137 online
 
Most Popular Choices
Share on Facebook 54 Printer Friendly Page More Sharing
OpEdNews Op Eds    H4'ed 3/15/16

Encryption: The Precedent Is the Voting Rights Act

By       (Page 1 of 1 pages)   No comments

Marc Ash
Message Marc Ash
Become a Fan
  (4 fans)

Reprinted from Reader Supported News

Bruce Sewell, Senior Vice President, for Apple, Inc.
Bruce Sewell, Senior Vice President, for Apple, Inc.
(Image by Lancaster University, Channel: lancasteruniversity)
  Details   DMCA
>

Can, should law enforcement be able to look anywhere, search anything to solve or prevent a serious crime?

Almost any judge in America would rule yes. U.S. District Court Magistrate Sheri Pym did. Or at least she thought she did. What she really ruled was a bit different, more complicated, and at least for the moment more legally contentious.

However ultimately the future of data encryption, and with it digital privacy in the U.S., will come down to two simple questions: "What reasonable tools and powers should law enforcement be allowed in the pursuit of public safety." And of equal importance, "What reasonable privacy protections are users of electronic devices entitled to?"

Right now the centerpiece of the government's case against Apple is the "All Writs Act," (AWA) a component of the Judiciary Act of 1789. A good breakdown of the AWA and how it might apply to the government's case against Apple is available in the form of an audio lecture by Stanford University's Jonathan Mayer. As Mayer points out, the law is remarkably broad and, having been written in the 18th century, unproven in this application.

Apple's defenses seem to be coalescing around the First Amendment, and their counter argument is that being asked to author a digital operating system tailored to federal law enforcement's current objectives creates an unreasonable burden. But the AWA was never intended to address or even envision complex 21st century digital-era law. So there's a square peg, round hole problem on many levels.

FBI v Apple is not just an isolated case or an attempt by the government to target one device, or even the world's leading technology company, it's actually quite a bit bigger than that. Enter Edward Snowden and his cache of documents.

What the Snowden documents reveal, actually confirm, is a much larger effort by the U.S. government's law enforcement and security players to convert personal computing into the most invasive form of private citizen monitoring the world has ever known. More to the point, according to the documents, they have already succeeded. Encryption really functions as an antibody, a challenge to the U.S. government's vast "Total Information Awareness" process.

It is the pattern of abuse that draws on the Voting Rights Act for precedent. What Congress said in the VRA, among other things, was that there was a pattern of abuse of voting rights specifically targeting minorities in specific states and jurisdictions. Further, congressional lawmakers asserted that a legal remedy was required to offset the pattern of abuse in the affected jurisdictions. The key takeaway there is a documented, systemic pattern as establishing cause for legal remedy.

What the Snowden documents did was illustrate a massive pattern of civil rights abuse by the NSA and federal law enforcement on a scope affecting the vast majority of Americans. Not only did the Snowden documents establish, in many cases for the first time, that these abuses were taking place, but they confirmed accusations and reports by civil liberties experts that the abuses had been taking place for years.

The civil rights that were denied Americans affected by the government's excesses were specifically those guaranteed under the Fourth Amendment. By using a catch-all rationale and broad self-granted authorities, the NSA and participating federal law enforcement agencies trampled upon the Fourth Amendment protections, according to the documents placed in the public record by Snowden, of practically every American who uses an electronic computing or communication device or financial instrument. The scope is staggering.

Applying the VRA standard, the actions of the NSA and associated federal law enforcement agencies, as illustrated by the Snowden documents, are pernicious, persistent violations of the civil rights of every American affected.

Against that backdrop, consumer personal encryption is not only a reasonable remedy but, until the government can demonstrate conclusively that the violations have ceased, a necessity and a right.

Reader Supported News is the Publication of Origin for this work. Permission to republish is freely granted with credit and a link back to Reader Supported News.

Must Read 1   Valuable 1  
Rate It | View Ratings

Marc Ash Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Marc Ash is the founder and former Executive Director of Truthout, now the founder, editor and publisher of Reader Supported News: http://www.readersupportednews.org

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

The Political Assassination of Bernie Sanders

The Betrayal of Cecily McMillan

What Leeann Tweeden Did Not Say

Are the Oak Ridge Defendants Obama's p*ssy Riot?

Tortured Folks

Plutocrats Win Control of Congress

To View Comments or Join the Conversation:

Tell A Friend