decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Is there a gene for being a "brownshirt"? | 314 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Is there a gene for being a "brownshirt"?
Authored by: Anonymous on Saturday, May 05 2012 @ 08:45 AM EDT
Is there a gene for being a "brownshirt"?

Computer spyware is newest weapon in Syrian conflict

In Syria's cyberwar, the regime's supporters have deployed a new weapon against opposition activists -- computer viruses that spy on them, according to an IT specialist from a Syrian opposition group and a former international aid worker whose computer was infected.
Remember, that once the door is there, then anyone elected into power, or takes it, for whatever reason, and however they can get it (maybe by convincing the general public that a boogie man is going to eat their children), can use that power and all the tools that are in place to keep the power in the hands of only those that they trust (often only those that share their point of view).

There is a reason for the 2nd amendment (based on a lack of trust in the possibility that someone could get into power, that would remove "liberty" laws - remember when President Regan was shot, that Alexander Hair announced "he was in power" - well, the blood left my heart for a minute when he said this - as he had no power to be in charge at all. So, give this type of person the power to snoop, and use that snooping and leak it out selectively, or use it to suppress only those who oppose what "they" want?

This is exactly what this "back-door access" leads to - a loss of privacy and liberty? And, the strong potential for misuse of power.

Trust in the leadership, in a democracy, is earned, not expected. Those in power, feeling they need it to survive, need to remember this, as too often, they forget and expect trust.

New Hampshire License Plate says "Live Free or Die". Look at the folks in Syria, they don't trust their government anymore, and they are willing to die to change it.

A back-door to any software allowed to anyone with power, is not a good idea, as when the power turns toxic, for whatever reason (to the left or to the right), then - for every action, there can be an equal and opposite reaction.

[ Reply to This | Parent | # ]

FBI Wants Backdoors in Facebook, Skype and Instant Messaging
Authored by: Anonymous on Saturday, May 05 2012 @ 07:39 PM EDT
During the second world war, Jews had nothing to hide but history shows millions
lost their lives for nothing more than their belief or not being part of the
master race..

Now imagine a repeat of a similar crazed leader in a high tech world where
mobile phone tracking, back doors into every communication method and massive
processing capacity to cross correlate every and all piece of data is common
place.

The next time it may be the color of your eyes or your hair or some other thing
that makes you the target of these crazed bigots that we have placed in power.

In today's world, those that have nothing to hide will be the ones that have the
most to fear.

We should never forget the past and never allow our fears as fanned by those in
power to dictate such systems be in place, for we may pay for such weakness with
our lives.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )