It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Shadowbear
Originally posted by signs
Every American wants to be safe from terrorists and yet some don't want their government empowered to keep them safe. Anyone for ping-pong?
[edit on 11-5-2006 by signs]
Actually no, I don't want to be safe.
I want to be free.
Unfortunately, the past and current administations have stolen that choice from me.
And you.
Originally posted by signs
What good is freedom to a dead man?
from dgtempe
WRONG. The FCC did some monitoring always- There has always been monitoring of criminal activity, etc. You arent going to tell us you dont know the difference? Qwest dont want to play. I wonder why??? They say what they are asked to do is highly illegal. I hate their service, but GOOD FOR THEM.
Maybe you should ask them why THEY dont want to play this game, huh?
Originally posted by MrPenny
Yes, telephone companies do it constantly because we implicitly agree to let them do it with the stipulation that our information is kept private and secure.
This same technology, data mining 'social networks', can be used to track the communications of casual pot smokers for instance.
Originally posted by jsobecky
We all know how much info about ourselves is being spread every time we apply for a loan or go to the ER or many other routine activities that we participate every day.
If recording conversations was proved, I may change my mind about the subject.
Most people know that when they make a mobile call--during a 911 emergency, for example--authorities can access phone company technology to pin down their location, sometimes to within a few feet.
A lesser-known fact: Cell phone companies can locate you any time you are in range of a tower and your phone is on. Cell phones are designed to work either with global positioning satellites or through "pings" that allow towers to triangulate and pinpoint signals. Any time your phone "sees" a tower, it pings it.
Ma Bell's bedrock principle — protection of the customer — guided the company for decades, said Gene Kimmelman, senior public policy director of Consumers Union. "No court order, no customer information — period. That's how it was for decades," he said.
The concern for the customer was also based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers' calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered.
The financial penalties for violating Section 222, one of many privacy reinforcements that have been added to the law over the years, can be stiff. The Federal Communications Commission, the nation's top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of "violation." In practice, that means a single "violation" could cover one customer or 1 million.
In the case of the NSA's international call-tracking program, Bush signed an executive order allowing the NSA to engage in eavesdropping without a warrant. The president and his representatives have since argued that an executive order was sufficient for the agency to proceed. Some civil liberties groups, including the American Civil Liberties Union, disagree.
Leslie Cauley, USA TODAY
Originally posted by jsobecky
All you can say is that somebody on Phone Line A called somebody on Phone Line B.
Originally posted by grover
The right wing apologists keep saying I lie when I call it like I see it but tell me who keeps violating the constituation?
In the greatest surveillance effort ever established, the US National Security Agency (NSA) has created a global spy system, codename ECHELON, which captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world. ECHELON is controlled by the NSA and is operated in conjunction with the Government Communications Head Quarters (GCHQ) of England, the Communications Security Establishment (CSE) of Canada, the Australian Defense Security Directorate (DSD), and the General Communications Security Bureau (GCSB) of New Zealand. These organizations are bound together under a secret 1948 agreement, UKUSA, whose terms and text remain under wraps even today.
To firmly set the NSA program within the law, Congress and the courts will have to think carefully about what's known in the signals intelligence world as "meta-data." These are the tags that identify the basic facts of a communication -- time, date, to, from -- but not its content. According to the Times and to other published reports, this routing information has been at the core of the NSA's new program. The agency has used sophisticated algorithms to analyze patterns of communication so that it can focus on people who may be linked to al Qaeda and then, where appropriate, target its communications through FISA warrants or other procedures.
the challenge will be the same as always: to use tools that can enhance security, but in a way that does not unduly diminish liberty.
Originally posted by signs
Originally posted by Shadowbear
Originally posted by signs
Every American wants to be safe from terrorists and yet some don't want their government empowered to keep them safe. Anyone for ping-pong?
[edit on 11-5-2006 by signs]
Actually no, I don't want to be safe.
I want to be free.
Unfortunately, the past and current administations have stolen that choice from me.
And you.
What good is freedom to a dead man?