Who Can It Be Now?
Please stop calling me.
William Arkin suggests in the Post that the phone records database is the tip of this privacy invading iceberg. According to the blog, "The following is a list of some 500 software tools, databases, data mining and processing efforts contracted for, under development or in use at the NSA and other intelligence agencies today..."
500 processes. This data can serve no practical law enforcement purpose unless the government can attach names to this data, and then determine the context of coversations, emails, blogs, and whatever other communication is being monitored.
4th Amendment articles aside for a moment: how does mining the data of practically every phone call in the United States prevent 20 guys in a room in Hamburg from hatching a simple plot to learn to fly, buy plane tickets for a predetermined date, and within two hours take 3,000 lives?
Please stop calling me.
William Arkin suggests in the Post that the phone records database is the tip of this privacy invading iceberg. According to the blog, "The following is a list of some 500 software tools, databases, data mining and processing efforts contracted for, under development or in use at the NSA and other intelligence agencies today..."
500 processes. This data can serve no practical law enforcement purpose unless the government can attach names to this data, and then determine the context of coversations, emails, blogs, and whatever other communication is being monitored.
4th Amendment articles aside for a moment: how does mining the data of practically every phone call in the United States prevent 20 guys in a room in Hamburg from hatching a simple plot to learn to fly, buy plane tickets for a predetermined date, and within two hours take 3,000 lives?
Please stop calling me.
1 Comments:
Likewise, how does overreacting to Mexican border security prevent a couple guys from coming in through Canada to hijack a plane?
Post a Comment
Subscribe to Post Comments [Atom]
<< Home