Computers, Privacy & the Constitution

View   r7  >  r6  ...
RickSchwartzFirstPaper 7 - 09 Mar 2009 - Main.RickSchwartz
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper%25"

What's Left of Privacy

Line: 25 to 25
 

Redress?

Changed:
<
<
Owing to the nature of the instruments by which privacy is invaded, the injury inflicted bears a superficial resemblance to the chilling of free communication by virtue of the state's access. However, the injury is so ill-perceived or ignored that a constitutional challenge would surely fail. A legislative solution might be met with more constitutional approval, but the state's interest is to ensure that such surveillance remains available. Thus, the prosecution of ISPs' user-surveillance under the wiretapping prohibitions and comprehensive "net neutrality" seem unlikely.
>
>
Owing to the nature of the instruments by which privacy is invaded, the injury inflicted bears a superficial resemblance to the chilling of free communication by virtue of the state's access. However, the injury is so ill-perceived or ignored that a constitutional challenge would surely fail. A legislative solution might be met with more constitutional approval, but the state's interest is to ensure that such surveillance remains available. Thus, the prosecution of ISPs' user-surveillance under the wiretapping prohibitions and comprehensive "net neutrality" seem unlikely.
 Perhaps speaking in Navajo is the last vestige of self-help available to free people against the state? At least, as long as speaking in Navajo does not create a presumption of trafficking child pornography or terrorism.

Revision 7r7 - 09 Mar 2009 - 05:14:09 - RickSchwartz
Revision 6r6 - 09 Mar 2009 - 00:19:11 - RickSchwartz
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM