My title Page contents

What Price? Safety Over Privacy: A Slippery Slope

How much privacy are we willing to give up ensuring our safety against possible terrorist attacks?

Do we have a choice or has this line already been crossed? Have we become a “Big Brother” society?

Already much of our information has been available online to anyone interested in knowing where we live, our age, real estate information and other personal data.

But way beyond this easy access for the average Web surfer, the U.S. government had been using the Stored Communications Act (SCA) of 1986 of that allowed government agencies to read our private e-mails without a search warrant.

E-mails in transit were protected, but once they reached a third party Internet Service Providers (ISP), like Gmail, Yahoo and Hotmail and were stored, they were no longer protected under the Fourth Amendment.

The outrage created years ago under the Bush administration of warrantless wiretaps was renewed with the civil liberties and Internet rights advocates.

The good news is that June 18, 2012, the U.S. 6th Circuit Court of Appeals declared the SCA unconstitutional. It ruled that stored e-mails are secure from government eavesdropping. Because of the ruling, the government has to get a warrant to read the stored e-mails of someone they are investigating.

Not just e-mails have been freely available to the government without a warrant. Cell phone tracking data is also available to a police investigation.

The American Civil Liberties Union advocacy group conducted a yearlong investigation into law enforcement use of cell phone tracking data.

MSNBC reporter, Bob Sullivan, author and writer on technology crime and consumer fraud, reported that using the Freedom of Information Act, the ACLU found many local police departments around the country routinely pay mobile phone network operators a small fee to get detailed records of historic cell phone location information.

Sullivan said this data tells cops not just where a suspect might have been at a given moment, but also create the possibility of retracing someone’s whereabouts for months. In many cases, law enforcement can get this information without applying for a search warrant.

Most often, Sullivan reported, subpoenas are issued instead, which require law enforcement to meet a lower legal standard.

Digging deeper into the use of our personal information being culled by public agencies, James Bamford, in a Wired Magazine article, revealed a top-secret construction project in Utah, named the Utah Data Center that is being built for the National Security Agency (NSA).

The purpose of this massive center is to intercept, decipher, analyze and store huge amounts of communications taken from satellites and cable communications.

The source of this information will come from private emails, cell phone calls, Google searches and personal data trails.

Frankly, I have long ago given up the idea that my life is private. In terms of being a writer who does research online, I must confess I’m a hypocrite when it comes to finding information about people online. I conduct all kinds of online research for a living including finding people.

The difference is I don’t have access to much more than a location and birth date. This data is like using the old yellow pages.

I ask the question again: Is giving up our privacy the price we pay for staying safe from terrorist attacks. Does it help?

We may never know what tactic made the difference or missed the mark.

Computer Forensics Report
Computer Forensics

Computer Forensics Report: Unveiling the Digital Trail

In the world of digital investigations, a computer forensics report is the linchpin that transforms complex technical findings into a comprehensible narrative. It serves as a crucial document, providing a systematic account of the methods, findings, and conclusions derived from a digital forensic examination. In this article, we delve into the intricacies of computer forensics […]

Read More
Memory Forensics Demystified
Computer Forensics

Unearthing Digital Secrets: Memory Forensics Demystified

Memory Forensics Demystified. In the realm of digital investigations, Memory Forensics stands as a beacon of revelation. This intricate discipline, often akin to a digital autopsy, involves the meticulous analysis of a computer’s volatile memory. It’s where secrets, once thought buried, come to light. The Symphony of Binary Fragments Memory forensics delves into the ephemeral […]

Read More
Digital Evidence Laws
Computer Forensics

Deciphering the Legal Landscape: Digital Evidence Laws

Digital Evidence Laws. In the fast-paced digital age, the trail of evidence is no longer confined to physical documents or tangible objects. Digital evidence has become the cornerstone of modern investigations, offering a treasure trove of insights into cybercrimes, corporate malfeasance, and more. However, this digital frontier brings with it a host of legal complexities […]

Read More
Open chat
Iam Guest Posting Service
I Have 600 Site
Status : Indexed All
Good DA : 40-60
Different Nice I Category
Drip Feed Allowed
I can instant publish

My Service :
1. I will do your orders maximum of 1X24 hours, if at the time i’am online. I will do a maximum of 1 hour and the process is complete.
2. If any of you orders are not completed a maximum of 1x24 hours, you do not have to pay me, or free.
3. For the weekend, I usually online, that weekend when i’am not online, it means i’am working Monday.
4. For the payment, maximum payed one day after published live link.
5. Payment via paypal account
If you interesting, please reply
Thank You