5. Personal telephone and email monitoring without legal authorization. These activities were put into place following the 9/11 attacks, but have been mis-used and abused.
As in most cases with technological advances, the important conversations and the passage of laws to regulate activities that threaten individual privacy have not occurred, and it may be now left up to the courts to determine what regulations must be put into effect.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).



