcement Provisions reorganize cyber crimes under the RICO (Racketeer Influenced Corrupt Organizations) statutes, which gives the administration broader powers for prosecution. He alluded to this during the SOTU.
It also specifies under Section 103 (Modernizing The Computer Fraud and Abuse Act) that intentionally accessing or exceeding authorizations on protected computers without causing >$5,000 worth of damage is lawful (or at least specify no penalties), which to me seems a lot like what the NSA has been doing.
originally posted by: MrMaybeNot
The NSA whistleblower doesn’t use a phone because of the secret software, which Snowden’s lawyer says can be remotely activated to watch the user.
Source: www.alternet.org...
"Edward never uses an iPhone, he’s got a simple phone," Anatoly Kucherena told Russian news agency RIA Novosti. "The iPhone has special software that can activate itself without the owner having to press a button and gather information about him, that’s why on security grounds he refused to have this phone."
As a reddit user mentioned, this could be playing a big role in so called "Parallel Construction" where authorities rebuild the trail with fake evidence to cover up the means they got their information.
This also plays into Parallel Construction, a term used to describe a process of building an incriminating case against a citizen without their knowledge, and then tipping local authorities off when and where they will be to do a routine traffic stop and find the incriminating evidence that authorities already knew was there.
Follow me? Reuters did a nice job explaining it:
The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
This is blatantly against the fourth amendment, of course, but the US Government has bypassed this issue by utilizing the FISA (Foreign Intelligence Surveillance Act) court's warrant rubber-stamping process (here's list of the warrant requests presented, approved, modified, or rejected). Of note, 0.3% of requests are denied.
Also, the vast majority of these warrants have nothing to do with terrorism, as you may think. The court even reinterpreted the legal doctrine used to compel railway workers to get drug tested (a minimal intrusion in privacy) to allow for almost limitless electronic surveillance on Americans. I # you not.
In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures, the officials said.
How patriotic! Continuing:
The special needs doctrine was originally established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government’s need to combat an overriding public danger. Applying that concept more broadly, the FISA judges have ruled that the N.S.A.’s collection and examination of Americans’ communications data to track possible terrorists does not run afoul of the Fourth Amendment, the officials said.
So, that overwhelming public danger (drugged out railway workers laying railroads) was legally bound to terrorism in the schema of minimally invasive privacy intrusions. Your tax dollars hard at work, people.
Also, the President's legal framework adjustments entitled Updated Administration Proposal: Law Enforcement Provisions reorganize cyber crimes under the RICO (Racketeer Influenced Corrupt Organizations) statutes, which gives the administration broader powers for prosecution. He alluded to this during the SOTU.
It also specifies under Section 103 (Modernizing The Computer Fraud and Abuse Act) that intentionally accessing or exceeding authorizations on protected computers without causing >$5,000 worth of damage is lawful (or at least specify no penalties), which to me seems a lot like what the NSA has been doing.
Personally, I ditched my smartphone last year and I've been the happy owner of a super thin Motorola Razr flip phone. Who owns iPhones?
originally posted by: TryAndStopTheFuture555
a reply to: MrMaybeNot
Not only does iPhone have back door, the newer the phone the better and more developed the backdoor.
originally posted by: Quetzalcoatl14
Forgive me for my own ignorance, but is there solid evidence that the Gov has been using any or such backdoors?
originally posted by: TryAndStopTheFuture555
originally posted by: Quetzalcoatl14
Forgive me for my own ignorance, but is there solid evidence that the Gov has been using any or such backdoors?
Oh my god, please send me your address so I can pay you subscription to a newspaper.
US has only been caught spying on German president cell phone and spying on population of planet Earth, geesh
that's quite interesting by the way because someone who I worked with told me to be wary of large communications companies merging under the pretext of multi billion dollar/pound deals because it could be an effort to unify and control all the relevant sources of information and the benefits that come from owning these corporations under easier to manage and more powerful groups.
originally posted by: ~Lucidity
And I'm sure it's going to get even worse with the IBM-Apple alliance on the new iOS.
Fun times.
originally posted by: ManFromEurope
a reply to: Quetzalcoatl14
There is no evidence, as this thread is pure fear-mongering. You could take my word for it, but who am I that my word could mean anything in these matters?
originally posted by: Fermy
a reply to: MrMaybeNot
I bought a Chinese phone from Amazon or some such, it's doubtful the NSA have tampered with that.