If You Encrypt Your Cellphone the Terrorists Win

 “Apple has created a phone that is dark, that cannot be accessed by law enforcement even when a court has authorized us to look at its contents,” said Vance…”That’s going to be the terrorists’ communication device of choice.”

Combat Shooter's Handbook Ah yes, beware of the boogie-men “terrorists!” It is as H.L. Mencken once said, “The whole aim of practical politics is to keep the populace alarmed—and thus clamorous to be led to safety—by menacing it with an endless series of hobgoblins, all of them imaginary.”

Anybody want to make any book on whether or not Apple will knuckle?

STAFF NEWS & ANALYSIS

By Roland Peterson via The Daily Bell

IReconnaissance Marine MCI 03.32f: Marine Corps Institutef you value privacy and want to encrypt your cellphone to keep hackers and other snoops from rifling through your personal business then you are aiding terrorists. At least that’s what the top prosecutor in New York City said recently when discussing new encryption software released by Apple and Google  that is specifically for the operating systems on cellphones.

The Betrayed: On Warriors, Cowboys and Other MisfitsManhattan District Attorney Cyrus Vance Jr. recently made his views clear on a popular New York radio station.

“Apple has created a phone that is dark, that cannot be accessed by law enforcement even when a court has authorized us to look at its contents,” said Vance on “The Cats Roundtable” show on WNYM 970 AM. “That’s going to be the terrorists’ communication device of choice.”

Environmental & Natural Resource Economics: The Austrian ViewIt’s been well-documented that U.S. government officials at all levels – from local law enforcement all the way up to the National Security Agency (NSA) – couldn’t give a rat’s derriere about Americans’ constitutional right to privacy and that anything we write, say or look at is fair game for them to monitor, track and store indefinitely – whether or not you have been accused of a crime.

The Essence of Liberty: Volume I: Liberty and History: The Rise and Fall of the Noble Experiment with Constitutionally Limited Government (Liberty and ... Limited Government) (Volume 1) The Essence of Liberty: Volume II: The Economics of Liberty (Volume 2) The Essence of Liberty: Volume III: A Universal Philosophy of Political Economy (Liberty: A Universal Political Ethic) (Volume 3) In a damning report published on June 14, 2014, independent media outlet “Pro Publica” reported: “Listening to your phone calls  – which requires showing ‘probable cause’ of a crime – to monitor the numbers for incoming and outgoing calls in real time, as well as the duration of the calls. Instead, they can get a cA Handbook for Ranch Managersourt to sign off on an order that only requires the data they’re after is ‘relevant to an ongoing criminal investigation’ – a lesser standard of evidence. The government can also get historical phone records with an administrative subpoena, which doesn’t require a judge’s approval.”

And it’s worse than that. Local police now have highly advanced tools to help keep an eye on all of us.

For example, earlier this month, Baltimore, Md. police were outed as using sophisticated cellphone surveillance equipment that was given to it by the Obama administration.

According to a report in The Baltimore Sun, the device, called Hailstorm, has been deployed 4,300 times since 2007. It’s an upgrade from the so-called Stingray technology, which came under fire a year ago when police started using it indiscriminately to track and monitor cellphone usage in cities across the country.

And for anyone who still believes that police are only using this technology to fight crime and stop terrorists, Edward Snowden conceded to comedian John Oliver, who recently travelled to Moscow to interview the NSA whistleblower, that nothing is sacred anymore.

If you have sent a dirty picture to your wife or girlfriend within the past few years, it’s a fair bet that the super spy agency has a copy of your intimates filed away.

It’s still illegal for the NSA to snoop on Americans, but since major Internet and cell companies regularly send information through international data channels even your most private moments can be nabbed, perused and stored without your consent.

“The good news is, there is no [government] program named ‘The Dick Pic Program,’ ” Snowden joked to Oliver. “The bad news is they are still collecting everybody’s information, including your dick pics.”

This article contributed courtesy of Rabble Magazine.

Check out our WebSite Check out our e-Store Combat Shooter's Handbook Combat Shooter’s Handbook. Call for a pizza, a cop, and an ambulance and see which one arrives first. So, who does that leave to protect you, your life, property and family? The one and only answer is: YOU This Handbook is intended to help you exercise that right and meet that responsibility. Available in both paperback and Kindle versions.

Advertisements

About Land & Livestock Interntional, Inc.

Land and Livestock International, Inc. is a leading agribusiness management firm providing a complete line of services to the range livestock industry. We believe that private property is the foundation of America. Private property and free markets go hand in hand—without property there is no freedom. We also believe that free markets, not government intervention, hold the key to natural resource conservation and environmental preservation. No government bureaucrat can (or will) understand and treat the land with as much respect as its owner. The bureaucrat simply does not have the same motives as does the owner of a capital interest in the property. Our specialty is the working livestock ranch simply because there are so many very good reasons for owning such a property. We provide educational, management and consulting services with a focus on ecologically and financially sustainable land management that will enhance natural processes (water and mineral cycles, energy flow and community dynamics) while enhancing profits and steadily building wealth.
This entry was posted in Privacy & Asset Protection and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s