Bill Ayers, the ’60s radical, Weather Underground founder and longtime friend of President Obama, is “Guilty as h—, free as a bird” because Watergate’s infamous “Deep Throat” messed up.
And what does this have to do with the Internet? What I’m about to tell you is something that most Americans do not know.
OK, stay with me as I connect the dots …
FBI Associate Director Mark Felt, the self-admitted “Deep Throat” (who guided Washington Post reporters Bob Woodward and Carl Bernstein to uncover the truth about the Watergate break-in that brought down the Nixon presidency) approved illegal wiretaps used in gathering intel on radical left Weather Underground activities. This illegality tainted the investigation, rendering the evidence of Ayers’ crimes inadmissible, and as a result, the domestic terrorist Bill Ayers (who launched the political career of President Barack Obama), was never convicted of his murderous terrorist acts”> and to this day walks the streets “Guilty as h—. Free as a bird.”
In the Watergate aftermath, the Church House Committee determined that the CIA and FBI had violated the law.
Fast forward to the present. The Blaze reports that last January the Supreme Court ruled that using a GPS tracking device on a vehicle without a warrant constituted a search and therefore violated the Fourth Amendment. This was a precedent-setting case. The same defendant is now trying for a similar precedent for warrantless tracking of cell phone data based on cell tower location.
Some 200 law enforcement agencies nationwide are now using questionable methods – without warrants – to gather intel about you from your mobile devices and social networking pages.
Linda Lye, staff attorney for the ACLU in Northern California said, “The process of surveilling the public with these highly invasive methods is shrouded in secrecy. The public has a right to know what processes the government is following – and whether it strikes the appropriate balance between privacy and legitimate law enforcement needs.”
The legality of today’s technological intel-gathering on American citizens is what Watergate’s “Deep Throat” has to do with the Internet.
OnStar Family – If you know, so does the government
However, what technology brings in terms of positives can be used nefariously by those with less than honorable intent. Here are some obvious concerns. Can you think of more?
They want your Internet DNA
Apps have been appropriately described as gateways, because when you buy or download one, it is assumed you are supplying the app developers with a precious commodity: your personal data. It is a high value target.
Knowing as much about you as possible commands a high price in the world of advertising and marketing. For example, your religion, age, gender, purchasing habits, preferences, etc. tell them where to pigeon-hole you when marketing to you.
So that game, quiz or social networking connection you’re engaged in on your iPhone, iPad or computer? They’re sending out volumes of your personal information. Just so you know that they know.
Wearable Internet? One size fits all
How would you like to have the Internet constantly in your line of vision? Forget the iPad. Now it’s eyeglasses. Google has unveiled glasses that include a small see-through screen that can display maps, snap a photo or initiate video calls. It’s the heads-up display of tomorrow.
Is “social buzz” carrying political candidates to victory?
The facts are still a little murky, but social network buzz might not necessarily mean a candidate is involved in generating it directly. People might be buzzing about a candidate because of something he or she did or said. Regardless of whether or not it is positive or negative, does the buzz help a candidate? This data suggests it does, proving the adage that there’s no such thing as bad publicity.
Apple have worms?
Is your Apple computer one of the more than 600,000 Macs in the United States and Canada that have been hack attacked?
In what some are saying could be the most serious malware attack to date, the Mac OS X has been targeted by the Flashback Trojan. According to a report in the San Francisco Chronicle, the attack affects computers running Apple’s Mac OS X software, specifically the Java program that builds web pages.
Apple fixed a security hole last week that was allowing the malicious software to spread. If you haven’t already downloaded the fix, your computer is vulnerable. Go to your toolbar and under the Apple logo, click “Software Update” and banish the worm from the apple of your “i”.
To find out if your Mac has been infected, download these two AppleScripts.
Bits & Bytes
- Americans reading more because of E-books – Pew study
- CNN reports cost of e-reading devices dropping. Likely Amazon may be giving away basic e-readers for free.
- How to check out a Kindle e-book from the public library.
- “Digital Public Library of America” coming April ’13 – non-profit
- Over half of U.S households have WiFi – study
- Nasdaq will list Facebook’s IPO, not NYSE – ouch!
Mecca for Internet and gadget technology goes Hollywood