#patriotact

faab64@diasp.org

The Patriot Act on steroids: D.C. Uniparty wants to use anti-TikTok legislation as Trojan horse for censorship and surveillance

Beltway lawmakers are setting up a smokescreen to curtail rights.

The Restricting the Emergence of Security Threats that Risk Information and Communications Technology (RESTRICT) Act (S.686), which was introduced in the Senate earlier this month, would do much more than just ban TikTok.

This bill is no mere “TikTok ban,” it is a mechanism for a massive, sweeping surveillance and censorship overhaul.  
The #RESTRICT Act goes far, far beyond potentially banning TikTok. It gives the government virtual unchecked authority over the U.S. communications infrastructure. The incredibly broad language includes the ability to “enforce any mitigation measure to address any risk” to “national security” today and in any “potential future transaction.”

The Senate legislation currently has 19 cosponsors, all of whom are Uniparty members in good standing. It is fully “bipartisan,” consisting of 9 democrats and 10 republicans. 

#PatriotAct #Politics #TikTok #Fascism #Internet #Freedom #Censorship #US
https://dossier.substack.com/p/the-patriot-act-on-steroids-dc-uniparty

magdoz@diaspora.psyco.fr

L'extraterritorialité du Cloud Act

Article 2018 : https://www.journaldunet.com/solutions/cloud-computing/1210752-l-extraterritorialite-du-cloud-act-a-la-lumiere-du-projet-europeen-e-evidence/
Un petit passage :

Soulignons aussi que le périmètre des prestataires visés par le Cloud Act pourrait ne pas se limiter aux sociétés américaines et leurs filiales à l’étranger (par exemple Google, Microsoft, Facebook, etc.). Si l’exposé des motifs de la loi fait référence aux prestataires "subject to the jurisdiction of the United States", il n’est pas exclu que pourraient être concernées les sociétés européennes qui ont une filiale aux États-Unis de même que celles qui y conduisent des activités en ciblant le marché américain. Il est donc risqué de considérer qu’opérer seulement avec des prestataires exclusivement implantés dans l’ #UE permet d’être immunisé du #CloudAct. Afin de ne pas être atteint par cette #législation, ceux-ci devraient également s’isoler radicalement du marché #américain.

#Extraterritorialité #Juridiction #UnitedStates #Cloud #PatriotAct #USA #EU #Numérique #Messagerie #Surveillance #NSA #Impérialisme

dredmorbius@joindiaspora.com

US Domestic Surveillance Disclosures pre-dating Edward Snowden's Revelations

Asking for sources of any current activities met with some resistance at HN. Challenged for any awareness of pre-Snowden programmes, I listed a few I was aware of, off the top of my head:

Regards pre-Snowden, the situation was far more than an "open secret", there were multiple documented projects and methods employed. Among them:

There were very strong suspicions around the TIA (total information awareness) and USA PATRIOT ACT (2003, 2001). I recall much chatter about this at the time, and the related FISA court, though little by way of specific details of technological measures and methods involved.

Carnivore, a WinNT workstation-based tool, disclosed ~2000. https://en.wikipedia.org/wiki/Carnivore_(software)

There are telephnic data retention programmes, including MAINWAY (revealed in 2006), containing an estimated over 1.9 trillion call-detail records, and

https://en.wikipedia.org/wiki/MAINWAY

Project ECHELON, with disclosures of varying aspects from 1972 -- 2000. https://en.wikipedia.org/wiki/ECHELON

There are earlier periods, notably addressed by the FBI's own COINTELPRO archives (https://vault.fbi.gov/cointel-pro), though for my purposes I'm considering "modern" projects to be circa 1990 onwards. (COINTELPRO and the Church Committee hearings resulted in substantial changes, at least publically, to US domestic surveillance).

And I've compiled a long list of pre-1990 references of concerns regarding significant technologists who'd warned of the risks of information technology as a tool of surveillance and control, largely as no such list seemed extant: https://toot.cat/@dredmorbius/105074933053020193

I'm well aware that documentation of clandestine and national security issues is difficult to come by, see the TK case for one reason why that is.

But that's also why specific documentation is so valuable and why I'd requested that.


Adapted from an HN comment:
https://news.ycombinator.com/item?id=27184956 )

#surveillance #SurveillanceState #SurveillanceCapitalism #NSA #CIA #FBI #Carnivore #ECHELON #PatriotAct #FISA #MAINWAY #Room614A #ATT #MarkKlein #WilliamBinney #RussellTice #Hemisphere #EdwardSnowden #COINTELPRO #ChurchCommittee

johnhummel@pluspora.com

From the annals of Sensible things that will never come to pass:

'Just Let the Patriot Act Die You Cowards': House Lawmakers Urged to Vote Down Flawed Domestic Spy Bill

"It would be unconscionable for the Democratic House to pass any PATRIOT Act reauthorization without critical privacy reforms."

[The problem is that the "Patriot" Act is a fascist's wet dream. It was their foot in the door. Asking them to give it up would be... an act of optimism. Their goal is to expand the civil violations, not repeal them.]

Progressive privacy advocates and civil libertarians on Wednesday called on constituents to urgently call their representative in the U.S. House and demand they vote against a surveillance bill that would allow the Justice Department and FBI to spy on the internet browser histories of people living in the United States—including citizens and undocumented immigrants.

... "It would be unconscionable for the Democratic House to pass any PATRIOT Act reauthorization without critical privacy reforms that would pass the Senate," said Vitka. "It is on Congress, and in particular House Democrats, to protect people from [Attorney General] Bill Barr's FBI."

#PatriotAct #Internet #Privacy

https://www.commondreams.org/news/2020/05/27/just-let-patriot-act-die-you-cowards-house-lawmakers-urged-vote-down-flawed-domestic?cd-origin=rss&utm_term=AO&utm_campaign=Daily%20Newsletter&utm_content=email&utm_source=Daily%20Newsletter&utm_medium=Email