It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by pheonix358
I know our computers are not the most secure places to put information unless you disconnect one completely from the net, but cloud computing seems to me to be an absurd place to keep anything. I have no doubt that THEY have access to anything and everything in the cloud realm.
There are many ways of safely storing data including a secure away location.
The only one thing we have is their inability to check on all of us, there are too many, but I dislike having to stay under their radar. They have more than one radar and there are multiple THEM.
Yes he is guilty of creating something which is being used in a questionable practice. But is he guilty of any crime? Is he as you put it in your OP...
On February 13, 2006, the American Bar Association (ABA) denounced the warrantless domestic surveillance program, accusing the President of exceeding his powers under the Constitution. The ABA also formulated a policy opposing any future government use of electronic surveillance in the United States for foreign intelligence purposes without obtaining warrants from a special secret court as required by the 1978 Foreign Intelligence Surveillance Act.
Cole, Epstein, Heynmann and eleven other prominent legal scholars (Beth Nolan, Curtis Bradley, Geoffrey Stone, Harold Hongju Koh, Kathleen Sullivan, Laurence Tribe, Martin Lederman, Ronald Dworkin, Walter Dellinger, William S. Sessions and William Van Alstyne) wrote a letter to Congress that appeared in the New York Review of Books on February 9, 2006. They wrote that "the Justice Department's defense of what it concedes was secret and warrantless electronic surveillance of persons within the United States fails to identify any plausible legal authority for such surveillance. Accordingly the program appears on its face to violate existing law."
In conclusion, the DOJ letter fails to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the President—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the President cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.
During the Obama Administration, the NSA has officially continued operating under the new FISA guidelines.[3
However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.
Originally posted by boncho
Legal professionals during the NSA wiretapping when this occurred agreed that it was illegal, making Narus an accessory to the criminal spying:
A large part of our image acquisition process, is the approval and key-wording of each individual photo. Approval is the QA of a photo to meet our client’s minimum standards (size, quality and creativity). Key-Wording is the process of adding keywords to describe the content of each photo, so clients could perform a query and efficiently and accurately locate those images. Those tasks are labor and time consuming therefore costly, and it delays the time to market of a new photo that arrives at our desk. We wish to develop, a software solution that would replace part of the human interaction in the process. The system should pre-scan the images for technical qualifications and match keywords with existing photos in the database. Once the solution is implemented, a photo would arrive to our employee, once it has already been QA’d and partially key-worded. That eventually would reduce the time of the image processing and therefore cut production cost and time to market.
I come from a marketing and biz-dev background but I also have a long software engineering background having worked for years as lead software engineer and product manager in different small and large companies,and even a small exit at these happy 90′s selling one of my first startups at the age of 22.
During my MBA studies at The University of Chicago Booth School of Business, I spent time in the US and in general traveled a lot, and I have lived in various continents since childhood.
There are many advantages to our technology, I’ll name two of the key ones:
1. It is super scalable. We are able to index and retrieve images and videos from huge databases of content – and by that I mean: billions of images or hours of video, in a matter of milliseconds and without compromising on the accuracy of the results.
2. Our technology is one of the most versatile in the market today. It is as useful for image libraries (stock agencies, photo sharing, etc..), mobile devices, retail applications, security agencies and the list of ideas or requests our clients and prospects bring is growing all the time.